{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T09:11:00Z","timestamp":1779354660734,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T00:00:00Z","timestamp":1776643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T00:00:00Z","timestamp":1776643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10878-025-01388-y","type":"journal-article","created":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T06:53:37Z","timestamp":1776668017000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IoT botnet attack detection using ensemble classifiers with optimal training"],"prefix":"10.1007","volume":"51","author":[{"given":"Shankar","family":"Vuppu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V. Chandra Shekhar","family":"Rao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Sujatha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaik","family":"Munawar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Nagaraju","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Gayatri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,4,20]]},"reference":[{"key":"1388_CR1","first-page":"301224","volume":"38","author":"SG Abbas","year":"2021","unstructured":"Abbas SG, Hashmat F, Shah GA, Zafar K (2021) Generic signature development for IoT botnet families. Forensic Sci Int Digit Investig 38:301224","journal-title":"Forensic Sci Int Digit Investig"},{"issue":"7","key":"1388_CR2","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.1007\/s12652-019-01387-y","volume":"11","author":"A Al Shorman","year":"2020","unstructured":"Al Shorman A, Faris H, Aljarah I (2020) Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. J Ambient Intell Humaniz Comput 11(7):2809\u20132825","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1388_CR3","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s00500-018-3102-4","volume":"23","author":"S Arora","year":"2019","unstructured":"Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23:715\u2013734","journal-title":"Soft Comput"},{"issue":"12","key":"1388_CR4","doi-asserted-by":"publisher","first-page":"5547","DOI":"10.1007\/s12652-021-03185-x","volume":"13","author":"M Asadi","year":"2022","unstructured":"Asadi M (2022) Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches. J Ambient Intell Humaniz Comput 13(12):5547\u20135561","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1388_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2020.01.055","volume":"107","author":"M Asadi","year":"2020","unstructured":"Asadi M, Jamali MAJ, Parsa S, Majidnezhad V (2020) Detecting botnet by using particle swarm optimization algorithm based on voting system. Future Gener Comput Syst 107:95\u2013111","journal-title":"Future Gener Comput Syst"},{"key":"1388_CR6","doi-asserted-by":"publisher","first-page":"103041","DOI":"10.1016\/j.scs.2021.103041","volume":"72","author":"J Ashraf","year":"2021","unstructured":"Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi AD, Mostafa RR (2021) IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cities Soc 72:103041","journal-title":"Sustain Cities Soc"},{"issue":"2","key":"1388_CR7","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1002\/ima.22087","volume":"24","author":"MM Beno","year":"2014","unstructured":"Beno MM, I. R V, S. M S, Rajakumar BR (2014) Threshold prediction for segmenting tumour from brain MRI scans. Int J Imaging Syst Technol 24(2):129\u2013137","journal-title":"Int J Imaging Syst Technol"},{"key":"1388_CR8","doi-asserted-by":"crossref","unstructured":"Cai M, Shi Y, and Liu J (2013) Deep maxout neural networks for speech recognition. In: 2013 IEEE Workshop on Automatic Speech Recognition and Understanding (pp. 291\u2013296). IEEE","DOI":"10.1109\/ASRU.2013.6707745"},{"issue":"5","key":"1388_CR9","first-page":"2164","volume":"18","author":"K Doshi","year":"2021","unstructured":"Doshi K, Yilmaz Y, Uludag S (2021) Timely detection and mitigation of stealthy DDoS attacks via IoT networks. IEEE Trans Dependable Secure Comput 18(5):2164\u20132176","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1388_CR10","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.future.2020.09.004","volume":"115","author":"JTM Garre","year":"2021","unstructured":"Garre JTM, P\u00e9rez MG, Ruiz-Mart\u00ednez A (2021) A novel machine learning-based approach for the detection of SSH botnet infection. Future Gener Comput Syst 115:387\u2013396","journal-title":"Future Gener Comput Syst"},{"key":"1388_CR11","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s10489-020-01893-z","volume":"51","author":"FA Hashim","year":"2021","unstructured":"Hashim FA, Hussain K, Houssein EH, Mabrouk MS, Al-Atabany W (2021) Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl Intell 51:1531\u20131551","journal-title":"Appl Intell"},{"issue":"9","key":"1388_CR12","doi-asserted-by":"publisher","first-page":"13369","DOI":"10.1007\/s11042-022-13836-6","volume":"82","author":"F Hosseini","year":"2023","unstructured":"Hosseini F, Gharehchopogh FS, Masdari M (2023) MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT. Multimed Tools Appl 82(9):13369\u201313399","journal-title":"Multimed Tools Appl"},{"key":"1388_CR13","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Mutual_information"},{"key":"1388_CR14","unstructured":"https:\/\/machinelearningmastery.com\/information-gain-and-mutual-information\/"},{"key":"1388_CR15","unstructured":"https:\/\/quantdare.com\/what-is-mutual-information\/"},{"key":"1388_CR16","unstructured":"https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset"},{"key":"1388_CR17","unstructured":"https:\/\/stats.stackexchange.com\/questions\/7757\/data-normalization-and-standardization-in-neural-networks."},{"key":"1388_CR18","unstructured":"https:\/\/www.javatpoint.com\/entropy-in-machine-learning"},{"key":"1388_CR19","unstructured":"https:\/\/www.kaggle.com\/datasets\/solarmainframe\/ids-intrusion-csv"},{"key":"1388_CR20","doi-asserted-by":"publisher","first-page":"109140","DOI":"10.1016\/j.measurement.2021.109140","volume":"176","author":"S Jagadeesan","year":"2021","unstructured":"Jagadeesan S, Amutha B (2021) An efficient botnet detection with the enhanced support vector neural network. Measurement 176:109140","journal-title":"Measurement"},{"issue":"10","key":"1388_CR21","doi-asserted-by":"publisher","first-page":"9552","DOI":"10.1109\/JIOT.2020.2993782","volume":"7","author":"Y Jia","year":"2020","unstructured":"Jia Y, Zhong F, Alrawais A, Gong B, Cheng X (2020) Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J 7(10):9552\u20139562","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"1388_CR22","doi-asserted-by":"publisher","first-page":"6872","DOI":"10.1016\/j.jksuci.2021.06.018","volume":"34","author":"C Joshi","year":"2022","unstructured":"Joshi C, Ranjan RK, Bharti V (2022) A fuzzy logic based feature engineering approach for botnet detection using ANN. J King Saud Univ Comput Inf Sci 34(9):6872\u20136882","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1388_CR23","doi-asserted-by":"publisher","DOI":"10.1142\/s021946782550007x","author":"A Kayyidavazhiyil","year":"2023","unstructured":"Kayyidavazhiyil A (2023) Combined tri-classifiers for IoT botnet detection with tuned training weights. Int J Image Graph. https:\/\/doi.org\/10.1142\/s021946782550007x","journal-title":"Int J Image Graph"},{"key":"1388_CR24","doi-asserted-by":"publisher","first-page":"11743","DOI":"10.1109\/ACCESS.2019.2959047","volume":"8","author":"AY Khan","year":"2019","unstructured":"Khan AY, Latif R, Latif S, Tahir S, Batool G, Saba T (2019) Malicious insider attack detection in IoTs using data analytics. IEEE Access 8:11743\u201311753","journal-title":"IEEE Access"},{"issue":"19","key":"1388_CR25","doi-asserted-by":"publisher","first-page":"13725","DOI":"10.1007\/s00521-022-06934-x","volume":"35","author":"Y Li","year":"2023","unstructured":"Li Y, Zhu M, Luo X, Yin L, Fu Y (2023) A privacy-preserving botnet detection approach in largescale cooperative IoT environment. Neural Comput Appl 35(19):13725\u201313737","journal-title":"Neural Comput Appl"},{"key":"1388_CR26","doi-asserted-by":"publisher","first-page":"106934","DOI":"10.1109\/ACCESS.2023.3319814","volume":"11","author":"J Manokaran","year":"2023","unstructured":"Manokaran J, Vairavel G (2023) Igwo-soe: improved grey wolf optimization based stack of ensemble learning algorithm for anomaly detection in internet of things edge computing. IEEE Access 11:106934\u2013106953","journal-title":"IEEE Access"},{"issue":"5","key":"1388_CR27","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s10207-019-00475-6","volume":"19","author":"HT Nguyen","year":"2020","unstructured":"Nguyen HT, Ngo QD, Le VH (2020a) A novel graph-based approach for IoT botnet detection. Int J Inf Secur 19(5):567\u2013577","journal-title":"Int J Inf Secur"},{"issue":"2","key":"1388_CR28","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.icte.2019.12.001","volume":"6","author":"HT Nguyen","year":"2020","unstructured":"Nguyen HT, Ngo QD, Nguyen DH, Le VH (2020b) PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express 6(2):128\u2013138","journal-title":"ICT Express"},{"key":"1388_CR29","doi-asserted-by":"publisher","first-page":"91038","DOI":"10.1109\/ACCESS.2021.3092054","volume":"9","author":"M Panda","year":"2021","unstructured":"Panda M, Abd Allah AM, Hassanien AE (2021) Developing an efficient feature engineering and machine learning model for detecting IoT-botnet cyber attacks. IEEE Access 9:91038\u201391052","journal-title":"IEEE Access"},{"issue":"6","key":"1388_CR30","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","volume":"8","author":"SI Popoola","year":"2020","unstructured":"Popoola SI, Adebisi B, Hammoudeh M, Gui G, Gacanin H (2020) Hybrid deep learning for botnet attack detection in the internet-of-things networks. IEEE Internet Things J 8(6):4944\u20134956","journal-title":"IEEE Internet Things J"},{"key":"1388_CR31","doi-asserted-by":"publisher","first-page":"107039","DOI":"10.1016\/j.compeleceng.2021.107039","volume":"92","author":"SI Popoola","year":"2021","unstructured":"Popoola SI, Adebisi B, Hammoudeh M, Gacanin H, Gui G (2021) Stacked recurrent neural network for botnet detection in smart homes. Comput Electr Eng 92:107039","journal-title":"Comput Electr Eng"},{"key":"1388_CR32","doi-asserted-by":"publisher","first-page":"164200","DOI":"10.1109\/ACCESS.2020.3022272","volume":"8","author":"SM Sajjad","year":"2020","unstructured":"Sajjad SM, Yousaf M, Afzal H, Mufti MR (2020) eMUD: enhanced manufacturer usage description for IoT botnets prevention on home WiFi routers. IEEE Access 8:164200\u2013164213","journal-title":"IEEE Access"},{"key":"1388_CR33","doi-asserted-by":"publisher","first-page":"107859","DOI":"10.1016\/j.asoc.2021.107859","volume":"113","author":"MM Salim","year":"2021","unstructured":"Salim MM, Singh SK, Park JH (2021) Securing smart cities using LSTM algorithm and lightweight containers against botnet attacks. Appl Soft Comput 113:107859","journal-title":"Appl Soft Comput"},{"key":"1388_CR34","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.future.2020.02.017","volume":"107","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Gener Comput Syst 107:433\u2013442","journal-title":"Future Gener Comput Syst"},{"key":"1388_CR35","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2021.05.076","volume":"574","author":"Z Shao","year":"2021","unstructured":"Shao Z, Yuan S, Wang Y (2021) Adaptive online learning for IoT botnet detection. Inf Sci 574:84\u201395","journal-title":"Inf Sci"},{"issue":"3","key":"1388_CR36","first-page":"1","volume":"2","author":"J Shareena","year":"2021","unstructured":"Shareena J, Ramdas A, Ap H (2021) Intrusion detection system for IoT botnet attacks using deep learning. SN Comput Sci 2(3):1\u20138","journal-title":"SN Comput Sci"},{"issue":"21","key":"1388_CR37","doi-asserted-by":"publisher","first-page":"16605","DOI":"10.1007\/s00500-020-04963-z","volume":"24","author":"WC Shi","year":"2020","unstructured":"Shi WC, Sun HM (2020) DeepBot: a time-based botnet detection with deep learning. Soft Comput 24(21):16605\u201316616","journal-title":"Soft Comput"},{"issue":"1","key":"1388_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00354-022-00158-2","volume":"40","author":"AK Shukla","year":"2022","unstructured":"Shukla AK, Dwivedi S (2022) Discovery of botnet activities in internet-of-things system using dynamic evolutionary mechanism. New Gener Comput 40(1):255\u2013283","journal-title":"New Gener Comput"},{"key":"1388_CR39","doi-asserted-by":"crossref","unstructured":"Sriram S, Vinayakumar R A V I, Alazab M, and Soman K P (2020) Network flow based IoT botnet attack detection using deep learning. In\u00a0IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 189\u2013194). IEEE","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162668"},{"key":"1388_CR40","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jpdc.2019.08.013","volume":"134","author":"N Tariq","year":"2019","unstructured":"Tariq N, Asim M, Maamar Z, Farooqi MZ, Faci N, Baker T (2019) A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT. J Parallel Distrib Comput 134:198\u2013206","journal-title":"J Parallel Distrib Comput"},{"issue":"6","key":"1388_CR41","doi-asserted-by":"publisher","first-page":"6164","DOI":"10.1109\/JSEN.2022.3148431","volume":"22","author":"L Tong","year":"2022","unstructured":"Tong L, Ma H, Lin Q, He J, Peng L (2022) A novel deep learning Bi-GRU-I model for real-time human activity recognition using inertial sensors. IEEE Sens J 22(6):6164\u20136174","journal-title":"IEEE Sens J"},{"issue":"2","key":"1388_CR42","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s12065-019-00310-w","volume":"13","author":"TA Tuan","year":"2020","unstructured":"Tuan TA, Long HV, Son LH, Kumar R, Priyadarshini I, Son NTK (2020) Performance evaluation of botnet DDoS attack detection using machine learning. Evol Intell 13(2):283\u2013294","journal-title":"Evol Intell"},{"key":"1388_CR43","doi-asserted-by":"publisher","first-page":"107335","DOI":"10.1109\/ACCESS.2020.3000476","volume":"8","author":"L Vu","year":"2020","unstructured":"Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E (2020) Deep transfer learning for IoT attack detection. IEEE Access 8:107335\u2013107344","journal-title":"IEEE Access"},{"issue":"2","key":"1388_CR44","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1109\/TII.2019.2940742","volume":"16","author":"L Yin","year":"2019","unstructured":"Yin L, Luo X, Zhu C, Wang L, Xu Z, Lu H (2019) ConnSpoiler: disrupting C&C communication of IoT-based botnet through fast detection of anomalous domain queries. IEEE Trans Ind Inform 16(2):1373\u20131384","journal-title":"IEEE Trans Ind Inform"},{"key":"1388_CR45","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.neucom.2019.04.099","volume":"390","author":"X Zhou","year":"2020","unstructured":"Zhou X, Lin J, Zhang Z, Shao Z, Chen S, Liu H (2020) Improved itracker combined with bidirectional long short-term memory for 3D gaze estimation using appearance cues. Neurocomputing 390:217\u2013225","journal-title":"Neurocomputing"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-025-01388-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-025-01388-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-025-01388-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T08:42:57Z","timestamp":1779352977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-025-01388-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,20]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["1388"],"URL":"https:\/\/doi.org\/10.1007\/s10878-025-01388-y","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,20]]},"assertion":[{"value":"21 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"41"}}