{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:11:46Z","timestamp":1764238306501,"version":"3.46.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05635-z","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:15:10Z","timestamp":1759176910000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimising intrusion detection systems: a hybrid approach with ensemble machine learning models"],"prefix":"10.1007","volume":"28","author":[{"given":"Lalit Kumar","family":"Vashishtha","sequence":"first","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Pranav","family":"Pant","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"5635_CR1","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1007\/s11277-022-10063-y","volume":"128","author":"LK Vashishtha","year":"2023","unstructured":"Vashishtha, L.K., Singh, A.P., Chatterjee, K.: HIDM: a hybrid intrusion detection model for cloud based systems. Wireless Pers. Commun. 128, 2637\u20132666 (2023). https:\/\/doi.org\/10.1007\/s11277-022-10063-y","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR2","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Proc. MilCIS, pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"5635_CR3","doi-asserted-by":"publisher","unstructured":"Sahu, S.K., Sarangi, S., Jena, S.K.: A detail analysis on intrusion detection datasets. In: Proc. IADCC, pp. 1348\u20131353 (2014). https:\/\/doi.org\/10.1109\/IADCC.2014.6779523","DOI":"10.1109\/IADCC.2014.6779523"},{"key":"5635_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem, V., Babaie, S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Netw. 136, 37\u201350 (2018). https:\/\/doi.org\/10.1016\/j.comnet.2018.02.028","journal-title":"Comput. Netw."},{"issue":"5","key":"5635_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(20)30056-8","volume":"2020","author":"M Amer","year":"2020","unstructured":"Amer, M., Ouahidi, B.E.: Hybrid intrusion detection system using machine learning. Netw. Secur. 2020(5), 8\u201319 (2020). https:\/\/doi.org\/10.1016\/S1353-4858(20)30056-8","journal-title":"Netw. Secur."},{"key":"5635_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5557577","volume":"2021","author":"S Moualla","year":"2021","unstructured":"Moualla, S., Khorzom, K., Jafar, A.: Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput. Intell. Neurosci. 2021, 1\u201313 (2021). https:\/\/doi.org\/10.1155\/2021\/5557577","journal-title":"Comput. Intell. Neurosci."},{"key":"5635_CR7","doi-asserted-by":"publisher","first-page":"71414","DOI":"10.1109\/ACCESS.2022.3186975","volume":"10","author":"R Zhao","year":"2022","unstructured":"Zhao, R., Mu, Y., Zou, L., Wen, X.: A hybrid intrusion detection system based on feature selection and weighted stacking classifier. IEEE Access 10, 71414\u201371426 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3186975","journal-title":"IEEE Access"},{"key":"5635_CR8","doi-asserted-by":"publisher","unstructured":"Aljamal, I., Tekeo\u011flu, A., Bekiroglu, K., Sengupta, S.: Hybrid intrusion detection system using machine learning techniques in cloud computing environments. In: Proc. IEEE SERA, pp. 84\u201389 (2019). https:\/\/doi.org\/10.1109\/SERA.2019.8886794","DOI":"10.1109\/SERA.2019.8886794"},{"key":"5635_CR9","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/s40537-021-00531-w","volume":"8","author":"AA Megantara","year":"2021","unstructured":"Megantara, A.A., Ahmad, T.: A hybrid machine learning method for increasing the performance of network intrusion detection systems. J. Big Data 8, 142 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00531-w","journal-title":"J. Big Data"},{"key":"5635_CR10","unstructured":"SEQRITE: India Cyber Threat Report 2023. (Accessed on 26 Aug 2024). https:\/\/www.dsci.in\/resource\/content\/india-cyber-threat-report-2023"},{"key":"5635_CR11","doi-asserted-by":"publisher","unstructured":"Kaaniche, N., Boudguiga, A., Granadillo, G.G.: Efficient hybrid model for intrusion detection systems. In: Proc. ICISSP, pp. 694\u2013700 (2022). https:\/\/doi.org\/10.5220\/0011328300003283","DOI":"10.5220\/0011328300003283"},{"key":"5635_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s11277-024-10880-3","volume":"134","author":"C Gupta","year":"2024","unstructured":"Gupta, C., Kumar, A., Jain, N.K.: An enhanced hybrid intrusion detection based on crow search analysis optimizations and artificial neural network. Wireless Pers. Commun. 134, 43\u201368 (2024). https:\/\/doi.org\/10.1007\/s11277-024-10880-3","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10852-z","author":"A Suresh","year":"2024","unstructured":"Suresh, A., Dwarakanath, B., Nanda, A.K., et al.: An evolutionary computation-based federated learning for host intrusion detection in real-time traffic analysis. Wireless Pers. Commun. (2024). https:\/\/doi.org\/10.1007\/s11277-023-10852-z","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR14","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1007\/s11277-022-10030-7","volume":"128","author":"KG Maheswari","year":"2023","unstructured":"Maheswari, K.G., Siva, C., Nalini Priya, G.: An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments. Wireless Pers. Commun. 128, 2011\u20132037 (2023). https:\/\/doi.org\/10.1007\/s11277-022-10030-7","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10846-x","author":"AS Alqahtani","year":"2024","unstructured":"Alqahtani, A.S.: Deep convolutional neural network for active intrusion detection and protect data from passive intrusion by pascal triangle. Wireless Pers. Commun. (2024). https:\/\/doi.org\/10.1007\/s11277-023-10846-x","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR16","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1007\/s11277-023-10687-8","volume":"132","author":"R Gangula","year":"2023","unstructured":"Gangula, R., Vutukuru, M.M., Kumar, M.R.: Intrusion attack detection using firefly optimization algorithm and ensemble classification model. Wireless Pers. Commun. 132, 1899\u20131916 (2023). https:\/\/doi.org\/10.1007\/s11277-023-10687-8","journal-title":"Wireless Pers. Commun."},{"key":"5635_CR17","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11277-021-08655-1","volume":"121","author":"N Mohd","year":"2021","unstructured":"Mohd, N., Singh, A., Bhadauria, H.S.: Intrusion detection system based on hybrid hierarchical classifiers. Wireless Pers. Commun. 121, 659\u2013686 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08655-1","journal-title":"Wireless Pers. Commun."},{"issue":"8","key":"5635_CR18","first-page":"427","volume":"20","author":"G Kocher","year":"2022","unstructured":"Kocher, G., Kumar, G.: Neural network-based hybrid feature extraction method for network intrusion detection systems. NeuroQuantology 20(8), 427\u2013444 (2022)","journal-title":"NeuroQuantology"},{"key":"5635_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4076","volume":"32","author":"BS Bhati","year":"2021","unstructured":"Bhati, B.S., Chugh, G., Al-Turjman, F., Bhati, N.S.: An improved ensemble based intrusion detection technique using XGBoost. Trans. Emerg. Telecommun. Technol. 32, e4076 (2021). https:\/\/doi.org\/10.1002\/ett.4076","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"Part B","key":"5635_CR20","doi-asserted-by":"publisher","first-page":"108447","DOI":"10.1016\/j.compeleceng.2022.108447","volume":"104","author":"H Alqahtani","year":"2022","unstructured":"Alqahtani, H., Kumar, G.: A deep learning-based intrusion detection system for in-vehicle networks. Comput. Electr. Eng. 104(Part B), 108447 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108447","journal-title":"Comput. Electr. Eng."},{"key":"5635_CR21","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10462-010-9179-5","volume":"34","author":"G Kumar","year":"2010","unstructured":"Kumar, G., Saluja, K., Sachdeva, M.: The use of artificial intelligence based techniques for intrusion detection - a review. Artif. Intell. Rev. 34, 369\u2013387 (2010). https:\/\/doi.org\/10.1007\/s10462-010-9179-5","journal-title":"Artif. Intell. Rev."},{"issue":"15","key":"5635_CR22","doi-asserted-by":"publisher","first-page":"9731","DOI":"10.1007\/s00500-021-05893-0","volume":"25","author":"G Kocher","year":"2021","unstructured":"Kocher, G., Kumar, G.: Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft. Comput. 25(15), 9731\u20139763 (2021). https:\/\/doi.org\/10.1007\/s00500-021-05893-0","journal-title":"Soft. Comput."},{"issue":"1","key":"5635_CR23","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11227-019-03035-w","volume":"76","author":"G Kumar","year":"2020","unstructured":"Kumar, G.: An improved ensemble approach for effective intrusion detection. J. Supercomput. 76(1), 275\u2013291 (2020). https:\/\/doi.org\/10.1007\/s11227-019-03035-w","journal-title":"J. Supercomput."},{"issue":"4","key":"5635_CR24","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1007\/s13369-019-03970-z","volume":"45","author":"B Bhati","year":"2020","unstructured":"Bhati, B., Rai, C.: Analysis of support vector machine-based intrusion detection techniques. Arab. J. Sci. Eng. 45(4), 2371\u20132383 (2020). https:\/\/doi.org\/10.1007\/s13369-019-03970-z","journal-title":"Arab. J. Sci. Eng."},{"key":"5635_CR25","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.procs.2021.06.066","volume":"190","author":"M Artur","year":"2021","unstructured":"Artur, M.: Review the performance of the bernoulli na\u00efve bayes classifier in intrusion detection systems using recursive feature elimination with cross-validated selection of the best number of features. Procedia Comput. Sci. 190, 564\u2013570 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"5635_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104308","volume":"151","author":"LK Vashishtha","year":"2025","unstructured":"Vashishtha, L.K., Chatterjee, K.: Strengthening cybersecurity: testCloudIDS dataset and sparkShield algorithm for robust threat detection. Comput. Secur. 151, 104308 (2025). https:\/\/doi.org\/10.1016\/j.cose.2024.104308","journal-title":"Comput. Secur."},{"issue":"19","key":"5635_CR27","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.S.M.: Analysis of TON-IoT, UNSW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT. Appl. Sci. 12(19), 9572 (2022). https:\/\/doi.org\/10.3390\/app12199572","journal-title":"Appl. Sci."},{"issue":"6","key":"5635_CR28","doi-asserted-by":"publisher","first-page":"3828","DOI":"10.3390\/app13063828","volume":"13","author":"H Elubeyd","year":"2023","unstructured":"Elubeyd, H., Yiltas-Kaplan, D.: Hybrid deep learning approach for automatic DoS\/DDoS attacks detection in software-defined networks. Appl. Sci. 13(6), 3828 (2023). https:\/\/doi.org\/10.3390\/app13063828","journal-title":"Appl. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05635-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05635-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05635-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:06:16Z","timestamp":1764237976000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05635-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":28,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5635"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05635-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"16 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"928"}}