{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T11:46:36Z","timestamp":1773402396052,"version":"3.50.1"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10586-024-04388-5","type":"journal-article","created":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T17:01:25Z","timestamp":1713114085000},"page":"8655-8681","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature"],"prefix":"10.1007","volume":"27","author":[{"given":"Rafika","family":"Saadouni","sequence":"first","affiliation":[]},{"given":"Chirihane","family":"Gherbi","sequence":"additional","affiliation":[]},{"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[]},{"given":"Yasmine","family":"Harbi","sequence":"additional","affiliation":[]},{"given":"Amina","family":"Khacha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,14]]},"reference":[{"issue":"1","key":"4388_CR1","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"13","key":"4388_CR2","doi-asserted-by":"crossref","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Sallam, K.M., Zomaya, A.Y., Li, B.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Internet Things J. 9(13), 11604\u201311613 (2021)","journal-title":"IEEE Internet Things J."},{"key":"4388_CR3","doi-asserted-by":"crossref","first-page":"113292","DOI":"10.1109\/ACCESS.2021.3103725","volume":"9","author":"Y Harbi","year":"2021","unstructured":"Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S.: Recent security trends in internet of things: a comprehensive survey. IEEE Access 9, 113292\u2013113314 (2021)","journal-title":"IEEE Access"},{"issue":"11","key":"4388_CR4","doi-asserted-by":"crossref","first-page":"e5500","DOI":"10.1002\/dac.5500","volume":"36","author":"C Gherbi","year":"2023","unstructured":"Gherbi, C., Senouci, O., Harbi, Y., Medani, K., Aliouat, Z.: A systematic literature review of machine learning applications in IoT. Int. J. Commun. Syst. 36(11), e5500 (2023)","journal-title":"Int. J. Commun. Syst."},{"key":"4388_CR5","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"4388_CR6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.fcij.2018.06.001","volume":"3","author":"A Darwish","year":"2018","unstructured":"Darwish, A.: Bio-inspired computing: algorithms review, deep analysis, and the scope of applications. Future Comput. Inform. J. 3(2), 231\u2013246 (2018)","journal-title":"Future Comput. Inform. J."},{"key":"4388_CR7","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s41650-017-0033-7","volume":"2","author":"VR Balasaraswathi","year":"2017","unstructured":"Balasaraswathi, V.R., Sugumaran, M., Hamid, Y.: Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Netw. 2, 107\u2013119 (2017)","journal-title":"J. Commun. Inf. Netw."},{"key":"4388_CR8","doi-asserted-by":"crossref","unstructured":"Alamiedy, T.A., Anbar, M., Al-Ani, A.K., Al-Tamimi, B.N.,Faleh, N.: Review on feature selection algorithms for anomaly-based intrusion detection system. In Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), pages 605\u2013619. Springer, 2019","DOI":"10.1007\/978-3-319-99007-1_57"},{"key":"4388_CR9","doi-asserted-by":"crossref","first-page":"157761","DOI":"10.1109\/ACCESS.2021.3129775","volume":"9","author":"S Kumar","year":"2021","unstructured":"Kumar, S., Gupta, S., Arora, S.: Research trends in network-based intrusion detection systems: A review. IEEE Access 9, 157761\u2013157779 (2021)","journal-title":"IEEE Access"},{"key":"4388_CR10","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2021.104216","volume":"101","author":"M Di Mauro","year":"2021","unstructured":"Di Mauro, M., Galatro, G., Fortino, G., Liotta, A.: Supervised feature selection techniques in network intrusion detection: a critical review. Eng. Appl. Artif. Intell. 101, 104216 (2021)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"4388_CR11","first-page":"909","volume":"12","author":"A Mahendran","year":"2022","unstructured":"Mahendran, A., et al.: Issues and solution techniques for iot security privacy-a survey. Int. J. Comput. Digital Syst. 12(1), 909\u2013928 (2022)","journal-title":"Int. J. Comput. Digital Syst."},{"issue":"3","key":"4388_CR12","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun. Surv. Tutor. 22(3), 1646\u20131685 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4388_CR13","doi-asserted-by":"crossref","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","volume":"9","author":"J Lansky","year":"2021","unstructured":"Lansky, J., Ali, S., Mohammadi, M., Majeed, M.K., Karim, S.H., Rashidi, S., Hosseinzadeh, M., Rahmani, A.M.: Deep learning-based intrusion detection systems: a systematic review. IEEE Access 9, 101574\u2013101599 (2021)","journal-title":"IEEE Access"},{"key":"4388_CR14","doi-asserted-by":"crossref","unstructured":"RC, J.S., Parkavi,K: Investigations on bio-inspired algorithm for network intrusion detection\u2013a review. Evol. Intell. 9 (2022)","DOI":"10.22247\/ijcna\/2022\/214503"},{"key":"4388_CR15","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","volume":"171","author":"T Saranya","year":"2020","unstructured":"Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., Khan, M.A.: Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Comput. Sci. 171, 1251\u20131260 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"4388_CR16","unstructured":"Keele, S. et\u00a0al.: Guidelines for performing systematic literature reviews in software engineering (2007)"},{"key":"4388_CR17","first-page":"45","volume":"2","author":"S Tong","year":"2001","unstructured":"Tong, S., Koller, D.: Support vector machine active learning with applications to text classification. J. Mach. Learn. Res. 2, 45\u201366 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"4388_CR18","doi-asserted-by":"crossref","unstructured":"Li,Wenchao, Yi,Ping, Wu,Yue ,Pan,Li, Li,Jianhua. et\u00a0al. A new intrusion detection system based on knn classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014, 2014","DOI":"10.1155\/2014\/240217"},{"key":"4388_CR19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"11","key":"4388_CR20","doi-asserted-by":"crossref","first-page":"2783","DOI":"10.1890\/07-0539.1","volume":"88","author":"DR Cutler","year":"2007","unstructured":"Cutler, D.R., Edwards, T.C., Jr., Beard, K.H., Cutler, A., Hess, K.T., Gibson, J., Lawler, J.J.: Random forests for classification in ecology. Ecology 88(11), 2783\u20132792 (2007)","journal-title":"Ecology"},{"issue":"2\u20133","key":"4388_CR21","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/0168-9002(95)00274-X","volume":"362","author":"G D\u2019Agostini","year":"1995","unstructured":"D\u2019Agostini, G.: A multidimensional unfolding method based on bayes\u2019 theorem. Nucl. Instrum. Methods Phys. Res. Sect. A 362(2\u20133), 487\u2013498 (1995)","journal-title":"Nucl. Instrum. Methods Phys. Res. Sect. A"},{"key":"4388_CR22","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i16.24173","author":"AR Muhsen","year":"2021","unstructured":"Muhsen, A.R., Jumaa, G.G., Al Bakri, N.F., Sadiq, A.T.: Feature selection strategy for network intrusion detection system (nids) using meerkat clan algorithm. Int. J. Interact. Mob. Technol. (2021). https:\/\/doi.org\/10.3991\/ijim.v15i16.24173","journal-title":"Int. J. Interact. Mob. Technol."},{"issue":"2","key":"4388_CR23","doi-asserted-by":"crossref","first-page":"446","DOI":"10.3390\/s21020446","volume":"21","author":"A Churcher","year":"2021","unstructured":"Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., Alqahtani, F., Nour, B., Buchanan, W.J.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21(2), 446 (2021)","journal-title":"Sensors"},{"issue":"2","key":"4388_CR24","doi-asserted-by":"crossref","first-page":"88","DOI":"10.18201\/ijisae.2019252786","volume":"7","author":"MM Saritas","year":"2019","unstructured":"Saritas, M.M., Yasar, A.: Performance analysis of ANN and Naive Bayes classification algorithm for data classification. Int. J. Intell. Syst. Appl. Eng. 7(2), 88\u201391 (2019)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"4388_CR25","doi-asserted-by":"crossref","unstructured":"Bangyal, W.H., Ahmad, J., Rauf, H.T., Shakir, R.: Evolving artificial neural networks using opposition based particle swarm optimization neural network for data classification. In 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pages 1\u20136. IEEE, 2018","DOI":"10.1109\/3ICT.2018.8855772"},{"key":"4388_CR26","doi-asserted-by":"crossref","unstructured":"Abd\u00a0Jalil, K., Kamarudin, M.H, Masrek, M.N.: Comparison of machine learning algorithms performance in detecting network intrusion. In 2010 international conference on networking and information technology, pages 221\u2013226. IEEE, 2010","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"4388_CR27","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10462-011-9272-4","volume":"39","author":"SB Kotsiantis","year":"2013","unstructured":"Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261\u2013283 (2013)","journal-title":"Artif. Intell. Rev."},{"issue":"4","key":"4388_CR28","first-page":"2828","volume":"7","author":"K Rai","year":"2016","unstructured":"Rai, K., Devi, M.S., Guleria, A.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(4), 2828 (2016)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"4388_CR29","doi-asserted-by":"crossref","unstructured":"Al\u00a0Tawil, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on moth flame optimization. In 2021 International Conference on Information Technology (ICIT), pages 377\u2013381. IEEE, 2021","DOI":"10.1109\/ICIT52682.2021.9491690"},{"key":"4388_CR30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","volume":"16","author":"M Wo\u017aniak","year":"2014","unstructured":"Wo\u017aniak, M., Grana, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Inf. Fusion 16, 3\u201317 (2014)","journal-title":"Inf. Fusion"},{"issue":"8","key":"4388_CR31","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond k-means. Pattern Recog. Lett. 31(8), 651\u2013666 (2010)","journal-title":"Pattern Recog. Lett."},{"issue":"1","key":"4388_CR32","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm as 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. C 28(1), 100\u2013108 (1979)","journal-title":"J. R. Stat. Soc. Ser. C"},{"key":"4388_CR33","doi-asserted-by":"crossref","unstructured":"Kumari, R., Singh, M.K., Jha, R., Singh, N.K., et\u00a0al.: Anomaly detection in network traffic using k-mean clustering. In: 2016 3rd international conference on recent advances in information technology (RAIT), pages 387\u2013393. IEEE, 2016","DOI":"10.1109\/RAIT.2016.7507933"},{"key":"4388_CR34","doi-asserted-by":"crossref","unstructured":"Li, Z., Li, Y., Xu, L.: Anomaly intrusion detection method based on k-means clustering algorithm with particle swarm optimization. In: 2011 international conference of information technology, computer engineering and management sciences, volume\u00a02, pages 157\u2013161. IEEE, 2011","DOI":"10.1109\/ICM.2011.184"},{"issue":"2","key":"4388_CR35","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3390\/electronics9020219","volume":"9","author":"S Bhattacharya","year":"2020","unstructured":"Bhattacharya, S., S, S.R., Maddikunta, P.K., Kaluri, R., Singh, S., Gadekallu, T.R., Alazab, M.: Tariq UA novel pca-firefly based xgboost classification model for intrusion detection in networks using gpu. Electronics 9(2), 219 (2020)","journal-title":"Electronics"},{"key":"4388_CR36","unstructured":"Agrawal, R., Srikant, R., et\u00a0al.: Fast algorithms for mining association rules. In: Proc. 20th int. conf. very large data bases, VLDB, volume 1215, pages 487\u2013499. Santiago, Chile (1994)"},{"issue":"7540","key":"4388_CR37","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G., Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015)","journal-title":"Nature"},{"issue":"8","key":"4388_CR38","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"4388_CR39","unstructured":"Chung, J., Gulcehre, C., Cho, K.H., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555, 2014"},{"key":"4388_CR40","volume":"3","author":"L Deng","year":"2014","unstructured":"Deng, L.: A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Trans. Signal Inf. Process. 3, e2 (2014)","journal-title":"APSIPA Trans. Signal Inf. Process."},{"key":"4388_CR41","doi-asserted-by":"crossref","unstructured":"Hinton, G.E.: A practical guide to training restricted Boltzmann machines. In: Neural Networks: Tricks of the Trade: Second Edition, pp. 599\u2013619. Springer (2012)","DOI":"10.1007\/978-3-642-35289-8_32"},{"issue":"2","key":"4388_CR42","first-page":"137","volume":"2","author":"S Binitha","year":"2012","unstructured":"Binitha, S., Siva Sathya, S., et al.: A survey of bio inspired optimization algorithms. Int. J. Soft Comput. Eng. 2(2), 137\u2013151 (2012)","journal-title":"Int. J. Soft Comput. Eng."},{"key":"4388_CR43","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"key":"4388_CR44","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. Adv. Neural Inf. Process. Syst. 27 (2014)"},{"issue":"115","key":"4388_CR45","doi-asserted-by":"crossref","first-page":"105151","DOI":"10.1016\/j.engappai.2022.105151","volume":"1","author":"MA Ganaie","year":"2022","unstructured":"Ganaie, M.A., Hu, M., Malik, A.K., Tanveer, M., Suganthan, P.N.: Ensemble deep learning: a review. Eng. Appl. Artif. Intell. 1(115), 105151 (2022)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"4388_CR46","doi-asserted-by":"crossref","unstructured":"Husain, M.S.: Nature inspired approach for intrusion detection systems. Design and analysis of security protocol for communication, pp.\u00a0171\u2013182 (2020)","DOI":"10.1002\/9781119555759.ch8"},{"key":"4388_CR47","doi-asserted-by":"crossref","unstructured":"Atashpaz-Gargari, E., Lucas, C.: Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition. In: 2007 IEEE Congress on Evolutionary Computation, pp.\u00a04661\u20134667. IEEE (2007)","DOI":"10.1109\/CEC.2007.4425083"},{"key":"4388_CR48","doi-asserted-by":"crossref","unstructured":"Krishnanand, K.R., Nayak, S.K., Panigrahi, B.K., Rout, P.K.: Comparative study of five bio-inspired evolutionary optimization techniques. In: 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), pages 1231\u20131236. IEEE (2009)","DOI":"10.1109\/NABIC.2009.5393750"},{"issue":"04","key":"4388_CR49","doi-asserted-by":"crossref","first-page":"1550025","DOI":"10.1142\/S146902681550025X","volume":"14","author":"S Elsayed","year":"2015","unstructured":"Elsayed, S., Sarker, R., Essam, D.: Survey of uses of evolutionary computation algorithms and swarm intelligence for network intrusion detection. Int. J. Comput. Intell. Appl. 14(04), 1550025 (2015)","journal-title":"Int. J. Comput. Intell. Appl."},{"issue":"12","key":"4388_CR50","doi-asserted-by":"crossref","first-page":"55","DOI":"10.5815\/ijmecs.2014.12.08","volume":"6","author":"S Roy","year":"2014","unstructured":"Roy, S., Biswas, S., Chaudhuri, S.S.: Nature-inspired swarm intelligence and its applications. Int. J. Mod. Educ. Comput. Sci. 6(12), 55 (2014)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"key":"4388_CR51","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2021.0121023","author":"MG Raj","year":"2021","unstructured":"Raj, M.G., Pani, S.K.: A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment. Int. J. Adv. Comput. Sci. Appl. (2021). https:\/\/doi.org\/10.14569\/ijacsa.2021.0121023","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"4388_CR52","first-page":"426","volume":"14","author":"YK Saheed","year":"2022","unstructured":"Saheed, Y.K., Arowolo, M.O., Tosho, A.U.: An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system. Int. J. Electr. Eng. Inform. 14(2), 426\u2013442 (2022)","journal-title":"Int. J. Electr. Eng. Inform."},{"key":"4388_CR53","unstructured":"Crosbie, M., Spafford, G., et\u00a0al.: Applying genetic programming to intrusion detection. In: Working Notes for the AAAI Symposium on Genetic Programming, pages 1\u20138. Cambridge, MA: MIT Press (1995)"},{"key":"4388_CR54","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195099713.001.0001","volume-title":"Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms","author":"T Back","year":"1996","unstructured":"Back, T.: Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms. Oxford University Press, Oxford (1996)"},{"issue":"5","key":"4388_CR55","first-page":"660","volume":"19","author":"E Popoola","year":"2017","unstructured":"Popoola, E., Adewumi, A.O.: Efficient feature selection technique for network intrusion detection system using discrete differential evolution and decision. Int. J. Netw. Secur. 19(5), 660\u2013669 (2017)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"4388_CR56","doi-asserted-by":"crossref","first-page":"708","DOI":"10.3390\/electronics12030708","volume":"12","author":"A El-Ghamry","year":"2023","unstructured":"El-Ghamry, A., Gaber, T., Mohammed, K.K., Hassanien, A.E.: Optimized and efficient image-based iot malware detection method. Electronics 12(3), 708 (2023)","journal-title":"Electronics"},{"key":"4388_CR57","doi-asserted-by":"crossref","first-page":"64228","DOI":"10.1109\/ACCESS.2023.3289405","volume":"11","author":"M Bakro","year":"2023","unstructured":"Bakro, M., Kumar, R.R., Alabrah, A., Ashraf, Z., Ahmed, M.N., Shameem, M., Abdelsalam, A.: An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier. IEEE Access 11, 64228\u201364247 (2023)","journal-title":"IEEE Access"},{"key":"4388_CR58","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.016113","author":"O Almomani","year":"2021","unstructured":"Almomani, O.: A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Comput. Mater. Contin. (2021). https:\/\/doi.org\/10.32604\/cmc.2021.016113","journal-title":"Comput. Mater. Contin."},{"key":"4388_CR59","unstructured":"Kalaivani, S., Gopinath, G.: Modified bee colony with bacterial foraging optimization based hybrid feature selection technique for intrusion detection system classifier model. ICTACT J Soft Comput. (2020)"},{"issue":"4","key":"4388_CR60","first-page":"534","volume":"46","author":"WL Al-Yaseen","year":"2019","unstructured":"Al-Yaseen, W.L.: Improving intrusion detection system by developing feature selection model based on firefly algorithm and support vector machine. IAENG Int. J. Comput. Sci. 46(4), 534\u2013540 (2019)","journal-title":"IAENG Int. J. Comput. Sci."},{"issue":"4","key":"4388_CR61","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jksus.2018.03.018","volume":"31","author":"M Mazini","year":"2019","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. J. King Saud Univ. 31(4), 541\u2013553 (2019)","journal-title":"J. King Saud Univ."},{"key":"4388_CR62","doi-asserted-by":"crossref","unstructured":"Xu, H., Cao, Q., Fu, H., Fu, C., Chen, H., Su, J.,: Application of support vector machine model based on an improved elephant herding optimization algorithm in network intrusion detection. In Artificial Intelligence: Second CCF International Conference, ICAI 2019, Xuzhou, China, August 22-23, 2019, Proceedings 2, pages 283\u2013295. Springer, 2019","DOI":"10.1007\/978-981-32-9298-7_23"},{"key":"4388_CR63","doi-asserted-by":"crossref","first-page":"108831","DOI":"10.1016\/j.compeleceng.2023.108831","volume":"110","author":"SV Pingale","year":"2023","unstructured":"Pingale, S.V., Sutar, S.R.: Remora based deep maxout network model for network intrusion detection using convolutional neural network features. Comput. Electr. Eng. 110, 108831 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"4388_CR64","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1016\/j.procs.2023.01.102","volume":"218","author":"L Narengbam","year":"2023","unstructured":"Narengbam, L., Dey, S.: Wifi intrusion detection using artificial neurons with bio-inspired optimization algorithm. Procedia Comput. Sci. 218, 1238\u20131246 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"4388_CR65","doi-asserted-by":"crossref","first-page":"65611","DOI":"10.1109\/ACCESS.2022.3183213","volume":"10","author":"B Deore","year":"2022","unstructured":"Deore, B., Bhosale, S.: Hybrid optimization enabled robust cnn-lstm technique for network intrusion detection. IEEE Access 10, 65611\u201365622 (2022)","journal-title":"IEEE Access"},{"key":"4388_CR66","doi-asserted-by":"crossref","first-page":"100700","DOI":"10.1016\/j.measen.2023.100700","volume":"26","author":"R Anushiya","year":"2023","unstructured":"Anushiya, R., Lavanya, V.S.: A new deep-learning with swarm based feature selection for intelligent intrusion detection for the internet of things. Meas. Sens. 26, 100700 (2023)","journal-title":"Meas. Sens."},{"key":"4388_CR67","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6473507","author":"A Dahou","year":"2022","unstructured":"Dahou, A., Abd Elaziz, M., Chelloug, S.A., Awadallah, M.A., Al-Betar, M.A., Al-Qaness, M.A., Forestiero, A.: Intrusion detection system for iot based on deep learning and modified reptile search algorithm. Comput. Intell. Neurosci (2022). https:\/\/doi.org\/10.1155\/2022\/6473507","journal-title":"Comput. Intell. Neurosci"},{"key":"4388_CR68","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s12065-019-00199-5","volume":"12","author":"I Benmessahel","year":"2019","unstructured":"Benmessahel, I., Xie, K., Chellal, M., Semong, T.: A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization. Evol. Intell. 12, 131\u2013146 (2019)","journal-title":"Evol. Intell."},{"issue":"4","key":"4388_CR69","doi-asserted-by":"crossref","first-page":"692","DOI":"10.3390\/electronics9040692","volume":"9","author":"N Khare","year":"2020","unstructured":"Khare, N., Devan, P., Chowdhary, C.L., Bhattacharya, S., Singh, G., Singh, S., Yoon, B.: Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics 9(4), 692 (2020)","journal-title":"Electronics"},{"issue":"3","key":"4388_CR70","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manag. 16(3), 924\u201335 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4388_CR71","doi-asserted-by":"crossref","unstructured":"Dwivedi, S., Vardhan, M., Tripathi, S.: Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Clust. Comput., pp.1-20 (2021)","DOI":"10.1007\/s10586-020-03229-5"},{"key":"4388_CR72","doi-asserted-by":"crossref","first-page":"76318","DOI":"10.1109\/ACCESS.2022.3192472","volume":"10","author":"WA Ghanem","year":"2022","unstructured":"Ghanem, W.A., Ghaleb, S.A., Jantan, A., Nasser, A.B., Saleh, S.A., Ngah, A., Alhadi, A.C., Arshad, H., Saad, A.M., Omolara, A.E., El-Ebiary, Y.A., et al.: Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks. IEEE Access 10, 76318\u201376339 (2022)","journal-title":"IEEE Access"},{"issue":"6","key":"4388_CR73","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","volume":"12","author":"D Simon","year":"2008","unstructured":"Simon, D.: Biogeography-based optimization. IEEE Trans. Evol. Comput. 12(6), 702\u2013713 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"4388_CR74","first-page":"47","volume":"205","author":"H Chen","year":"2008","unstructured":"Chen, H., Zhu, Y.: Optimization based on symbiotic multi-species coevolution. Appl. Math. Comput. 205(1), 47\u201360 (2008)","journal-title":"Appl. Math. Comput."},{"key":"4388_CR75","doi-asserted-by":"crossref","unstructured":"Liu, C., Yang, J., Chen, R., Zhang, Y., Zeng, J.: Research on immunity-based intrusion detection technology for the internet of things. In: 2011 Seventh International conference on natural computation, volume\u00a01, pages 212\u2013216. IEEE (2011)","DOI":"10.1109\/ICNC.2011.6022060"},{"issue":"1\u20132","key":"4388_CR76","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"4388_CR77","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"4388_CR78","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based ids for internet of things using unsupervised opf based on mapreduce approach. Comput. Commun. 98, 52\u201371 (2017)","journal-title":"Comput. Commun."},{"key":"4388_CR79","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN\u201902 (Cat. No. 02CH37290), volume\u00a02, pp.1702\u20131707. IEEE (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"issue":"1","key":"4388_CR80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2808691","volume":"48","author":"A Milenkoski","year":"2015","unstructured":"Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., Payne, B.D.: Evaluating computer intrusion detection systems: a survey of common practices. ACM Comput. Surv. 48(1), 1\u201341 (2015)","journal-title":"ACM Comput. Surv."},{"key":"4388_CR81","doi-asserted-by":"crossref","first-page":"56847","DOI":"10.1109\/ACCESS.2020.2978035","volume":"8","author":"R Vijayanand","year":"2020","unstructured":"Vijayanand, R., Devaraj, D.: A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access 8, 56847\u201356854 (2020)","journal-title":"IEEE Access"},{"key":"4388_CR82","doi-asserted-by":"crossref","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"MK Sydney","year":"2021","unstructured":"Sydney, M.K.: An advanced intrusion detection system for iiot based on ga and tree based algorithms. IEEE Access 9, 113199\u2013113212 (2021)","journal-title":"IEEE Access"},{"key":"4388_CR83","volume":"16","author":"IH Hassan","year":"2022","unstructured":"Hassan, I.H., Abdullahi, M., Aliyu, M.M., Yusuf, S.A., Abdulrahim, A.: An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell. Syst. Appl. 16, 200114 (2022)","journal-title":"Intell. Syst. Appl."},{"issue":"27","key":"4388_CR84","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.7334","volume":"34","author":"S Sokkalingam","year":"2022","unstructured":"Sokkalingam, S., Ramakrishnan, R.: An intelligent intrusion detection system for distributed denial of service attacks: a support vector machine with hybrid optimization algorithm based approach. Concurr. Comput. Pract. Exp. 34(27), e7334 (2022)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"4388_CR85","doi-asserted-by":"crossref","unstructured":"Anzum Tonni, Z., Mazumder, R.: A novel feature selection technique for intrusion detection system using rf-rfe and bio-inspired optimization. In: 2023 57th Annual Conference on Information Sciences and Systems (CISS), pages 1\u20136. IEEE (2023)","DOI":"10.1109\/CISS56502.2023.10089745"},{"key":"4388_CR86","doi-asserted-by":"crossref","first-page":"107894","DOI":"10.1016\/j.knosys.2021.107894","volume":"238","author":"MD Moizuddin","year":"2022","unstructured":"Moizuddin, M.D., Victor Jose, M.: A bio-inspired hybrid deep learning model for network intrusion detection. Knowl. Based Syst. 238, 107894 (2022)","journal-title":"Knowl. Based Syst."},{"key":"4388_CR87","unstructured":"Kaviarasan, S., Geetha, A.: Network intrusion detection based on one-dimensional cnn with chimp optimization algorithm. J. Theor. Appl. Inf. Technol. 101(10) (2023)"},{"issue":"17","key":"4388_CR88","doi-asserted-by":"crossref","first-page":"3724","DOI":"10.3390\/math11173724","volume":"11","author":"D Kilichev","year":"2023","unstructured":"Kilichev, D., Kim, W.: Hyperparameter optimization for 1d-cnn-based network intrusion detection using ga and pso. Mathematics 11(17), 3724 (2023)","journal-title":"Mathematics"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04388-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04388-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04388-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T06:34:49Z","timestamp":1731738889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04388-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":88,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["4388"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04388-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"15 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}