{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:34:47Z","timestamp":1761845687293,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T00:00:00Z","timestamp":1677542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T00:00:00Z","timestamp":1677542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62077024"],"award-info":[{"award-number":["62077024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11036-023-02108-8","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T13:02:45Z","timestamp":1677589365000},"page":"839-852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus\/TCP"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6819-7968","authenticated-orcid":false,"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuandong","family":"Min","sequence":"additional","affiliation":[]},{"given":"Sanya","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Yaopeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"2108_CR1","doi-asserted-by":"publisher","unstructured":"Zhang H, Dai S, Li Y, Zhang W (2018) Real-time distributed-random-forest-based network intrusion detection system using apache spark. In: 2018 IEEE 37th international performance computing and communications conference (IPCCC), pp 1\u20137. https:\/\/doi.org\/10.1109\/PCCC.2018.8711068","DOI":"10.1109\/PCCC.2018.8711068"},{"issue":"3","key":"2108_CR2","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3390\/electronics11030494","volume":"11","author":"MH Ali","year":"2022","unstructured":"Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Dama\u0161evi\u010dius R, Bahaj SA (2022) Threat analysis and distributed denial of service (ddos) attack recognition in the internet of things (iot). Electronics 11(3):494","journal-title":"Electronics"},{"issue":"9","key":"2108_CR3","first-page":"2","volume":"3","author":"A Javaid","year":"2016","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. Eai Endorsed Trans Secur Saf 3(9):2","journal-title":"Eai Endorsed Trans Secur Saf"},{"key":"2108_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-019-00675-z","volume":"23","author":"H Zhang","year":"2020","unstructured":"Zhang H, Zhang W, Lv Z, Kumar A, Huang T, Chilamkurti N (2020) Maldc: a depth detection method for malware based on behavior chains. World Wide Web 23:1\u201320. https:\/\/doi.org\/10.1007\/s11280-019-00675-z","journal-title":"World Wide Web"},{"key":"2108_CR5","doi-asserted-by":"crossref","unstructured":"Hidayat I, Ali MZ, Arshad A (2022) Machine learning based intrusion detection system: an experimental comparison. J Comput Cogn Eng","DOI":"10.47852\/bonviewJCCE2202270"},{"key":"2108_CR6","doi-asserted-by":"crossref","unstructured":"Luswata J, Zavarsky P, Swar B, Zvabva D (2018) Analysis of scada security using penetration testing: a case study on modbus tcp protocol. In: 2018 29th biennial symposium on communications (BSC). IEEE, pp 1\u20135","DOI":"10.1109\/BSC.2018.8494686"},{"key":"2108_CR7","doi-asserted-by":"crossref","unstructured":"Das S, Namasudra S (2022) Multi-authority cp-abe-based access control model for iot-enabled healthcare infrastructure. IEEE Trans Ind Informatics","DOI":"10.1109\/TII.2022.3167842"},{"key":"2108_CR8","unstructured":"Bhatia S, Kush NS, Djamaludin C, Akande AJ, Foo E (2014) Practical modbus flooding attack and detection. In: Proceedings of the 12th australasian information security conference (AISC 2014)[Conferences in Research and Practice in Information Technology, vol 149]. Australian Computer Society, pp 57\u201365"},{"key":"2108_CR9","doi-asserted-by":"crossref","unstructured":"Fovino IN, Carcano A, Masera M, Trombetta A (2009) Design and implementation of a secure modbus protocol. In: Palmer C, Shenoi S (eds) Critical Infrastructure Protection III. Springer, pp 83\u201396","DOI":"10.1007\/978-3-642-04798-5_6"},{"issue":"4","key":"2108_CR10","doi-asserted-by":"publisher","first-page":"2628","DOI":"10.1109\/TPWRD.2008.2002942","volume":"23","author":"G-Y Liao","year":"2008","unstructured":"Liao G-Y, Chen Y-J, Lu W-C, Cheng T-C (2008) Toward authenticating the master in the modbus protocol. IEEE Trans Power Deliv 23(4):2628\u20132629. https:\/\/doi.org\/10.1109\/TPWRD.2008.2002942","journal-title":"IEEE Trans Power Deliv"},{"key":"2108_CR11","doi-asserted-by":"crossref","unstructured":"Morris TH, Jones BA, Vaughn RB, Dandass YS (2013) Deterministic intrusion detection rules for modbus protocols. In: 2013 46th Hawaii international conference on system sciences. IEEE, pp 1773\u20131781","DOI":"10.1109\/HICSS.2013.174"},{"key":"2108_CR12","doi-asserted-by":"crossref","unstructured":"Li S-C, Huang Y, Tai B-C, Lin C-T (2017) Using data mining methods to detect simulated intrusions on a modbus network. In: 2017 IEEE 7th international symposium on cloud and service computing (SC2). IEEE, pp 143\u2013148","DOI":"10.1109\/SC2.2017.29"},{"key":"2108_CR13","doi-asserted-by":"crossref","unstructured":"Radoglou-Grammatikis P, Siniosoglou I, Liatifis T, Kourouniadis A, Rompolos K, Sarigiannidis P (2020) Implementation and detection of modbus cyberattacks. In: 2020 9th international conference on modern circuits and systems technologies (MOCAST). IEEE, pp 1\u20134","DOI":"10.1109\/MOCAST49295.2020.9200287"},{"key":"2108_CR14","unstructured":"El Safadi A, Flaus J-M (2018) A deep learning approach for intrusion detection system in industry network. In: The first international conference on big data and cybersecurity intelligence"},{"issue":"2","key":"2108_CR15","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TNSM.2021.3078381","volume":"18","author":"I Siniosoglou","year":"2021","unstructured":"Siniosoglou I, Radoglou-Grammatikis P, Efstathopoulos G, Fouliras P, Sarigiannidis P (2021) A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans Netw Serv Manag 18(2):1137\u20131151","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2108_CR16","doi-asserted-by":"crossref","unstructured":"Namasudra S, Crespo RG, Kumar S (2022) Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec). Elsevier","DOI":"10.1016\/j.compeleceng.2022.108048"},{"key":"2108_CR17","doi-asserted-by":"crossref","unstructured":"Jinhui W (2019) The current main distributed denial of service and defence methods. In: 2019 12th international conference on intelligent computation technology and automation (ITA), pp 351\u2013355","DOI":"10.1109\/ICICTA49267.2019.00081"},{"key":"2108_CR18","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 international carnahan conference on security technology (ICCST). IEEE, pp 1\u20138","DOI":"10.1109\/CCST.2019.8888419"},{"key":"2108_CR19","doi-asserted-by":"publisher","first-page":"114520","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil AE, Yildiz K, Buldu A (2021) Detection of ddos attacks with feed forward based deep neural network model. Expert Syst Appl 169:114520","journal-title":"Expert Syst Appl"},{"key":"2108_CR20","doi-asserted-by":"crossref","unstructured":"Elsayed MS, Le-Khac N-A, Dev S, Jurcut AD (2020) Ddosnet: A deep-learning model for detecting network attacks. In: 2020 IEEE 21st international symposium on \u201ca world of wireless, mobile and multimedia networks\u201d(WoWMoM). IEEE, pp 391\u2013396","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"2108_CR21","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2021.01.022","volume":"118","author":"S ur Rehman","year":"2021","unstructured":"ur Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, Jalil Z, Bashir AK (2021) Diddos: an approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Futur Gener Comput Syst 118:453\u2013466","journal-title":"Futur Gener Comput Syst"},{"key":"2108_CR22","doi-asserted-by":"publisher","unstructured":"McNally B, Vasko F, Lu Y (2022) A simple methodology that efficiently generates all optimal spanning trees for the cable-trench problem. https:\/\/doi.org\/10.47852\/bonviewJCCE208918205514","DOI":"10.47852\/bonviewJCCE208918205514"},{"key":"2108_CR23","doi-asserted-by":"crossref","unstructured":"Chen Z (2022) Research on internet security situation awareness prediction technology based on improved rbf neural network algorithm. J Comput Cogn Eng","DOI":"10.47852\/bonviewJCCE149145205514"},{"key":"2108_CR24","doi-asserted-by":"crossref","unstructured":"Gohil M, Kumar S (2020) Evaluation of classification algorithms for distributed denial of service attack detection. In: 2020 IEEE 3rd international conference on artificial intelligence and knowledge engineering (AIKE). IEEE, pp 138\u2013141","DOI":"10.1109\/AIKE48582.2020.00028"},{"issue":"3","key":"2108_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1049\/cit2.12003","volume":"6","author":"A Wani","year":"2021","unstructured":"Wani A, Khaliq R (2021) Sdn-based intrusion detection system for iot using deep learning classifier (idsiot-sdl). CAAI Trans Intell Technol 6(3):281\u2013290","journal-title":"CAAI Trans Intell Technol"},{"key":"2108_CR26","doi-asserted-by":"crossref","unstructured":"Mahmood T, Ali Z (2022) Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. J Comput Cogn Eng:56\u201373","DOI":"10.47852\/bonviewJCCE2022010104"},{"key":"2108_CR27","doi-asserted-by":"crossref","unstructured":"Pavithran P, Mathew S, Namasudra S, Singh A (2022) Enhancing randomness of the ciphertext generated by dna-based cryptosystem and finite state machine. Clust Comput:1\u201317","DOI":"10.1007\/s10586-022-03653-9"},{"issue":"1","key":"2108_CR28","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Trans Intell Technol 6(1):25\u201345","journal-title":"CAAI Trans Intell Technol"},{"key":"2108_CR29","doi-asserted-by":"crossref","unstructured":"Gutub A (2022) Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans Intell Technol","DOI":"10.1049\/cit2.12093"},{"key":"2108_CR30","doi-asserted-by":"publisher","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","volume":"8","author":"HA Alamri","year":"2020","unstructured":"Alamri HA, Thayananthan V (2020) Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against ddos attacks. IEEE Access 8:194269\u2013194288","journal-title":"IEEE Access"},{"key":"2108_CR31","doi-asserted-by":"crossref","unstructured":"Parfenov D, Kuznetsova L, Yanishevskaya N, Bolodurina I, Zhigalov A, Legashev L (2020) Research application of ensemble machine learning methods to the problem of multiclass classification of ddos attacks identification. In: 2020 International Conference Engineering and Telecommunication (En&T). IEEE, pp 1\u20137","DOI":"10.1109\/EnT50437.2020.9431255"},{"key":"2108_CR32","doi-asserted-by":"crossref","unstructured":"Can D-C, Le H-Q, Ha Q-T (2021) Detection of distributed denial of service attacks using automatic feature selection with enhancement for imbalance dataset. In: Asian Conference on intelligent information and database systems. Springer, pp 386\u2013398","DOI":"10.1007\/978-3-030-73280-6_31"},{"key":"2108_CR33","doi-asserted-by":"publisher","first-page":"69680","DOI":"10.1109\/ACCESS.2021.3078065","volume":"9","author":"JE Varghese","year":"2021","unstructured":"Varghese JE, Muniyal B (2021) An efficient ids framework for ddos attacks in sdn environment. IEEE Access 9:69680\u201369699","journal-title":"IEEE Access"},{"key":"2108_CR34","doi-asserted-by":"crossref","unstructured":"Sanchez OR, Repello M, Carrega A, Bolla R (2021) Evaluating ml-based ddos detection with grid search hyperparameter optimization. In: 2021 IEEE 7th international conference on network softwarization (NetSoft). IEEE, pp 402\u2013408","DOI":"10.1109\/NetSoft51509.2021.9492633"},{"issue":"2","key":"2108_CR35","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/TNSM.2021.3075503","volume":"18","author":"CF Pontes","year":"2021","unstructured":"Pontes CF, de Souza MM, Gondim JJ, Bishop M, Marotta MA (2021) A new method for flow-based network intrusion detection using the inverse potts model. IEEE Trans Netw Serv Manag 18(2):1125\u20131136","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2108_CR36","doi-asserted-by":"crossref","unstructured":"Kshirsagar D, Kumar S (2021) A feature reduction based reflected and exploited ddos attacks detection system. J Ambient Intell Humanized Comput:1\u201313","DOI":"10.1007\/s12652-021-02907-5"},{"key":"2108_CR37","doi-asserted-by":"publisher","first-page":"146810","DOI":"10.1109\/ACCESS.2021.3123791","volume":"9","author":"Y Wei","year":"2021","unstructured":"Wei Y, Jang-Jaccard J, Sabrina F, Singh A, Xu W, Camtepe S (2021) Ae-mlp: a hybrid deep learning approach for ddos detection and classification. IEEE Access 9:146810\u2013146821","journal-title":"IEEE Access"},{"key":"2108_CR38","doi-asserted-by":"crossref","unstructured":"Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2020) IoT DoS and DDoS Attack Detection using ResNet. arXiv:2012.01971 [cs]. Accessed 2022 Sept 15","DOI":"10.21203\/rs.3.rs-120303\/v1"},{"key":"2108_CR39","unstructured":"Badamasi UM, Sharjeel Khaliq OB, Shafiu Musa TI (2020) A deep learning based approach for DDos attack detection in IoT-enabled smart environments. Int J Comput Netw Commun Secur"},{"key":"2108_CR40","volume-title":"CICFlowMeter","author":"AH Lashkari","year":"2017","unstructured":"Lashkari AH, Zang Y, Owhuo G, Mamun MSI, Gil GD (2017) CICFlowMeter. Github"},{"key":"2108_CR41","unstructured":"Lin M, Chen Q, Yan S (2013) Network in network. arXiv:1312.4400"},{"key":"2108_CR42","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1142\/S0218488598000094","volume":"6","author":"S Hochreiter","year":"1998","unstructured":"Hochreiter S (1998) The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int J Uncertain Fuzziness Knowl-Based Syst 6:107\u2013116","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"2108_CR43","doi-asserted-by":"crossref","unstructured":"Qu H, Qin J, Liu W, Chen H (2017) Instruction detection in scada\/modbus network based on machine learning. In: International conference on machine learning and intelligent communications. Springer, pp 437\u2013454","DOI":"10.1007\/978-3-319-73447-7_48"},{"key":"2108_CR44","doi-asserted-by":"crossref","unstructured":"Hu Y, Zhang D, Cao G, Pan Q (2019) Network data analysis and anomaly detection using cnn technique for industrial control systems security. In: 2019 IEEE international conference on systems, man and cybernetics (SMC). IEEE, pp 593\u2013597","DOI":"10.1109\/SMC.2019.8913895"},{"key":"2108_CR45","unstructured":"Mieden P, Beltman R (2020) Network anomaly detection in modbus tcp industrial control systems. Technical report, University of Amsterdam"},{"key":"2108_CR46","doi-asserted-by":"crossref","unstructured":"de Assis MV, Carvalho LF, Rodrigues JJ, Lloret J, Proen\u00e7a Jr ML (2020) Near real-time security system applied to sdn environments in iot networks using convolutional neural network. Comput Electr Eng 86:106738","DOI":"10.1016\/j.compeleceng.2020.106738"},{"key":"2108_CR47","doi-asserted-by":"publisher","first-page":"167059","DOI":"10.1109\/ACCESS.2020.3022855","volume":"8","author":"K Sadaf","year":"2020","unstructured":"Sadaf K, Sultana J (2020) Intrusion detection based on autoencoder and isolation forest in fog computing. IEEE Access 8:167059\u2013167068","journal-title":"IEEE Access"},{"key":"2108_CR48","doi-asserted-by":"crossref","unstructured":"Singh Samom P, Taggu A (2021) Distributed denial of service (ddos) attacks detection: a machine learning approach. In: Thampi SM, Lloret Mauri J, Fernando X, Boppana R, Geetha S, Sikora A (eds) Applied soft computing and communication networks. Springer, pp 75\u201387","DOI":"10.1007\/978-981-33-6173-7_6"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02108-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02108-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02108-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T15:27:11Z","timestamp":1712071631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02108-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,28]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["2108"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02108-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2023,2,28]]},"assertion":[{"value":"14 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval"}},{"value":"No applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent to participate"}},{"value":"No applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}}]}}