{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:54:39Z","timestamp":1773968079108,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10586-023-04097-5","type":"journal-article","created":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T18:01:15Z","timestamp":1688925675000},"page":"2465-2488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Hardening of the Internet of Things by using an intrusion detection system based on deep learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Bahman","family":"Varastan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2764-6373","authenticated-orcid":false,"given":"Shahram","family":"Jamali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1848-0220","authenticated-orcid":false,"given":"Reza","family":"Fotohi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,9]]},"reference":[{"key":"4097_CR1","doi-asserted-by":"crossref","unstructured":"Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), 2017 (2017)","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"key":"4097_CR2","doi-asserted-by":"crossref","unstructured":"Malhotra, S., Bali, V., Paliwal, K.K.: Genetic programming and K-nearest neighbour classifier based intrusion detection model. In: 2017 7th International Conference on Cloud Computing, Data Science and Engineering\u2014Confluence, Noida, 2017 (2017)","DOI":"10.1109\/CONFLUENCE.2017.7943121"},{"issue":"3","key":"4097_CR3","doi-asserted-by":"publisher","first-page":"429","DOI":"10.14257\/astl.2014.53.89","volume":"53","author":"M Gao","year":"2014","unstructured":"Gao, M., Wang, N.: A network intrusion detection method based on improved K-means algorithm. Adv. Sci. Technol. Lett. 53(3), 429\u2013433 (2014)","journal-title":"Adv. Sci. Technol. Lett."},{"issue":"4","key":"4097_CR4","first-page":"113","volume":"53","author":"S Khobragade","year":"2015","unstructured":"Khobragade, S., Padiya, P.: Distributed intrusion detection system using mobile agent. Int. J. Eng. Innov. Technol. 5(4), 113\u2013119 (2015)","journal-title":"Int. J. Eng. Innov. Technol."},{"key":"4097_CR5","doi-asserted-by":"crossref","unstructured":"Sangeetha, S., Gayathri Devi, B., Ramya, R., Dharani, M.K., Sathya, P.: Signature based semantic intrusion detection system on cloud. In: Information Systems Design and Intelligent Applications. Springer, New Delhi (2015)","DOI":"10.1007\/978-81-322-2250-7_66"},{"key":"4097_CR6","unstructured":"Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: 19th IEEE International Parallel and Distributed Processing Symposium, 2005. Proceedings (2005)"},{"key":"4097_CR7","unstructured":"Chiu, H.S., Lui, K.-S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing, 2006 (2006)"},{"issue":"8","key":"4097_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.12700\/APH.11.08.2014.08.1","volume":"11","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband, S., Anuar, N.B., Laiha, M., Kiah, M., Misra, S.: Anomaly detection using fuzzy Q-learning algorithm. Acta Polytech. Hung. 11(8), 5\u201328 (2014)","journal-title":"Acta Polytech. Hung."},{"key":"4097_CR9","doi-asserted-by":"crossref","unstructured":"Dhurandher, S.K., Woungang, I., Gupta, A., Bhargava, B.K.: E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012 (2012)","DOI":"10.1109\/WAINA.2012.85"},{"key":"4097_CR10","doi-asserted-by":"crossref","unstructured":"Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), 2015 (2015)","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"issue":"1","key":"4097_CR11","first-page":"6","volume":"109","author":"U Kumar","year":"2015","unstructured":"Kumar, U., Gohil, B.N.: A survey on intrusion detection systems for cloud computing environment. Int. J. Comput. Appl. 109(1), 6\u201315 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"4097_CR12","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"L Buczak","year":"2015","unstructured":"Buczak, L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"4097_CR13","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"H Haddad Pajouh","year":"2016","unstructured":"Haddad Pajouh, H., Javidan, R., Khayami, R., Ali, D., Choo, K.K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314\u2013323 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4097_CR14","doi-asserted-by":"crossref","unstructured":"Batiha, T., Prauzek, M., Kr\u00f6mer, P.: Intrusion detection in wireless sensor networks by an ensemble of artificial neural networks. In: Intelligent Decision Technologies. Springer, Singapore (2019)","DOI":"10.1007\/978-981-13-8311-3_28"},{"key":"4097_CR15","doi-asserted-by":"crossref","unstructured":"Mridha, M.F., Hamid, M.A., Asaduzzaman, M.: Issues of Internet of Things (IoT) and an intrusion detection system for IoT using machine learning paradigm. In: Proceedings of International Joint Conference on Computational Intelligence, 2020. Springer, Singapore (2020)","DOI":"10.1007\/978-981-13-7564-4_34"},{"key":"4097_CR16","doi-asserted-by":"crossref","unstructured":"Ambili, K.N., Jose, J.: Trust based intrusion detection system to detect insider attacks in IoT systems. In: Information Science and Applications. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-1465-4_62"},{"key":"4097_CR17","doi-asserted-by":"crossref","unstructured":"Antoniou, J.: Using game theory to address new security risks in the IoT. In: Game Theory, the Internet of Things and 5G Networks. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-16844-5"},{"key":"4097_CR18","first-page":"65","volume":"47","author":"P Zhang","year":"2019","unstructured":"Zhang, P., Gao, J., Jia, W., Li, X.: Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT multi-cloudy environment(s). J. Inf. Secur. Appl. 47, 65\u201377 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"4097_CR19","doi-asserted-by":"crossref","unstructured":"Nagtilak, S., Rai, S., Kale, R.: Internet of Things: a survey on distributed attack detection using deep learning approach. In: Proceeding of International Conference on Computational Science and Applications, 2020. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-0790-8_17"},{"key":"4097_CR20","unstructured":"Pokhrel, S., Abbas, R., Aryal, B.: IoT security: botnet detection in IoT using machine learning (2021). arXiv preprint arXiv:2104.02231"},{"key":"4097_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108331","volume":"197","author":"R Fotohi","year":"2021","unstructured":"Fotohi, R., Aliee, F.S.: Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Comput. Netw. 197, 108331 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"4097_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MITP.2020.3031358","volume":"23","author":"T Saba","year":"2021","unstructured":"Saba, T., Haseeb, K., Shah, A.A., Rehman, A., Tariq, U., Mehmood, Z.: A machine-learning-based approach for autonomous IoT security. IT Prof. 23(3), 69\u201375 (2021)","journal-title":"IT Prof."},{"issue":"3","key":"4097_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10723-022-09614-1","volume":"20","author":"R Fotohi","year":"2022","unstructured":"Fotohi, R., Abdan, M., Ghasemi, S.: A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks. J. Grid Comput. 20(3), 22 (2022)","journal-title":"J. Grid Comput."},{"issue":"7","key":"4097_CR24","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.3390\/s22072697","volume":"22","author":"M Aslam","year":"2022","unstructured":"Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., Chelloug, S.A., Elaziz, M.A., Al-Qaness, M.A.A., Jilani, S.F.: Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 22(7), 2697 (2022)","journal-title":"Sensors"},{"key":"4097_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-021-09581-z","volume":"19","author":"M Mahdavisharif","year":"2021","unstructured":"Mahdavisharif, M., Jamali, S., Fotohi, R.: Big data-aware intrusion detection system in communication networks: a deep learning approach. J. Grid Comput. 19, 1\u201328 (2021)","journal-title":"J. Grid Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04097-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04097-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04097-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T21:04:32Z","timestamp":1717016672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04097-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["4097"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04097-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,9]]},"assertion":[{"value":"19 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All of the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This paper does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}