{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:51:01Z","timestamp":1775040661745,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04752-5","type":"journal-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T19:05:29Z","timestamp":1730747129000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks"],"prefix":"10.1007","volume":"28","author":[{"given":"Hayette","family":"Zeghida","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Boulaiche","sequence":"additional","affiliation":[]},{"given":"Ramdane","family":"Chikh","sequence":"additional","affiliation":[]},{"given":"Alwi M.","family":"Bamhdi","sequence":"additional","affiliation":[]},{"given":"Ana Luiza Bessa","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Zeghida","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"issue":"1","key":"4752_CR1","first-page":"9324035","volume":"2017","author":"P Sethi","year":"2017","unstructured":"Sethi, P., Sarangi, S.R., et al.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017(1), 9324035 (2017)","journal-title":"J. Electr. Comput. Eng."},{"key":"4752_CR2","doi-asserted-by":"publisher","first-page":"102763","DOI":"10.1016\/j.jnca.2020.102763","volume":"169","author":"R Yugha","year":"2020","unstructured":"Yugha, R., Chithra, S.: A survey on technologies and security protocols: reference for future generation IoT. J. Netw. Comput. Appl. 169, 102763 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"4752_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIC.2006.116","volume":"10","author":"S Vinoski","year":"2006","unstructured":"Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87\u201389 (2006)","journal-title":"IEEE Internet Comput."},{"key":"4752_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s11761-015-0174-1","volume":"10","author":"H Lampesberger","year":"2016","unstructured":"Lampesberger, H.: Technologies for web and cloud service interaction: a survey. SOCA 10, 71\u2013110 (2016)","journal-title":"SOCA"},{"key":"4752_CR5","first-page":"8","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar, M., Russello, G., Crispo, B.: Internet of things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8\u201327 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"4752_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2018.112102200","volume":"22","author":"C Gomez","year":"2018","unstructured":"Gomez, C., Arcia-Moret, A., Crowcroft, J.: TCP in the internet of things: from ostracism to prominence. IEEE Internet Comput. 22(1), 29\u201341 (2018)","journal-title":"IEEE Internet Comput."},{"key":"4752_CR7","doi-asserted-by":"crossref","unstructured":"Nastase, L: Security in the internet of things: a survey on application layer protocols. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 659\u2013666. IEEE (2017)","DOI":"10.1109\/CSCS.2017.101"},{"key":"4752_CR8","unstructured":"OASIS Standard. MQTT version 5.0 (2019). Accessed 22 June 2020 https:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/mqtt-v5.0.html"},{"key":"4752_CR9","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2016.07.002","volume":"64","author":"A Patel","year":"2017","unstructured":"Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., J\u00fanior, J.C., Katsikas, S.: A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Comput. Secur. 64, 92\u2013109 (2017)","journal-title":"Comput. Secur."},{"key":"4752_CR10","doi-asserted-by":"publisher","first-page":"6430","DOI":"10.1109\/ACCESS.2021.3140015","volume":"10","author":"N Abdalgawad","year":"2021","unstructured":"Abdalgawad, N., Sajun, A., Kaddoura, Y., Zualkernan, I.A., Aloul, F.: Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access 10, 6430\u20136441 (2021)","journal-title":"IEEE Access"},{"issue":"11","key":"4752_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Bing, X., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"4752_CR12","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"4752_CR13","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/LSP.2022.3150258","volume":"29","author":"B Bahmei","year":"2022","unstructured":"Bahmei, B., Birmingham, E., Arzanpour, S.: CNN-RNN and data augmentation using deep convolutional generative adversarial network for environmental sound classification. IEEE Signal Process. Lett. 29, 682\u2013686 (2022)","journal-title":"IEEE Signal Process. Lett."},{"issue":"8","key":"4752_CR14","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"4752_CR15","doi-asserted-by":"crossref","unstructured":"Cho, K., Van\u00a0Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., Bengio, Y.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint http:\/\/arxiv.org\/abs\/1406.1078 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"4752_CR16","doi-asserted-by":"crossref","unstructured":"Zeghida, H., Boulaiche, M., Chikh, R.: Detection of DoS attacks in MQTT environment. In: International Conference on Intelligent Systems and Pattern Recognition, pp. 129\u2013140. Springer (2023)","DOI":"10.1007\/978-3-031-46338-9_10"},{"issue":"7","key":"4752_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"issue":"6","key":"4752_CR18","first-page":"383","volume":"8","author":"MA Razzaq","year":"2017","unstructured":"Razzaq, M.A., Gill, S.H., Qureshi, M.A., Ullah, S.: Security issues in the internet of things (IoT): a comprehensive study. Int. J. Adv. Comput. Sci. Appl. 8(6), 383 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"4752_CR19","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"issue":"11","key":"4752_CR20","doi-asserted-by":"publisher","first-page":"3726","DOI":"10.3390\/s21113726","volume":"21","author":"I Vaccari","year":"2021","unstructured":"Vaccari, I., Orani, V., Paglialonga, A., Cambiaso, E., Mongelli, M.: A generative adversarial network (GAN) technique for internet of medical things data. Sensors 21(11), 3726 (2021)","journal-title":"Sensors"},{"issue":"5","key":"4752_CR21","first-page":"7401","volume":"20","author":"P Prabakaran","year":"2021","unstructured":"Prabakaran, P., Mohana, R.S., Kalaiselvi, S.: Enhancing the cyber security intrusion detection based on generative adversarial network. Elem. Educ. Online 20(5), 7401\u20137401 (2021)","journal-title":"Elem. Educ. Online"},{"key":"4752_CR22","doi-asserted-by":"crossref","unstructured":"Tschuchnig, M.E., Ferner, C, Wegenkittl, S.: Sequential IoT data augmentation using generative adversarial networks. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4212\u20134216. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053949"},{"key":"4752_CR23","doi-asserted-by":"crossref","unstructured":"Shahriar, M.H., Haque, N.I., Rahman, M.A., Alonso, M.. G-IDS: generative adversarial networks assisted intrusion detection system. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 376\u2013385. IEEE (2020)","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"4752_CR24","doi-asserted-by":"crossref","unstructured":"Mosaiyebzadeh, F., Gustavo\u00a0Araujo Rodriguez, L., Batista, D.M., Hirata, R.: A network intrusion detection system using deep learning against MQTT attacks in IoT. In: 2021 IEEE Latin-American Conference on Communications (LATINCOM), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/LATINCOM53176.2021.9647850"},{"key":"4752_CR25","doi-asserted-by":"crossref","unstructured":"Ferdowsi, A., Saad, W.: Generative adversarial networks for distributed intrusion detection in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"4752_CR26","doi-asserted-by":"crossref","unstructured":"Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an MQTT case study (MQTT-IoT-IDS2020 dataset). In: International Networking Conference, pp. 73\u201384. Springer (2020)","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"4752_CR27","doi-asserted-by":"publisher","first-page":"33095","DOI":"10.1109\/ACCESS.2022.3161566","volume":"10","author":"H Siddharthan","year":"2022","unstructured":"Siddharthan, H., Deepa, T., Chandhar, P.: SENMQTT-SET: an intelligent intrusion detection in IoT-MQTT networks using ensemble multi cascade features. IEEE Access 10, 33095\u201333110 (2022)","journal-title":"IEEE Access"},{"issue":"22","key":"4752_CR28","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: MQTTSET, a new dataset for machine learning techniques on MQTT. Sensors 20(22), 6578 (2020)","journal-title":"Sensors"},{"issue":"1","key":"4752_CR29","doi-asserted-by":"publisher","first-page":"6516253","DOI":"10.1155\/2019\/6516253","volume":"2019","author":"H Alaiz-Moreton","year":"2019","unstructured":"Alaiz-Moreton, H., Aveleira-Mata, J., Ondicol-Garcia, J., Mu\u00f1oz-Casta\u00f1eda, A.L., Garc\u00eda, I., Benavides, C., et al.: Multiclass classification procedure for detecting attacks on MQTT-IOT protocol. Complexity 2019(1), 6516253 (2019)","journal-title":"Complexity"},{"issue":"4","key":"4752_CR30","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s10207-023-00681-3","volume":"22","author":"H Zeghida","year":"2023","unstructured":"Zeghida, H., Boulaiche, M., Chikh, R.: Securing MQTT protocol for IoT environment using IDS based on ensemble learning. Int. J. Inf. Secur. 22(4), 1075\u201386 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"4752_CR31","doi-asserted-by":"publisher","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9, 165907\u2013165931 (2021)","journal-title":"IEEE Access"},{"key":"4752_CR32","doi-asserted-by":"crossref","unstructured":"Hara, K., Shiomoto, K.: Intrusion detection system using semi-supervised learning with adversarial auto-encoder. In: NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/NOMS47738.2020.9110343"},{"key":"4752_CR33","doi-asserted-by":"crossref","unstructured":"Zixu, T., Sudheera\u00a0Kalupahana Liyanage, K., Gurusamy, M.: Generative adversarial network and auto encoder based anomaly detection in distributed IoT networks. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9348244"},{"key":"4752_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00521-021-06807-9","volume":"34","author":"N Talpur","year":"2022","unstructured":"Talpur, N., Abdulkadir, S.J., Alhussian, H., Hasan, M.H., Aziz, N., Bamhdi, A.: A comprehensive review of deep neuro-fuzzy system architectures and their optimization methods. Neural Comput. Appl. 34, 1\u201339 (2022)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"4752_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative DDoS detection scheme for software-defined networks (SDN). J. Netw. Syst. Manag. 31(3), 55 (2023)","journal-title":"J. Netw. Syst. Manag."},{"issue":"16","key":"4752_CR36","doi-asserted-by":"publisher","first-page":"7721","DOI":"10.1007\/s00500-022-06750-4","volume":"26","author":"MY Alzahrani","year":"2022","unstructured":"Alzahrani, M.Y., Bamhdi, A.M.: Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft Comput. 26(16), 7721\u20137735 (2022)","journal-title":"Soft Comput."},{"key":"4752_CR37","doi-asserted-by":"crossref","unstructured":"Ghazanfar, S., Hussain, F., Ur Rehman, A., Fayyaz, U.U., Shahzad, F., Shah, G.A.: IoT-flock: an open-source framework for IoT traffic generation. In: 2020 International Conference on Emerging Trends in Smart Technologies (ICETST), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICETST49965.2020.9080732"},{"issue":"11","key":"4752_CR38","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: LIII. On lines and planes of closest fit to systems of points in space. Lond. Edinb. Dublin Philos. Mag. J. Sci. 2(11), 559\u2013572 (1901)","journal-title":"Lond. Edinb. Dublin Philos. Mag. J. Sci."},{"key":"4752_CR39","unstructured":"Hu, Y., Huber, A., Anumula, J., Liu, S.-C.: Overcoming the vanishing gradient problem in plain recurrent networks. arXiv preprint http:\/\/arxiv.org\/abs\/1801.06105 (2018)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04752-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:16:22Z","timestamp":1736522182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04752-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4752"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04752-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"11 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No potential conflict of interest was reported by the author(s).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This work was carried out according to the ethical guidelines.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}}],"article-number":"58"}}