{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:33:42Z","timestamp":1773902022797,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10723-021-09581-z","type":"journal-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T15:09:48Z","timestamp":1635606588000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach"],"prefix":"10.1007","volume":"19","author":[{"given":"Mahzad","family":"Mahdavisharif","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Jamali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1848-0220","authenticated-orcid":false,"given":"Reza","family":"Fotohi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"9581_CR1","unstructured":"Padmasiri, M. A. T., Ganepola, V. V. V., Herath, R. K. H. M.S.D, Welagedara, L. P., & Vekneswaran, P. (2020). Survey on Deep learning based Network Intrusion Detection and Prevention Systems"},{"key":"9581_CR2","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.comnet.2018.01.016","volume":"132","author":"MS Hadi","year":"2018","unstructured":"Hadi, M.S., Lawey, A.Q., El-Gorashi, T.E., Elmirghani, J.M.: Big data analytics for wireless and wired network design: a survey. Comput. Netw. 132, 180\u2013199 (2018)","journal-title":"Comput. Netw."},{"issue":"5","key":"9581_CR3","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s12559-018-9564-y","volume":"10","author":"BG Atli","year":"2018","unstructured":"Atli, B.G., Miche, Y., Kalliola, A., Oliver, I., Holtmanns, S., Lendasse, A.: Anomaly-based intrusion detection using extreme learning machine and aggregation of network traffic statistics in probability space. Cogn. Comput. 10(5), 848\u2013863 (2018)","journal-title":"Cogn. Comput."},{"key":"9581_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"WC Lin","year":"2015","unstructured":"Lin, W.C., Ke, S.W., Tsai, C.F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl.-Based Syst. 78, 13\u201321 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"9581_CR5","first-page":"25","volume":"3","author":"J Jha","year":"2013","unstructured":"Jha, J., Ragha, L.: Intrusion detection system using support vector machine. International Journal of Applied Information Systems (IJAIS). 3, 25\u201330 (2013)","journal-title":"International Journal of Applied Information Systems (IJAIS)"},{"key":"9581_CR6","doi-asserted-by":"crossref","unstructured":"Labonne, M., Olivereau, A., Polv\u00e9, B., & Zeghlache, D. (2019, January). A cascade-structured meta-specialists approach for neural network-based intrusion detection. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1-6). IEEE","DOI":"10.1109\/CCNC.2019.8651856"},{"key":"9581_CR7","doi-asserted-by":"crossref","unstructured":"Man, J., & Sun, G. (2021). A Residual Learning-Based Network Intrusion Detection System. Security and Communication Networks, 2021","DOI":"10.1155\/2021\/5593435"},{"key":"9581_CR8","doi-asserted-by":"crossref","unstructured":"Kannari, P. R., Shariff, N. C., & Biradar, R. L. (2021). Network intrusion detection using sparse autoencoder with swish-PReLU activation model. Journal of ambient intelligence and humanized computing, 1-13","DOI":"10.1007\/s12652-021-03077-0"},{"key":"9581_CR9","doi-asserted-by":"publisher","first-page":"107049","DOI":"10.1016\/j.compeleceng.2021.107049","volume":"91","author":"J Ling","year":"2021","unstructured":"Ling, J., Zhu, Z., Luo, Y., Wang, H.: An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit. Computers & Electrical Engineering. 91, 107049 (2021)","journal-title":"Computers & Electrical Engineering"},{"key":"9581_CR10","doi-asserted-by":"publisher","first-page":"39229","DOI":"10.1109\/ACCESS.2021.3064561","volume":"9","author":"J Yang","year":"2021","unstructured":"Yang, J., Lim, H.: Deep learning approach for detecting malicious activities over encrypted secure channels. IEEE Access. 9, 39229\u201339244 (2021)","journal-title":"IEEE Access"},{"key":"9581_CR11","unstructured":"Yan, S.: Understanding LSTM and its diagrams, ML review. https:\/\/blog.mlreview.com\/understanding-lstm-and-its-diagrams-37e2f46f1714 (2016)"},{"key":"9581_CR12","unstructured":"Dai, J. J., Wang, Y., Qiu, X., Ding, D., Zhang, Y., Wang, Y., ... Song, G.: Bigdl: A distributed deep learning framework for big data. In Proceedings of the ACM Symposium on Cloud Computing, pp. 50\u201360"},{"key":"9581_CR13","unstructured":"Mishra, M., Kang, M., Woo, J.: Rating Prediction using Deep Learning and Spark. In The 11th International Conference on Internet (ICONI 2019), pp307\u2013310. (2019)"},{"key":"9581_CR14","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 5, 21954\u201321961 (2017)","journal-title":"Ieee Access"},{"key":"9581_CR15","doi-asserted-by":"crossref","unstructured":"Yu, Y., Long, J., & Cai, Z. (2017). Network intrusion detection through stacking dilated convolutional autoencoders. Security and Communication Networks, 2017","DOI":"10.1155\/2017\/4184196"},{"key":"9581_CR16","unstructured":"Putchala, Manoj Kumar. \"Deep learning approach for intrusion detection system (ids) in the internet of things (iot) network using gated recurrent neural networks (gru).\" (2017)"},{"key":"9581_CR17","unstructured":"Kim, J., Shin, N., Jo, S. Y., & Kim, S. H. (2017, February). Method of intrusion detection using deep neural network. In 2017 IEEE international conference on big data and smart computing (BigComp) (pp. 313-316). IEEE"},{"key":"9581_CR18","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Mazel, J., & Fukuda, K. (2014). Hashdoop: a MapReduce framework for network anomaly detection. In 2014 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 494-499). IEEE","DOI":"10.1109\/INFCOMW.2014.6849281"},{"key":"9581_CR19","doi-asserted-by":"crossref","unstructured":"Bachupally, Y. R., Yuan, X., & Roy, K. (2016). Network security analysis using big data technology. In SoutheastCon 2016 (pp. 1-4). IEEE","DOI":"10.1109\/SECON.2016.7506686"},{"issue":"2","key":"9581_CR20","first-page":"22","volume":"13","author":"MD Holtz","year":"2011","unstructured":"Holtz, M.D., David, B., de Sousa J\u00fanior, R.T.: Building scalable distributed intrusion detection systems based on the mapreduce framework. Telecomunicacoes (Santa Rita do Sapucai). 13(2), 22\u201331 (2011)","journal-title":"Telecomunicacoes (Santa Rita do Sapucai)"},{"key":"9581_CR21","doi-asserted-by":"crossref","unstructured":"Sharma, R., Sharma, P., Mishra, P., & Pilli, E. S. (2016). Towards MapReduce based classification approaches for intrusion detection. In 2016 6th international conference-cloud system and big data engineering (confluence) (pp. 361-367). IEEE","DOI":"10.1109\/CONFLUENCE.2016.7508144"},{"key":"9581_CR22","doi-asserted-by":"crossref","unstructured":"Elayni, M., & Jemili, F. (2017, June). Using mongodb databases for training and combining intrusion detection datasets. In international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing (pp. 17-29). Springer, Cham","DOI":"10.1007\/978-3-319-62048-0_2"},{"key":"9581_CR23","doi-asserted-by":"crossref","unstructured":"Kulariya, M., P. Saraf, R. Ranjan and G. P. Gupta (2016). Performance analysis of network intrusion detection schemes using apache spark. Communication and signal processing (ICCSP), 2016 international conference on, IEEE","DOI":"10.1109\/ICCSP.2016.7754517"},{"issue":"3","key":"9581_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.26599\/BDMA.2020.9020003","volume":"3","author":"W Zhong","year":"2020","unstructured":"Zhong, W., Yu, N., Ai, C.: Applying big data based deep learning system to intrusion detection. Big Data Mining and Analytics. 3(3), 181\u2013195 (2020)","journal-title":"Big Data Mining and Analytics"},{"issue":"1","key":"9581_CR25","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE transactions on emerging topics in computational intelligence. 2(1), 41\u201350 (2018)","journal-title":"IEEE transactions on emerging topics in computational intelligence"},{"key":"9581_CR26","doi-asserted-by":"crossref","unstructured":"Li, Z., Qin, Z., Huang, K., Yang, X., & Ye, S. (2017). Intrusion detection using convolutional neural networks for representation learning. In international conference on neural information processing (pp. 858-866). Springer, Cham","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"9581_CR27","doi-asserted-by":"crossref","unstructured":"Gouveia, A., & Correia, M. (2017, June). A systematic approach for the application of restricted Boltzmann machines in network intrusion detection. In international work-conference on artificial neural networks (pp. 432-446). Springer, Cham","DOI":"10.1007\/978-3-319-59153-7_38"},{"key":"9581_CR28","doi-asserted-by":"crossref","unstructured":"Althubiti, S. A., Jones, E. M., & Roy, K. (2018, November). Lstm for anomaly-based network intrusion detection. In 2018 28th international telecommunication networks and applications conference (ITNAC) (pp. 1-3). IEEE","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"9581_CR29","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016, February). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 international conference on platform technology and service (PlatCon) (pp. 1-5). IEEE","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"9581_CR30","doi-asserted-by":"crossref","unstructured":"Boukhalfa, A., Abdellaoui, A., Hmina, N., Chaoui, H.: LSTM deep learning method for network intrusion detection system. International Journal of Electrical & Computer Engineering. (2088\u20138708), 10 (2020)","DOI":"10.11591\/ijece.v10i3.pp3315-3322"},{"issue":"1","key":"9581_CR31","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"9581_CR32","doi-asserted-by":"crossref","unstructured":"Zarei, S. M., & Fotohi, R. (2021). Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. Security and Privacy, e152","DOI":"10.1002\/spy2.152"},{"issue":"3","key":"9581_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4693","volume":"34","author":"M Zaminkar","year":"2021","unstructured":"Zaminkar, M., Sarkohaki, F., Fotohi, R.: A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. Int. J. Commun. Syst. 34(3), e4693 (2021)","journal-title":"Int. J. Commun. Syst."},{"key":"9581_CR34","doi-asserted-by":"crossref","unstructured":"Faraji-Biregani, M., & Fotohi, R. (2020). Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles. The journal of supercomputing, 1-28","DOI":"10.20944\/preprints202001.0316.v2"},{"key":"9581_CR35","doi-asserted-by":"crossref","unstructured":"Gupta, A. S. G., Prasad, G. S., & Nayak, S. R. (2019). A New and Secure Intrusion Detecting System for Detection of Anomalies within the Big Data. In Cloud Computing for Geospatial Big Data Analytics (Pp. 177\u2013190). Springer, Cham","DOI":"10.1007\/978-3-030-03359-0_8"},{"key":"9581_CR36","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1007\/s11277-020-07421-z","volume":"114","author":"M Zaminkar","year":"2020","unstructured":"Zaminkar, M., Fotohi, R.: SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel. Pers. Commun. 114, 1287\u20131312 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"9581_CR37","unstructured":"\u00d6zg\u00fcr, A., Erdem, H.: A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints, 4, e1954v1"},{"key":"9581_CR38","doi-asserted-by":"publisher","first-page":"73603","DOI":"10.1109\/ACCESS.2018.2878681","volume":"6","author":"R Atat","year":"2018","unstructured":"Atat, R., Liu, L., Wu, J., Li, G., Ye, C., Yang, Y.: Big data meet cyber-physical systems: a panoramic survey. IEEE Access. 6, 73603\u201373636 (2018)","journal-title":"IEEE Access"},{"key":"9581_CR39","doi-asserted-by":"crossref","unstructured":"Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The journal of supercomputing, 1-26","DOI":"10.1007\/s11227-019-03137-5"},{"key":"9581_CR40","doi-asserted-by":"crossref","unstructured":"Sahani, R., Rout, C., Badajena, J. C., Jena, A. K., & Das, H. (2018). Classification of Intrusion Detection Using Data Mining Techniques. In Progress in Computing, Analytics and Networking (Pp. 753\u2013764). Springer, Singapore","DOI":"10.1007\/978-981-10-7871-2_72"},{"issue":"4","key":"9581_CR41","first-page":"43","volume":"3","author":"J Kim","year":"2015","unstructured":"Kim, J., Kim, J., Kim, H.: An approach to build an efficient intrusion detection classifier. Journal of Platform Technology. 3(4), 43\u201352 (2015)","journal-title":"Journal of Platform Technology"},{"key":"9581_CR42","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, Khaled, and Carla Purdy. \"Toward an online anomaly intrusion detection system based on deep learning.\" 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE, 2016","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"9581_CR43","unstructured":"\" NSL-KDD Datasets Research Canadian Institute for Cybersecurity UNB\". [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html. [Accessed: 26- May- 2021]"},{"issue":"1","key":"9581_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18100\/ijamec.2018138629","volume":"6","author":"F Karata\u015f","year":"2018","unstructured":"Karata\u015f, F., Korkmaz, S.A.: Big data: controlling fraud by using machine learning libraries on spark. International Journal of Applied Mathematics Electronics and Computers. 6(1), 1\u20135 (2018)","journal-title":"International Journal of Applied Mathematics Electronics and Computers"},{"issue":"5","key":"9581_CR45","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1007\/s10766-016-0456-z","volume":"45","author":"P Natesan","year":"2017","unstructured":"Natesan, P., Rajalaxmi, R.R., Gowrison, G., Balasubramanie, P.: Hadoop based parallel binary bat algorithm for network intrusion detection. Int. J. Parallel Prog. 45(5), 1194\u20131213 (2017)","journal-title":"Int. J. Parallel Prog."},{"issue":"1","key":"9581_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0145-4","volume":"5","author":"SM Othman","year":"2018","unstructured":"Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on big data environment. Journal of Big Data. 5(1), 1\u201312 (2018)","journal-title":"Journal of Big Data"},{"key":"9581_CR47","unstructured":"Kulkarni, S. (2017). Design Approaches of Intrusion Detection Systems Using Ensembling Algorithms (Doctoral dissertation, Dublin, National College of Ireland)"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-021-09581-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-021-09581-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-021-09581-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T11:10:16Z","timestamp":1640862616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-021-09581-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,30]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["9581"],"URL":"https:\/\/doi.org\/10.1007\/s10723-021-09581-z","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,30]]},"assertion":[{"value":"25 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"46"}}