{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T09:20:52Z","timestamp":1772875252307,"version":"3.50.1"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T00:00:00Z","timestamp":1699315200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T00:00:00Z","timestamp":1699315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10586-023-04168-7","type":"journal-article","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T13:02:12Z","timestamp":1699362132000},"page":"3771-3798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Intrusion detection based on ensemble learning for big data classification"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5941-0889","authenticated-orcid":false,"given":"Rahma","family":"Meddeb","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-1805","authenticated-orcid":false,"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,7]]},"reference":[{"issue":"4","key":"4168_CR1","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s10588-020-09322-9","volume":"26","author":"KM Carley","year":"2020","unstructured":"Carley, K.M.: Social cybersecurity: an emerging science. Comput. Math. Organ. Theory 26(4), 365\u2013381 (2020)","journal-title":"Comput. Math. Organ. Theory"},{"issue":"8","key":"4168_CR2","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1109\/TMI.2019.2894349","volume":"38","author":"S Hussein","year":"2019","unstructured":"Hussein, S., Kandel, P., Bolan, C.W., Wallace, M.B., Bagci, U.: Lung and pancreatic tumor characterization in the deep learning era: novel supervised and unsupervised learning approaches. IEEE Trans. Med. Imaging 38(8), 1777\u20131787 (2019)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"4168_CR3","doi-asserted-by":"crossref","unstructured":"Chand, N., Mishra, P., Krishna, C.R., Pilli, E.S., Govil, M.C.: A comparative analysis of SVM and its stacking with another classification algorithm for intrusion detection. In: 2016 International Conference on Advances in Computing, Communication, Automation (ICACCA) (Spring), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICACCA.2016.7578859"},{"issue":"8","key":"4168_CR4","first-page":"3186","volume":"8","author":"M El Arass","year":"2019","unstructured":"El Arass, M., Souissi, N.: Smart siem: From big data logs and events to smart data alerts. Int. J. Innov. Technol. Explore. Eng 8(8), 3186\u20133191 (2019)","journal-title":"Int. J. Innov. Technol. Explore. Eng"},{"issue":"1","key":"4168_CR5","doi-asserted-by":"crossref","first-page":"9","DOI":"10.14445\/22312803\/IJCTT-V19P103","volume":"19","author":"MH Iqbal","year":"2015","unstructured":"Iqbal, M.H., Soomro, T.R., et al.: Big data analysis: Apache storm perspective. Int. J. Comput. Trends Technol. 19(1), 9\u201314 (2015)","journal-title":"Int. J. Comput. Trends Technol."},{"key":"4168_CR6","first-page":"275","volume-title":"8th International Conference on Management and Computer Science (ICMCS 2018)","author":"D Zhang","year":"2018","unstructured":"Zhang, D.: Big data security and privacy protection. In: 8th International Conference on Management and Computer Science (ICMCS 2018), vol. 77, pp. 275\u2013278. Atlantis Press (2018)"},{"issue":"1","key":"4168_CR7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.26599\/BDMA.2020.9020019","volume":"4","author":"A Guezzaz","year":"2021","unstructured":"Guezzaz, A., Asimi, Y., Azrour, M., Asimi, A.: Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection. Big Data Mining Anal. 4(1), 18\u201324 (2021)","journal-title":"Big Data Mining Anal."},{"issue":"9","key":"4168_CR8","first-page":"164","volume":"6","author":"Y El Mourabit","year":"2015","unstructured":"El Mourabit, Y., Bouirden, A., Toumanari, A., Moussaid, N., et al.: Intrusion detection techniques in wireless sensor network using data mining algorithms: A comparative evaluation based on attacks detection. Int. J. Adv. Comput. Sci. Appl. 6(9), 164\u2013172 (2015)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"4168_CR9","first-page":"37","volume":"15","author":"G Nadiammai","year":"2014","unstructured":"Nadiammai, G., Hemalatha, M.: Effective approach toward intrusion detection system using data mining techniques. Egypt. Inf. J. 15(1), 37\u201350 (2014)","journal-title":"Egypt. Inf. J."},{"issue":"1","key":"4168_CR10","first-page":"199","volume":"4","author":"A Ghazali","year":"2015","unstructured":"Ghazali, A., Nuaimy, W., Al-Atabi, A., Jamaludin, I.: Comparison of classification models for NSL-KDD dataset for network anomaly detection. Acad. J. Sci. 4(1), 199\u2013206 (2015)","journal-title":"Acad. J. Sci."},{"issue":"1","key":"4168_CR11","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051\u20131058 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"4168_CR12","first-page":"1520","volume":"13","author":"AAA Hadi","year":"2018","unstructured":"Hadi, A.A.A., Al-Furat, A.-A.: Performance analysis of big data intrusion detection system over random forest algorithm. Int. J. Appl. Eng. Res. 13(2), 1520\u20131527 (2018)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"4168_CR13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.eswa.2018.04.038","volume":"108","author":"A Karami","year":"2018","unstructured":"Karami, A.: An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Syst. Appl. 108, 36\u201360 (2018)","journal-title":"Expert Syst. Appl."},{"key":"4168_CR14","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.cose.2019.05.022","volume":"86","author":"J Gu","year":"2019","unstructured":"Gu, J., Wang, L., Wang, H., Wang, S.: A novel approach to intrusion detection using SVM ensemble with feature augmentation. Computers Security 86, 53\u201362 (2019)","journal-title":"Computers Security"},{"issue":"3","key":"4168_CR15","doi-asserted-by":"crossref","first-page":"2037","DOI":"10.1007\/s12065-021-00609-7","volume":"15","author":"MA Bertoni","year":"2022","unstructured":"Bertoni, M.A., Rosa, G.H.D., Brega, J.R.: Optimum-path forest stacking-based ensemble for intrusion detection. Evol. Intell. 15(3), 2037\u20132054 (2022)","journal-title":"Evol. Intell."},{"key":"4168_CR16","doi-asserted-by":"crossref","first-page":"105980","DOI":"10.1016\/j.asoc.2019.105980","volume":"87","author":"M Prasad","year":"2020","unstructured":"Prasad, M., Tripathi, S., Dahal, K.: An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl. Soft Comput. 87, 105980 (2020)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"4168_CR17","first-page":"215","volume":"17","author":"M Tabash","year":"2020","unstructured":"Tabash, M., Abd Allah, M., Tawfik, B.: Intrusion detection model using naive bayes and deep learning technique. Int. Arab J. Inf. Technol. 17(2), 215\u2013224 (2020)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"4168_CR18","doi-asserted-by":"crossref","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","volume":"168","author":"W Elmasry","year":"2020","unstructured":"Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double metaheuristic. Comput. Netw. 168, 107042 (2020)","journal-title":"Comput. Netw."},{"key":"4168_CR19","doi-asserted-by":"crossref","first-page":"102499","DOI":"10.1016\/j.cose.2021.102499","volume":"112","author":"N Gupta","year":"2022","unstructured":"Gupta, N., Jindal, V., Bedi, P.: CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. Comput. Secur. 112, 102499 (2022)","journal-title":"Comput. Secur."},{"key":"4168_CR20","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","volume":"9","author":"ZK Maseer","year":"2021","unstructured":"Maseer, Z.K., Yusof, R., Bahaman, N., Mostafa, S.A., Foozy, C.F.M.: Benchmarking of machine learning for anomaly-based intrusion detection systems in the cicids2017 dataset. IEEE Access 9, 22351\u201322370 (2021)","journal-title":"IEEE Access"},{"key":"4168_CR21","doi-asserted-by":"crossref","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)","journal-title":"Comput. Netw."},{"key":"4168_CR22","doi-asserted-by":"crossref","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Comuzzi, M., Rhee, K.-H.: TSE-IDS: A two- stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497\u201394507 (2019)","journal-title":"IEEE Access"},{"key":"4168_CR23","doi-asserted-by":"crossref","unstructured":"P. Illy, G. Kaddoum, C.M. Moreira, K. Kaur, S. Garg: Securing fog-to-things environment using intrusion detection system based on ensemble learning. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp 1\u20137. IEEE (2019)","DOI":"10.1109\/WCNC.2019.8885534"},{"issue":"2","key":"4168_CR24","first-page":"565","volume":"13","author":"P Singh","year":"2021","unstructured":"Singh, P., Ranga, V.: Attack and intrusion detection in cloud computing using an ensemble learning approach. Int. J. Inf. Technol. 13(2), 565\u2013571 (2021)","journal-title":"Int. J. Inf. Technol."},{"key":"4168_CR25","first-page":"1","volume":"34","author":"H Rajadurai","year":"2020","unstructured":"Rajadurai, H., Gandhi, U.D.: A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput. App. 34, 1\u20139 (2020)","journal-title":"Neural Comput. App."},{"key":"4168_CR26","doi-asserted-by":"crossref","unstructured":"Pham, N.T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H.F.M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week Multiconference, pp. 1\u20136 (2018).","DOI":"10.1145\/3167918.3167951"},{"key":"4168_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16436-0","author":"C Hazman","year":"2023","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: Toward an intrusion detection model for IoT-based smart environments. Multimedia Tools App. (2023). https:\/\/doi.org\/10.1007\/s11042-023-16436-0","journal-title":"Multimedia Tools App."},{"key":"4168_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04783-y","author":"M Douiba","year":"2022","unstructured":"Douiba, M., Benkirane, S., Guezzaz, A., Azrour, M.: An improved anomaly detection model for IoT security using decision tree and gradient boosting. J. Supercomput. (2022). https:\/\/doi.org\/10.1007\/s11227-022-04783-y","journal-title":"J. Supercomput."},{"key":"4168_CR29","doi-asserted-by":"publisher","unstructured":"Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M.: An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J. Comput. Virol. Hack. Techniq. (2022). https:\/\/doi.org\/10.1007\/s11416-022-00456-9","DOI":"10.1007\/s11416-022-00456-9"},{"key":"4168_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03810-0","author":"C Hazman","year":"2022","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: IDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03810-0","journal-title":"Cluster Comput."},{"key":"4168_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14795-2","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M.: An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimedia Tools App. (2023). https:\/\/doi.org\/10.1007\/s11042-023-14795-2","journal-title":"Multimedia Tools App."},{"issue":"3","key":"4168_CR32","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Farhaoui, Y.: An ensemble learning based intrusion detection model for industrial IoT security. J. Big Data Mining Anal. 6(3), 273\u2013287 (2023)","journal-title":"J. Big Data Mining Anal."},{"key":"4168_CR33","doi-asserted-by":"crossref","unstructured":"Attou, H., Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Alabdultif, A., Almusallam, N.: Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Appl. Sci. J. (2023). https:\/\/www.mdpi.com\/2076-3417\/13\/17\/9588","DOI":"10.3390\/app13179588"},{"issue":"3","key":"4168_CR34","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"H Attou","year":"2023","unstructured":"Attou, H., Guezzaz, A., Benkirane, S., Azrour, M., Farhaoui, Y.: Cloud-based intrusion detection approach using machine learning techniques. J. Big Data Mining Anal. 6(3), 273\u2013287 (2023)","journal-title":"J. Big Data Mining Anal."},{"key":"4168_CR35","doi-asserted-by":"crossref","unstructured":"Ahmim, A., Maglaras, L., Ferrag, M.A., Derdour, M., Janicke, H.: A novel hierarchical intrusion detection system based on decision tree and rules-based models. In: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 228\u2013233. IEEE (2019)","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"4168_CR36","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.procs.2020.08.059","volume":"176","author":"A Abid","year":"2020","unstructured":"Abid, A., Jemili, F.: Intrusion detection based on graph-oriented big data analytics. Procedia Comput. Sci. 176, 572\u2013581 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"4168_CR37","first-page":"24","volume-title":"International Conference on Intelligent Systems Design and Applications","author":"R Meddeb","year":"2019","unstructured":"Meddeb, R., Triki, B., Jemili, F., Korbaa, O.: Dataset for intrusion detection in mobile ad-hoc networks. In: International Conference on Intelligent Systems Design and Applications, pp. 24\u201334. Springer (2019)"},{"key":"4168_CR38","first-page":"3040","volume":"2","author":"F Jemili","year":"2006","unstructured":"Jemili, F., Zaghdoud, M., Ahmed, M.B.: Didfast BN: Distributed intrusion detection and forecasting multiagent system using the Bayesian network. 2006 2nd Int. Conf. Inf. Commun. Technol. 2, 3040\u20133044 (2006)","journal-title":"2006 2nd Int. Conf. Inf. Commun. Technol."},{"issue":"1","key":"4168_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: An overview from a machine learning perspective. J. Big Data 7(1), 1\u201329 (2020)","journal-title":"J. Big Data"},{"key":"4168_CR40","doi-asserted-by":"crossref","unstructured":"Jemili, F., Zaghdoud, M., Ahmed, M.B.: Intrusion detection based on \u201chybrid\u201d propagation in Bayesian networks. In: 2009 IEEE International Conference on Intelligence and Security Informatics, pp. 137\u2013142. IEEE (2009)","DOI":"10.1109\/ISI.2009.5137285"},{"key":"4168_CR41","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.procs.2019.09.162","volume":"159","author":"R Meddeb","year":"2019","unstructured":"Meddeb, R., Jemili, F., Triki, B., Korbaa, O.: Anomaly-based behavioral detection in mobile Ad-Hoc networks. Procedia Comput. Sci. 159, 77\u201386 (2019)","journal-title":"Procedia Comput. Sci."},{"issue":"10","key":"4168_CR42","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.3390\/en13102509","volume":"13","author":"K Shaukat","year":"2020","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Chen, S., Liu, D., Li, J.: Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13(10), 2509 (2020)","journal-title":"Energies"},{"key":"4168_CR43","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/OJCS.2021.3050917","volume":"2","author":"S Ho","year":"2021","unstructured":"Ho, S., Al Jufout, S., Dajani, K., Mozumdar, M.: A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J. Comput. Soc. 2, 14\u201325 (2021)","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"4","key":"4168_CR44","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1007\/s12083-020-00999-y","volume":"14","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, A.A., Sahayakingsly, C., Udayakumar, A.: Analysis of intrusion detection in cyber attacks using deep learning neural networks. Peer-to-Peer Netw. App. 14(4), 2565\u20132584 (2021)","journal-title":"Peer-to-Peer Netw. App."},{"key":"4168_CR45","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.neucom.2019.10.051","volume":"401","author":"F Nie","year":"2020","unstructured":"Nie, F., Zhu, W., Li, X.: Decision tree SVM: An extension of linear SVM for non-linear classification. Neurocomputing 401, 153\u2013159 (2020)","journal-title":"Neurocomputing"},{"issue":"1","key":"4168_CR46","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/JAS.2017.7510730","volume":"5","author":"S Teng","year":"2017","unstructured":"Teng, S., Wu, N., Zhu, H., Teng, L., Zhang, W.: SVM-DT-based adaptive and collaborative intrusion detection. IEEE\/CAA J. Autom. Sinica 5(1), 108\u2013118 (2017)","journal-title":"IEEE\/CAA J. Autom. Sinica"},{"key":"4168_CR47","doi-asserted-by":"crossref","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","volume":"8","author":"S Zavrak","year":"2020","unstructured":"Zavrak, S., Iskefiyeli, M.: Anomaly-based intrusion detection from the network flow features using variational autoencoder. IEEE Access 8, 108346\u2013108358 (2020)","journal-title":"IEEE Access"},{"issue":"1\u201332","key":"4168_CR48","first-page":"16","volume":"3","author":"H-T Lin","year":"2003","unstructured":"Lin, H.-T., Lin, C.-J.: A study on sigmoid kernels for SVM and the training of non-PSD kernels by SMO-type methods. Neural Comput. 3(1\u201332), 16 (2003)","journal-title":"Neural Comput."},{"issue":"2","key":"4168_CR49","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/s10064-017-1010-y","volume":"77","author":"W Chen","year":"2018","unstructured":"Chen, W., Pourghasemi, H.R., Naghibi, S.A.: A comparative study of landslide susceptibility maps produced using support vector machine with different kernel functions and entropy data mining models in China. Bull. Eng. Geol. Environ. 77(2), 647\u2013664 (2018)","journal-title":"Bull. Eng. Geol. Environ."},{"key":"4168_CR50","doi-asserted-by":"crossref","unstructured":"Hassan, U.K., Nawi, N.M., Kasim, S.: Classify a protein domain using sigmoid support vector machine. In: 2014 International Conference on Information Science Applications (ICISA), pp. 1\u20134. IEEE (2014)","DOI":"10.1109\/ICISA.2014.6847375"},{"issue":"12","key":"4168_CR51","first-page":"258","volume":"7","author":"M Panda","year":"2007","unstructured":"Panda, M., Patra, M.R.: Network intrusion detection using Naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258\u2013263 (2007)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"4168_CR52","unstructured":"Guigour`es, R., Boull\u00b4e, M.: Optimisation directe des poids de mod`eles dans un pr\u00b4edicteur bay\u00b4esien na\u00a8\u0131f moyenn\u00b4e. In: EGC, pp. 77\u201382 (2011)"},{"issue":"4","key":"4168_CR53","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.3390\/s22041407","volume":"22","author":"G Liu","year":"2022","unstructured":"Liu, G., Zhao, H., Fan, F., Liu, G., Xu, Q., Nazir, S.: An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 22(4), 1407 (2022)","journal-title":"Sensors"},{"key":"4168_CR54","doi-asserted-by":"crossref","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: kNN model-based approach in classification. In: OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d, pp. 986\u2013996. Springer (2003)","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"4168_CR55","first-page":"1","volume":"2014","author":"W Li","year":"2014","unstructured":"Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on kNN classification algorithm in a wireless sensor network. J. Electr. Comput. Eng. 2014, 1\u20138 (2014)","journal-title":"J. Electr. Comput. Eng."},{"issue":"2","key":"4168_CR56","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11704-019-8208-z","volume":"14","author":"X Dong","year":"2020","unstructured":"Dong, X., Yu, Z., Cao, W., Shi, Y., Ma, Q.: A survey on ensemble learning. Front. Comp. Sci. 14(2), 241\u2013258 (2020)","journal-title":"Front. Comp. Sci."},{"issue":"11","key":"4168_CR57","doi-asserted-by":"crossref","first-page":"3777","DOI":"10.3390\/s18113777","volume":"18","author":"A Shirzadi","year":"2018","unstructured":"Shirzadi, A., Soliman, K., Habibnejhad, M., Kavian, A., Chapi, K., Shahabi, H., Chen, W., Khosravi, K., Thai Pham, B., Pradhan, B., et al.: Novel GIS based machine learning algorithms for shallow landslide susceptibility mapping. Sensors 18(11), 3777 (2018)","journal-title":"Sensors"},{"key":"4168_CR58","doi-asserted-by":"crossref","unstructured":"Gaikwad, D., Thool, R.C.: Intrusion detection system using bagging ensemble method of machine learning. In: 2015 International Conference on Computing Communication Control and Automation, pp. 291\u2013295. IEEE (2015)","DOI":"10.1109\/ICCUBEA.2015.61"},{"issue":"2","key":"4168_CR59","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10021-005-0054-1","volume":"9","author":"AM Prasad","year":"2006","unstructured":"Prasad, A.M., Iverson, L.R., Liaw, A.: Newer classification and regression tree techniques: bagging and random forests for ecological prediction. Ecosystems 9(2), 181\u2013199 (2006)","journal-title":"Ecosystems"},{"key":"4168_CR60","unstructured":"Narassiguin, A.: Ensemble learning, comparative analysis and further improvements with dynamic ensemble selection. Ph.D. thesis, Universite de Lyon (2018)"},{"issue":"4","key":"4168_CR61","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1007\/s10044-016-0553-z","volume":"19","author":"A Narassiguin","year":"2016","unstructured":"Narassiguin, A., Bibimoune, M., Elghazel, H., Aussem, A.: An extensive empirical comparison of ensemble learning methods for binary classification. Pattern Anal. Appl. 19(4), 1093\u20131128 (2016)","journal-title":"Pattern Anal. Appl."},{"issue":"9","key":"4168_CR62","doi-asserted-by":"crossref","first-page":"1714","DOI":"10.3390\/diagnostics11091714","volume":"11","author":"DD Rufo","year":"2021","unstructured":"Rufo, D.D., Debelee, T.G., Ibenthal, A., Negera, W.G.: Diagnosis of diabetes mellitus using gradient boosting machine (lightgbm). Diagnostics 11(9), 1714 (2021)","journal-title":"Diagnostics"},{"key":"4168_CR63","unstructured":"Vijay, R., Manoj, S., Ravikanth, V., Vikas, Y., Priyadarshini, P.I.: Augmenting network intrusion detection system using extreme gradient boosting (XGBoost). Int. J. Creative Res. Thoughts 9 (2021)"},{"key":"4168_CR64","doi-asserted-by":"crossref","first-page":"137231","DOI":"10.1016\/j.scitotenv.2020.137231","volume":"718","author":"H Hong","year":"2020","unstructured":"Hong, H., Liu, J., Zhu, A.-X.: Modeling landslide susceptibility using logitboost alternating decision trees and forest by penalizing attributes with the bagging ensemble. Sci. Total Environ. 718, 137231 (2020)","journal-title":"Sci. Total Environ."},{"key":"4168_CR65","doi-asserted-by":"crossref","unstructured":"Panda, M., Patra, M.R. Ensemble of classifiers for detecting network intrusion. In: Proceedings of the International Conference on Advances in Computing, Communication, and Control, pp. 510\u2013515 (2009)","DOI":"10.1145\/1523103.1523204"},{"key":"4168_CR66","unstructured":"Shivaswamy, P., Jebara, T.: Variance penalizing Adaboost. Advances in Neural Information Processing Systems 24 (2011)"},{"key":"4168_CR67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10489-021-02968-1","volume":"52","author":"M Rashid","year":"2022","unstructured":"Rashid, M., Kamruzzaman, J., Imam, T., Wibowo, S., Gordon, S.: Atree-based stacking ensemble technique with feature selection for network intrusion detection. Appl. Intell. 52, 1\u201314 (2022)","journal-title":"Appl. Intell."},{"key":"4168_CR68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/4586875","volume":"2020","author":"S Rajagopal","year":"2020","unstructured":"Rajagopal, S., Kundapur, P.P., Hareesha, K.S.: A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur. Commun. Netw. 2020, 1\u20139 (2020)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"4168_CR69","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1023\/A:1007515423169","volume":"36","author":"E Bauer","year":"1999","unstructured":"Bauer, E., Kohavi, R.: An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Mach. Learn. 36(1), 105\u2013139 (1999)","journal-title":"Mach. Learn."},{"issue":"11","key":"4168_CR70","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.3390\/electronics10111341","volume":"10","author":"A Alharbi","year":"2021","unstructured":"Alharbi, A., Alosaimi, W., Alyami, H., Rauf, H.T., Dama\u02c7sevi\u02c7cius, R.: Botnet attack detection using local global best bat algorithm for the industrial internet of things. Electronics 10(11), 1341 (2021)","journal-title":"Electronics"},{"key":"4168_CR71","doi-asserted-by":"publisher","unstructured":"Cocoros, P., Sobocinski, M., Steiger, K., Coffman, J.: Evaluating techniques for practical cloud-based network intrusion detection. In: 2020 IEEE International Conference on Smart Cloud (SmartCloud), pp. 62\u201367 (2020). https:\/\/doi.org\/10.1109\/SmartCloud49737.2020.00020","DOI":"10.1109\/SmartCloud49737.2020.00020"},{"key":"4168_CR72","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.3390\/sym14071461","volume":"14","author":"DN Mhawi","year":"2022","unstructured":"Mhawi, D.N., Aldallal, A., Hassan, S.: Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry 14, 1461 (2022). https:\/\/doi.org\/10.3390\/sym14071461","journal-title":"Symmetry"},{"issue":"12","key":"4168_CR73","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on the NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol."},{"issue":"4","key":"4168_CR74","first-page":"324","volume":"1","author":"S Kotsiantis","year":"2004","unstructured":"Kotsiantis, S., Pintelas, P.: Combining bagging and boosting. Int. J. Comput. Intell. 1(4), 324\u2013333 (2004)","journal-title":"Int. J. Comput. Intell."},{"key":"4168_CR75","doi-asserted-by":"crossref","first-page":"107869","DOI":"10.1016\/j.compeleceng.2022.107869","volume":"100","author":"IF Kilincer","year":"2022","unstructured":"Kilincer, I.F., Ertam, F., Sengur, A.: A comprehensive intrusion detection framework using boosting algorithms. Comput. Electr. Eng. 100, 107869 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"4168_CR76","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.1007\/s10586-021-03331-2","volume":"24","author":"S El Motaki","year":"2021","unstructured":"El Motaki, S., Yahyaouy, A., Gualous, H., et al.: A new weighted fuzzy C-means clustering for workload monitoring in cloud data center platforms. Cluster Comput. 24, 3367\u20133379 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03331-2","journal-title":"Cluster Comput."},{"issue":"1","key":"4168_CR77","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s11269-020-02704-3","volume":"35","author":"A Mousavi","year":"2021","unstructured":"Mousavi, A., Sajedi Hosseini, F., Choubin, B., Goodarzi, M., Dineva, A.A., Rafiei Sardooi, E.: Ensemble boosting and bagging based machine learning models for groundwater potential prediction. Water Resour. Manage 35(1), 23\u201337 (2021)","journal-title":"Water Resour. Manage"},{"key":"4168_CR78","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd Acm Sigkdd International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"4168_CR79","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10994-017-5686-9","volume":"107","author":"JN van Rijn","year":"2018","unstructured":"van Rijn, J.N., Holmes, G., Pfahringer, B., Vanschoren, J.: The online performance estimation framework: Heterogeneous ensemble learning for data streams. Mach. Learn. 107(1), 149\u2013176 (2018)","journal-title":"Mach. Learn."},{"key":"4168_CR80","doi-asserted-by":"crossref","first-page":"103302","DOI":"10.1016\/j.coldregions.2021.103302","volume":"189","author":"M De Coste","year":"2021","unstructured":"De Coste, M., Li, Z., Pupek, D., Sun, W.: A hybrid ensemble modeling framework for the prediction of breakup ice jams on northern Canadian rivers. Cold Reg. Sci. Technol. 189, 103302 (2021)","journal-title":"Cold Reg. Sci. Technol."},{"key":"4168_CR81","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-021-11836-6","volume":"81","author":"R Chowdhury","year":"2022","unstructured":"Chowdhury, R., Sen, S., Roy, A., Saha, B.: An optimal feature-based network intrusion detection system using bagging ensemble method for real-time traffic analysis. Multimed. Tools App. 81, 1\u201323 (2022)","journal-title":"Multimed. Tools App."},{"key":"4168_CR82","doi-asserted-by":"crossref","unstructured":"Louppe, G., Geurts, P.: Ensembles on random patches. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 346\u2013361. Springer (2012)","DOI":"10.1007\/978-3-642-33460-3_28"},{"issue":"10","key":"4168_CR83","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TPAMI.2006.211","volume":"28","author":"JJ Rodriguez","year":"2006","unstructured":"Rodriguez, J.J., Kuncheva, L.I., Alonso, C.J.: Rotation forest: A new classifier ensemble method. IEEE Trans. Pattern Anal. Mach. Intell. 28(10), 1619\u20131630 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"4168_CR84","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-021-00103-8","volume":"5","author":"RA Disha","year":"2022","unstructured":"Disha, R.A., Waheed, S.: Performance analysis of machine learning models for intrusion detection system using Gini impurity-based weighted random forest (GIWRF) feature selection technique. Cybersecurity 5(1), 1\u201322 (2022)","journal-title":"Cybersecurity"},{"key":"4168_CR85","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1007\/s10586-020-03222-y","volume":"24","author":"S Krishnaveni","year":"2021","unstructured":"Krishnaveni, S., Sivamohan, S., Sridhar, S.S., et al.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Comput. 24, 1761\u20131779 (2021). https:\/\/doi.org\/10.1007\/s10586-020-03222-y","journal-title":"Cluster Comput."},{"key":"4168_CR86","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.procs.2021.06.066","volume":"190","author":"M Artur","year":"2021","unstructured":"Artur, M.: Review the performance of the Bernoulli Naive Bayes classifier in intrusion detection systems using recursive feature elimination with a cross-validated selection of the best number of features. Procedia Comput. Sci. 190, 564\u2013570 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"4168_CR87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.procs.2018.01.091","volume":"127","author":"M Belouch","year":"2018","unstructured":"Belouch, M., El Hadaj, S., Idhammad, M.: Performance evaluation of intrusion detection based on machine learning using apache spark. Procedia Comput. Sci. 127, 1\u20136 (2018)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"4168_CR88","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09591-y","volume":"29","author":"M Al-Omari","year":"2021","unstructured":"Al-Omari, M., Rawashdeh, M., Qutaishat, F., Alshira\u2019H, M., Ababneh, N.: An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 29(2), 1\u201318 (2021)","journal-title":"J. Netw. Syst. Manag."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04168-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04168-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04168-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:19:34Z","timestamp":1717003174000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04168-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,7]]},"references-count":88,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["4168"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04168-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2596433\/v1","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,7]]},"assertion":[{"value":"16 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors state that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}