{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T11:53:27Z","timestamp":1772798007102,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11277-022-09988-1","type":"journal-article","created":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T16:02:35Z","timestamp":1662825755000},"page":"1041-1063","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Intelligent IDS: Venus Fly-Trap Optimization with Honeypot Approach for Intrusion Detection and Prevention"],"prefix":"10.1007","volume":"128","author":[{"given":"Sai Chaithanya","family":"Movva","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Suresh","family":"Nikudiya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Varsha S.","family":"Basanaik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5040-0745","authenticated-orcid":false,"given":"Damodar Reddy","family":"Edla","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hanumanthu","family":"Bhukya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,10]]},"reference":[{"issue":"12","key":"9988_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5120\/1439-1947","volume":"9","author":"P Goyal","year":"2010","unstructured":"Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications, 9(12), 11\u201315.","journal-title":"International Journal of Computer Applications"},{"key":"9988_CR2","unstructured":"Ingham, K., & Forrest, S. (2002). A history and survey of network firewalls. Technical Report, University of New Mexico."},{"key":"9988_CR3","doi-asserted-by":"crossref","unstructured":"Sabahi, F., & Movaghar, A. Intrusion detection: A survey. In 2008 third international conference on systems and networks communications (pp. 23\u201326).","DOI":"10.1109\/ICSNC.2008.44"},{"issue":"8","key":"9988_CR4","first-page":"32","volume":"3","author":"S Vidwarshi","year":"2015","unstructured":"Vidwarshi, S., Tyagi, A., & Kumar, R. (2015). A discussion about Honeypots and different models based on Honeypots. Journal of Advanced Computational Engineering and Networking, 3(8), 32\u201340.","journal-title":"Journal of Advanced Computational Engineering and Networking"},{"key":"9988_CR5","unstructured":"Shiue, L.-M., & Kao, S.-J. (2008). Countermeasure for detection of honeypot deployment. In International conference on computer and communication engineering (pp. 595\u2013599)."},{"key":"9988_CR6","doi-asserted-by":"crossref","unstructured":"Hayati, P., & Potdar, V. (2009). Spammer and hacker, two old friends. In 3rd IEEE international conference on digital ecosystems and technologies (pp. 290\u2013294).","DOI":"10.1109\/DEST.2009.5276764"},{"key":"9988_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.ijcip.2015.04.002","volume":"10","author":"M Winn","year":"2015","unstructured":"Winn, M., Rice, M., Dunlap, S., Lopez, J., & Mullins, B. (2015). Constructing cost-effective and targetable industrial control system honeypots for production networks. International Journal of Critical Infrastructure Protection, 10, 47\u201358.","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"3","key":"9988_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s11416-010-0150-4","volume":"7","author":"G Wagener","year":"2011","unstructured":"Wagener, G., Dulaunoy, A., & Engel, T. (2011). Heliza: Talking dirty to the attackers. Journal in Computer Virology, 7(3), 221\u2013232.","journal-title":"Journal in Computer Virology"},{"key":"9988_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jtbi.2018.02.003","volume":"444","author":"S Lehtinen","year":"2018","unstructured":"Lehtinen, S. (2018). Understanding the Venus flytrap through mathematical modelling. Journal of Theoretical Biology, 444, 1\u201310.","journal-title":"Journal of Theoretical Biology"},{"key":"9988_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-981-10-0251-9_48","volume-title":"Computational intelligence, cyber security and computational models","author":"R Gowri","year":"2016","unstructured":"Gowri, R., & Rathipriya, R. (2016). Venus flytrap optimization. In M. Senthilkumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato, & L. Batten (Eds.), Computational intelligence, cyber security and computational models (pp. 519\u2013531). Springer."},{"key":"9988_CR11","first-page":"199","volume-title":"Computational intelligence in data mining","author":"R Gowri","year":"2016","unstructured":"Gowri, R., Sivabalan, S., & Rathipriya, R. (2016). Biclustering using Venus flytrap optimization algorithm. In H. Behera & D. Mohapatra (Eds.), Computational intelligence in data mining (Vol. 1, pp. 199\u2013207). Springer."},{"key":"9988_CR12","first-page":"191","volume-title":"Computational intelligence in data mining","author":"S Sivabalan","year":"2016","unstructured":"Sivabalan, S., Gowri, R., & Rathipriya, R. (2016). Optimizing energy efficient path selection using Venus flytrap optimization algorithm in MANET. In H. Behera & D. Mohapatra (Eds.), Computational intelligence in data mining (Vol. 1, pp. 191\u2013198). Springer."},{"issue":"8","key":"9988_CR13","doi-asserted-by":"publisher","first-page":"968","DOI":"10.4161\/psb.5.8.12136","volume":"5","author":"R Yang","year":"2010","unstructured":"Yang, R., Lenaghan, S. C., Zhang, M., & Xia, L. (2010). A mathematical model on the closing and opening mechanism for Venus flytrap. Plant Signaling & Behavior, 5(8), 968\u2013978.","journal-title":"Plant Signaling & Behavior"},{"key":"9988_CR14","unstructured":"Kulkarni, S., Mutalik, M., Kulkarni, P., & Gupta, T. (2012). Honeydoop\u2014A system for on-demand virtual high interaction honeypots. In 2012 international conference for internet technology and secured transactions (pp. 743\u2013747)."},{"key":"9988_CR15","doi-asserted-by":"crossref","unstructured":"Khosravifar, B., & Bentahar, J. (2008). An experience improving intrusion detection systems false alarm ratio by using honeypot. In 22nd international conference on advanced information networking and applications (AINA 2008) (pp. 997\u20131004).","DOI":"10.1109\/AINA.2008.44"},{"issue":"5","key":"9988_CR16","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1016\/j.comnet.2006.09.005","volume":"51","author":"G Portokalidis","year":"2007","unstructured":"Portokalidis, G., & Bos, H. (2007). SweetBait: Zero-hour worm detection and containment using low-and high-interaction honeypots. Computer Networks, 51(5), 1256\u20131274.","journal-title":"Computer Networks"},{"issue":"19","key":"9988_CR17","first-page":"57","volume":"60","author":"S Paliwal","year":"2012","unstructured":"Paliwal, S., & Gupta, R. (2012). Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm. International Journal of Computer Applications, 60(19), 57\u201362.","journal-title":"International Journal of Computer Applications"},{"key":"9988_CR18","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem, V., & Babaie, S. (2018). A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Computer Networks, 136, 37\u201350.","journal-title":"Computer Networks"},{"key":"9988_CR19","first-page":"1","volume":"1","author":"W Li","year":"2004","unstructured":"Li, W. (2004). Using genetic algorithm for network intrusion detection. Proceedings of the United States Department of Energy Cyber Security Group, 1, 1\u20138.","journal-title":"Proceedings of the United States Department of Energy Cyber Security Group"},{"issue":"21","key":"9988_CR20","first-page":"29","volume":"45","author":"PG Jeya","year":"2012","unstructured":"Jeya, P. G., Ravichandran, M., & Ravichandran, C. S. (2012). Efficient classifier for R2L and U2R attacks. International Journal of Computer Applications, 45(21), 29.","journal-title":"International Journal of Computer Applications"},{"key":"9988_CR21","unstructured":"https:\/\/www.netresec.com\/?page=MACCDC. Retrieved from, May 1, 2019."},{"key":"9988_CR22","unstructured":"https:\/\/www.netresec.com\/?page=PcapFiles. Retrieved from, May 1, 2019."},{"key":"9988_CR23","unstructured":"Elhardt, N. Venus Flytrap showing trigger hairs. Wikipedia the free encyclopedia, Wikimedia foundation, 13 April 2006. https:\/\/en.wikipedia.org\/wiki\/Venus_flytrap. Retrieved from, May 15, 2019."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09988-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09988-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09988-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T10:15:08Z","timestamp":1674036908000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09988-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,10]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["9988"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09988-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,10]]},"assertion":[{"value":"29 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}