{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T08:08:12Z","timestamp":1778227692835,"version":"3.51.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11277-023-10722-8","type":"journal-article","created":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T14:02:26Z","timestamp":1694440946000},"page":"2255-2281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Unification of K-Nearest Neighbor (KNN) with Distance Aware Algorithm for Intrusion Detection in Evolving Networks Like IoT"],"prefix":"10.1007","volume":"132","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1180-5384","authenticated-orcid":false,"given":"S. K.","family":"Lakshminarayana","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P. I.","family":"Basarkod","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,9,11]]},"reference":[{"key":"10722_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8\u201327.","journal-title":"Journal of Information Security and Applications"},{"key":"10722_CR2","doi-asserted-by":"publisher","first-page":"78238","DOI":"10.1109\/ACCESS.2018.2884906","volume":"6","author":"H Xu","year":"2018","unstructured":"Xu, H., Yu, W., Griffith, D., & Golmie, N. (2018). A survey on industrial Internet of Things: A cyber-physical systems perspective. IEEE Access, 6, 78238\u201378259.","journal-title":"IEEE Access"},{"issue":"6","key":"10722_CR3","first-page":"1361","volume":"14","author":"NY Kim","year":"2018","unstructured":"Kim, N. Y., Rathore, S., Ryu, J. H., Park, J. H., & Park, J. H. (2018). A survey on cyber physical system security for IoT: Issues, challenges, threats, solutions. Journal of Information Processing Systems, 14(6), 1361\u20131384.","journal-title":"Journal of Information Processing Systems"},{"key":"10722_CR4","doi-asserted-by":"crossref","unstructured":"Das, S., & Nene M. J. (2017). A survey on types of machine learning techniques in intrusion prevention systems. In 2017 International conference on wireless communications, signal processing and networking (WiSPNET) (pp. 2296\u20132299). IEEE.","DOI":"10.1109\/WiSPNET.2017.8300169"},{"key":"10722_CR5","unstructured":"Mohamed, O. A. A comparative study between support vector machine and k-nearest neighbour methods for intrusion detection system (Doctoral dissertation, University of Gezira)."},{"issue":"23","key":"10722_CR6","doi-asserted-by":"publisher","first-page":"2919","DOI":"10.3390\/electronics10232919","volume":"10","author":"RJ Alzahrani","year":"2021","unstructured":"Alzahrani, R. J., & Alzahrani, A. (2021). Security analysis of DDoS attacks using machine learning algorithms in networks traffic. Electronics, 10(23), 2919.","journal-title":"Electronics"},{"issue":"2","key":"10722_CR7","first-page":"7","volume":"4","author":"VD Soni","year":"2019","unstructured":"Soni, V. D. (2019). Security issues in using iot enabled devices and their Impact. International Engineering Journal For Research & Development, 4(2), 7.","journal-title":"International Engineering Journal For Research & Development"},{"key":"10722_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","volume":"49","author":"N Hubballi","year":"2014","unstructured":"Hubballi, N., & Suryanarayanan, V. (2014). False alarm minimization techniques in signature-based intrusion detection systems: A survey. Computer Communications, 49, 1\u20137.","journal-title":"Computer Communications"},{"issue":"2","key":"10722_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/1206212X.2018.1521895","volume":"43","author":"S Mishra","year":"2021","unstructured":"Mishra, S., Sagban, R., Yakoob, A., & Gandhi, N. (2021). Swarm intelligence in anomaly detection systems: An overview. International Journal of Computers and Applications., 43(2), 109\u2013118.","journal-title":"International Journal of Computers and Applications."},{"issue":"1","key":"10722_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I. H., Kayes, A. S., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data, 7(1), 1\u201329.","journal-title":"Journal of Big Data"},{"issue":"20","key":"10722_CR11","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9(20), 4396.","journal-title":"Applied Sciences"},{"key":"10722_CR12","doi-asserted-by":"publisher","first-page":"58392","DOI":"10.1109\/ACCESS.2020.2982418","volume":"8","author":"H Jiang","year":"2020","unstructured":"Jiang, H., He, Z., Ye, G., & Zhang, H. (2020). Network intrusion detection based on PSO-Xgboost model. In IEEE Access, 8, 58392\u201358401. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982418","journal-title":"In IEEE Access"},{"issue":"4","key":"10722_CR13","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TBDATA.2017.2715166","volume":"5","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Slay, J., & Creech, G. (2019). Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Transactions on Big Data, 5(4), 481\u2013494. https:\/\/doi.org\/10.1109\/TBDATA.2017.2715166","journal-title":"IEEE Transactions on Big Data"},{"key":"10722_CR14","doi-asserted-by":"publisher","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","volume":"8","author":"HA Alamri","year":"2020","unstructured":"Alamri, H. A., & Thayananthan, V. (2020). Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks. IEEE Access, 8, 194269\u2013194288. https:\/\/doi.org\/10.1109\/ACCESS.2020.3033942","journal-title":"IEEE Access"},{"key":"10722_CR15","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/ACCESS.2018.2883142","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang, W., Du, X., & Wang, N. (2019). Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access, 7, 1345\u20131354. https:\/\/doi.org\/10.1109\/ACCESS.2018.2883142","journal-title":"IEEE Access"},{"key":"10722_CR16","doi-asserted-by":"publisher","first-page":"26190","DOI":"10.1109\/ACCESS.2017.2766844","volume":"5","author":"MH Kamarudin","year":"2017","unstructured":"Kamarudin, M. H., Maple, C., Watson, T., & Safa, N. S. (2017). A LogitBoost-based algorithm for detecting known and unknown web attacks. IEEE Access, 5, 26190\u201326200. https:\/\/doi.org\/10.1109\/ACCESS.2017.2766844","journal-title":"IEEE Access"},{"key":"10722_CR17","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama, B. A., Nkenyereye, L., Islam, S. M. R., & Kwak, K. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120\u201324134. https:\/\/doi.org\/10.1109\/ACCESS.2020.2969428","journal-title":"IEEE Access"},{"key":"10722_CR18","doi-asserted-by":"publisher","first-page":"39184","DOI":"10.1109\/ACCESS.2020.2975716","volume":"8","author":"A Nagaraja","year":"2020","unstructured":"Nagaraja, A., Boregowda, U., Khatatneh, K., Vangipuram, R., Nuvvusetty, R., & Sravan Kiran, V. (2020). Similarity based feature transformation for network anomaly detection. IEEE Access, 8, 39184\u201339196. https:\/\/doi.org\/10.1109\/ACCESS.2020.2975716","journal-title":"IEEE Access"},{"key":"10722_CR19","doi-asserted-by":"publisher","first-page":"95864","DOI":"10.1109\/ACCESS.2020.2994931","volume":"8","author":"Z Chkirbene","year":"2020","unstructured":"Chkirbene, Z., Erbad, A., Hamila, R., Mohamed, A., Guizani, M., & Hamdi, M. (2020). TIDCS: A dynamic intrusion detection and classification system based feature selection. IEEE Access, 8, 95864\u201395877. https:\/\/doi.org\/10.1109\/ACCESS.2020.2994931","journal-title":"IEEE Access"},{"key":"10722_CR20","doi-asserted-by":"publisher","first-page":"193981","DOI":"10.1109\/ACCESS.2020.3033494","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Liu, Q., Qiu, S., Zhou, S., & Zhang, C. (2020). Unknown attack detection based on zero-shot learning. IEEE Access, 8, 193981\u2013193991. https:\/\/doi.org\/10.1109\/ACCESS.2020.3033494","journal-title":"IEEE Access"},{"key":"10722_CR21","doi-asserted-by":"publisher","first-page":"38367","DOI":"10.1109\/ACCESS.2018.2854599","volume":"6","author":"Z Wang","year":"2018","unstructured":"Wang, Z. (2018). Deep learning-based intrusion detection with adversaries. IEEE Access, 6, 38367\u201338384. https:\/\/doi.org\/10.1109\/ACCESS.2018.2854599","journal-title":"IEEE Access"},{"issue":"2","key":"10722_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.26599\/TST.2019.9010051","volume":"26","author":"G Pu","year":"2021","unstructured":"Pu, G., Wang, L., Shen, J., & Dong, F. (2021). A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Science and Technology, 26(2), 146\u2013153. https:\/\/doi.org\/10.26599\/TST.2019.9010051","journal-title":"Tsinghua Science and Technology"},{"issue":"4","key":"10722_CR23","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxt044","volume":"57","author":"P Gogoi","year":"2014","unstructured":"Gogoi, P., Bhattacharyya, D. K., Borah, B., & Kalita, J. K. (2014). MLH-IDS: A multi-level hybrid intrusion detection method. The Computer Journal, 57(4), 602\u2013623. https:\/\/doi.org\/10.1093\/comjnl\/bxt044","journal-title":"The Computer Journal"},{"key":"10722_CR24","doi-asserted-by":"publisher","first-page":"12060","DOI":"10.1109\/ACCESS.2017.2787719","volume":"6","author":"L Li","year":"2018","unstructured":"Li, L., Yu, Y., Bai, S., Hou, Y., & Chen, X. (2018). An effective two-step intrusion detection approach based on binary classification and k-NN. IEEE Access, 6, 12060\u201312073. https:\/\/doi.org\/10.1109\/ACCESS.2017.2787719","journal-title":"IEEE Access"},{"issue":"2","key":"10722_CR25","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2019","unstructured":"Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. R. (2019). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314\u2013323. https:\/\/doi.org\/10.1109\/TETC.2016.2633228","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"10722_CR26","doi-asserted-by":"publisher","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., & Zeng, X. (2019). A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access, 7, 154560\u2013154571. https:\/\/doi.org\/10.1109\/ACCESS.2019.2948382","journal-title":"IEEE Access"},{"key":"10722_CR27","doi-asserted-by":"publisher","first-page":"50927","DOI":"10.1109\/ACCESS.2018.2868171","volume":"6","author":"Y Gao","year":"2018","unstructured":"Gao, Y., Liu, Y., Jin, Y., Chen, J., & Wu, H. (2018). A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system. IEEE Access, 6, 50927\u201350938. https:\/\/doi.org\/10.1109\/ACCESS.2018.2868171","journal-title":"IEEE Access"},{"issue":"8","key":"10722_CR28","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1109\/TCSII.2019.2939826","volume":"67","author":"L Andrade Maciel","year":"2020","unstructured":"Andrade Maciel, L., Alc\u00e2ntara Souza, M., & Cota de Freitas, H. (2020). Reconfigurable FPGA-based K-means\/K-modes architecture for network intrusion detection. IEEE Transactions on Circuits and Systems II: Express Briefs, 67(8), 1459\u20131463. https:\/\/doi.org\/10.1109\/TCSII.2019.2939826","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"10722_CR29","first-page":"2481","volume":"5","author":"S Chaurasia","year":"2014","unstructured":"Chaurasia, S., & Jain, A. (2014). Ensemble neural network and k-NN classifiers for intrusion detection. International Journal of Computer Science and Information Technology, 5, 2481\u20132485.","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"10722_CR30","doi-asserted-by":"crossref","unstructured":"Tharwat, A., Ghanem, A. M., & Hassanien, A. E. (2013). Three different classifiers for facial age estimation based on k-nearest neighbor. In Proceedings of computer engineering conference (ICENCO) (pp. 55\u221260).","DOI":"10.1109\/ICENCO.2013.6736476"},{"key":"10722_CR31","doi-asserted-by":"crossref","unstructured":"Derlatka, M. (2013). Modified kNN algorithm for improved recognition accuracy of biometrics system based on gait. In IFIP international conference on computer information systems and industrial management (pp. 59\u201366). Springer.","DOI":"10.1007\/978-3-642-40925-7_6"},{"issue":"10","key":"10722_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-019-1329-z","volume":"1","author":"DM Atallah","year":"2019","unstructured":"Atallah, D. M., Badawy, M., & El-Sayed, A. (2019). Intelligent feature selection with modified K-nearest neighbor for kidney transplantation prediction. SN Applied Sciences, 1(10), 1\u20137.","journal-title":"SN Applied Sciences"},{"issue":"8","key":"10722_CR33","doi-asserted-by":"publisher","first-page":"347","DOI":"10.12720\/jcm.16.8.347-354","volume":"16","author":"NG Bach","year":"2021","unstructured":"Bach, N. G., Hoang, L. H., & Hai, T. H. (2021). Improvement of K-nearest neighbors (KNN) algorithm for network intrusion detection using shannon-entropy. The Journal of Communication, 16(8), 347\u2013354.","journal-title":"The Journal of Communication"},{"key":"10722_CR34","unstructured":"Wahba, Y., Elsalamouny, E., & Eltaweel, G. (2015). Improving the performance of multi-class intrusion detection systems using feature reduction."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10722-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10722-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T11:23:56Z","timestamp":1695122636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10722-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["10722"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10722-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,11]]},"assertion":[{"value":"11 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all the authors, corresponding author declares that there is no conflict of interest involved in conducting the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors are contributing and accepting to submit the current work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors are accepting to submit and publish the submitted work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}