{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T05:36:11Z","timestamp":1771997771623,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T00:00:00Z","timestamp":1749859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T00:00:00Z","timestamp":1749859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02000-0","type":"journal-article","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T02:24:55Z","timestamp":1749867895000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CAT: A simple heterogeneous ensemble learning framework for network intrusion detection"],"prefix":"10.1007","volume":"18","author":[{"given":"Zheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Amit","family":"Das","sequence":"additional","affiliation":[]},{"given":"Guan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Baskiyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"2000_CR1","doi-asserted-by":"crossref","unstructured":"Van Eck N, Waltman L (2010) Software survey: vosviewer, a computer program for bibliometric mapping. Scientometrics 84(2):523\u2013538","DOI":"10.1007\/s11192-009-0146-3"},{"key":"2000_CR2","doi-asserted-by":"crossref","unstructured":"Dong B, Wang X (2016) Comparison deep learning method to traditional methods using for network intrusion detection: In: 2016 8th IEEE international conference on communication software and networks (ICCSN). IEEE, pp 581\u2013585","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"2000_CR3","doi-asserted-by":"crossref","unstructured":"Kuncheva LI (2014) Combining pattern classifiers: methods and algorithms. John Wiley & Sons","DOI":"10.1002\/9781118914564"},{"key":"2000_CR4","doi-asserted-by":"publisher","first-page":"110941","DOI":"10.1016\/j.knosys.2023.110941","volume":"279","author":"R Lazzarini","year":"2023","unstructured":"Lazzarini R, Tianfield H, Charissis V (2023) A stacking ensemble of deep learning models for iot intrusion detection. Knowl-Based Syst 279:110941","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"2000_CR5","first-page":"2472","volume":"24","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R, Garg S, Hassan MM (2021) Dltif: deep learning-driven cyber threat intelligence modeling and identification framework in iot-enabled maritime transportation systems. IEEE Trans Intell Trans Syst 24(2):2472\u20132481","journal-title":"IEEE Trans Intell Trans Syst"},{"issue":"10","key":"2000_CR6","doi-asserted-by":"publisher","first-page":"10125","DOI":"10.1109\/TII.2022.3231424","volume":"19","author":"F Khan","year":"2023","unstructured":"Khan F, Jan MA, Alturki R, Alshehri MD, Shah ST, ur Rehman A (2023) A secure ensemble learning-based fog-cloud approach for cyberattack detection in IOMT. IEEE Trans Ind Inf 19(10):10125\u201310132","journal-title":"IEEE Trans Ind Inf"},{"key":"2000_CR7","first-page":"18932","volume":"34","author":"Y Gorishniy","year":"2021","unstructured":"Gorishniy Y, Rubachev I, Khrulkov V, Babenko A (2021) Revisiting deep learning models for tabular data. Adv Neural Inf Process Syst 34:18932\u201318943","journal-title":"Adv Neural Inf Process Syst"},{"issue":"4","key":"2000_CR8","first-page":"1","volume":"1","author":"T Chen","year":"2015","unstructured":"Chen T, He T, Benesty M, Khotilovich V, Tang Y, Cho H, Chen K et al (2015) Xgboost: extreme gradient boosting 0.4-2. R Package Version 1(4):1\u20134","journal-title":"R Package Version"},{"key":"2000_CR9","doi-asserted-by":"crossref","unstructured":"Tang W, Long G, Liu L, Zhou T, Jiang J, Blumenstein M (2020) Rethinking 1d-cnn for time series classification: a stronger baseline. arXiv:2002.10061","DOI":"10.1109\/IJCNN48605.2020.9206860"},{"issue":"5","key":"2000_CR10","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439\u2013448","journal-title":"Comput Secur"},{"key":"2000_CR11","doi-asserted-by":"crossref","unstructured":"Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK, et\u00a0al (2000) Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation. In: Proceedings DARPA information survivability conference and exposition. DISCEX\u201900, IEEE, vol\u00a02, pp 12\u201326","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"2000_CR12","doi-asserted-by":"crossref","unstructured":"Mukkamala S, Janoski G, Sung A (2002) Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 international joint conference on neural networks. IJCNN\u201902 (Cat. No. 02CH37290), IEEE, vol\u00a02, pp 1702\u20131707","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"2000_CR13","doi-asserted-by":"crossref","unstructured":"Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, pp 420\u2013424","DOI":"10.1145\/967900.967989"},{"key":"2000_CR14","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2000_CR15","doi-asserted-by":"publisher","first-page":"101162","DOI":"10.1016\/j.iot.2024.101162","volume":"26","author":"MM Inuwa","year":"2024","unstructured":"Inuwa MM, Das R (2024) A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on iot networks. Int Things 26:101162","journal-title":"Int Things"},{"key":"2000_CR16","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang K, Wang W, Wang A, Wu H (2020) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464\u201332476","journal-title":"IEEE Access"},{"key":"2000_CR17","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: (2015) military communications and information systems conference (MilCIS). IEEE 2015:1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2000_CR18","doi-asserted-by":"publisher","first-page":"87593","DOI":"10.1109\/ACCESS.2019.2925828","volume":"7","author":"P Wei","year":"2019","unstructured":"Wei P, Li Y, Zhang Z, Hu T, Li Z, Liu D (2019) An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7:87593\u201387605","journal-title":"IEEE Access"},{"key":"2000_CR19","unstructured":"Gwon H, Lee C, Keum R, Choi H (2019) Network intrusion detection based on lstm and feature embedding. arXiv:1911.11552"},{"key":"2000_CR20","doi-asserted-by":"publisher","first-page":"114520","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil AE, Yildiz K, Buldu A (2021) Detection of ddos attacks with feed forward based deep neural network model. Expert Syst Appl 169:114520","journal-title":"Expert Syst Appl"},{"key":"2000_CR21","doi-asserted-by":"publisher","first-page":"120209","DOI":"10.1016\/j.ins.2024.120209","volume":"662","author":"AD Aguru","year":"2024","unstructured":"Aguru AD, Erukala SB (2024) A lightweight multi-vector ddos detection framework for iot-enabled mobile health informatics systems using deep learning. Inf Sci 662:120209","journal-title":"Inf Sci"},{"key":"2000_CR22","doi-asserted-by":"crossref","unstructured":"Dang Q, Yang S, Liu Q, Ruan J (2024) Adaptive and communication-efficient zeroth-order optimization for distributed internet of things. IEEE Int Things J","DOI":"10.1109\/JIOT.2024.3441691"},{"key":"2000_CR23","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"key":"2000_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) Robust detection for network intrusion of industrial iot based on multi-cnn fusion. Measurement 154:107450","journal-title":"Measurement"},{"key":"2000_CR25","doi-asserted-by":"publisher","first-page":"112845","DOI":"10.1016\/j.eswa.2019.112845","volume":"139","author":"J Liu","year":"2020","unstructured":"Liu J, Zhang W, Tang Z, Xie Y, Ma T, Zhang J, Zhang G, Niyoyita JP (2020) Adaptive intrusion detection via ga-gogmm-based pattern learning with fuzzy rough set-based attribute selection. Expert Syst Appl 139:112845","journal-title":"Expert Syst Appl"},{"key":"2000_CR26","doi-asserted-by":"crossref","unstructured":"Sethi K, Kumar R, Prajapati N, Bera P (2020) Deep reinforcement learning based intrusion detection system for cloud infrastructure. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, pp 1\u20136","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"2000_CR27","doi-asserted-by":"publisher","first-page":"101214","DOI":"10.1016\/j.iot.2024.101214","volume":"26","author":"M Termos","year":"2024","unstructured":"Termos M, Ghalmane Z, Fadlallah A, Jaber A, Zghal M et al (2024) Gdlc: a new graph deep learning framework based on centrality measures for intrusion detection in iot networks. Int Things 26:101214","journal-title":"Int Things"},{"key":"2000_CR28","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.cose.2016.11.004","volume":"65","author":"AA Aburomman","year":"2017","unstructured":"Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135\u2013152","journal-title":"Comput Secur"},{"issue":"3","key":"2000_CR29","first-page":"217","volume":"4","author":"A Zainal","year":"2009","unstructured":"Zainal A, Maarof MA, Shamsuddin SM et al (2009) Ensemble classifiers for network intrusion detection system. J Inf Assur Secur 4(3):217\u2013225","journal-title":"J Inf Assur Secur"},{"key":"2000_CR30","doi-asserted-by":"crossref","unstructured":"Hsu Y-F, He Z, Tarutani Y, Matsuoka M (2019) Toward an online network intrusion detection system based on ensemble learning. In: 2019 IEEE 12th international conference on cloud computing (CLOUD). IEEE, pp 174\u2013178","DOI":"10.1109\/CLOUD.2019.00037"},{"issue":"4","key":"2000_CR31","doi-asserted-by":"publisher","first-page":"4821","DOI":"10.1109\/TNSM.2021.3138457","volume":"19","author":"S Das","year":"2021","unstructured":"Das S, Saha S, Priyoti AT, Roy EK, Sheldon FT, Haque A, Shiva S (2021) Network intrusion detection and comparative analysis using ensemble machine learning and feature selection. IEEE Trans Netw Serv Manag 19(4):4821\u20134833","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"1","key":"2000_CR32","first-page":"4586875","volume":"2020","author":"S Rajagopal","year":"2020","unstructured":"Rajagopal S, Kundapur PP, Hareesha KS (2020) A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur Commun Netw 2020(1):4586875","journal-title":"Secur Commun Netw"},{"issue":"18","key":"2000_CR33","doi-asserted-by":"publisher","first-page":"15387","DOI":"10.1007\/s00521-020-04986-5","volume":"34","author":"H Rajadurai","year":"2022","unstructured":"Rajadurai H, Gandhi UD (2022) A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput Appl 34(18):15387\u201315395","journal-title":"Neural Comput Appl"},{"key":"2000_CR34","doi-asserted-by":"crossref","unstructured":"Thockchom N, Singh MM, Nandi U (2023) A novel ensemble learning-based model for network intrusion detection. Complex Intell Syst 9(5):5693\u20135714","DOI":"10.1007\/s40747-023-01013-7"},{"issue":"3","key":"2000_CR35","first-page":"4815","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa N, Turnbull B, Choo K-KR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Int Things J 6(3):4815\u20134830","journal-title":"IEEE Int Things J"},{"issue":"1","key":"2000_CR36","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/ai3010002","volume":"3","author":"R Soleymanzadeh","year":"2022","unstructured":"Soleymanzadeh R, Aljasim M, Qadeer MW, Kashef R (2022) Cyberattack and fraud detection using ensemble stacking. AI 3(1):22\u201336","journal-title":"AI"},{"key":"2000_CR37","doi-asserted-by":"publisher","first-page":"108156","DOI":"10.1016\/j.compeleceng.2022.108156","volume":"102","author":"V Ravi","year":"2022","unstructured":"Ravi V, Chaganti R, Alazab M (2022) Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput Electr Eng 102:108156","journal-title":"Comput Electr Eng"},{"key":"2000_CR38","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.inffus.2021.02.007","volume":"72","author":"F Folino","year":"2021","unstructured":"Folino F, Folino G, Guarascio M, Pisani FS, Pontieri L (2021) On learning effective ensembles of deep neural networks for intrusion detection. Inf Fusion 72:48\u201369","journal-title":"Inf Fusion"},{"issue":"1","key":"2000_CR39","first-page":"2693948","volume":"2022","author":"Z Wang","year":"2022","unstructured":"Wang Z, Liu J, Sun L (2022) Efs-dnn: an ensemble feature selection-based deep learning approach to network intrusion detection system. Secur Commun Netw 2022(1):2693948","journal-title":"Secur Commun Netw"},{"key":"2000_CR40","doi-asserted-by":"publisher","first-page":"111785","DOI":"10.1016\/j.knosys.2024.111785","volume":"294","author":"K Hassini","year":"2024","unstructured":"Hassini K, Khalis S, Habibi O, Chemmakha M, Lazaar M (2024) An end-to-end learning approach for enhancing intrusion detection in industrial-internet of things. Knowl-Based Syst 294:111785","journal-title":"Knowl-Based Syst"},{"key":"2000_CR41","doi-asserted-by":"publisher","first-page":"104034","DOI":"10.1016\/j.cose.2024.104034","volume":"146","author":"A Zohourian","year":"2024","unstructured":"Zohourian A, Dadkhah S, Molyneaux H, Neto ECP, Ghorbani AA (2024) Iot-prids: leveraging packet representations for intrusion detection in iot networks. Comput Secur 146:104034","journal-title":"Comput Secur"},{"key":"2000_CR42","unstructured":"Greenberg MD (1998) Advanced engineering mathematics, Pearson Education India"},{"key":"2000_CR43","doi-asserted-by":"crossref","unstructured":"Albawi S, Mohammed TA, Al-Zawi S (2017) Understanding of a convolutional neural network, In: 2017 International conference on engineering and technology (ICET). IEEE, pp 1\u20136","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"2000_CR44","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30"},{"key":"2000_CR45","doi-asserted-by":"crossref","unstructured":"Lin T, Wang Y, Liu X, Qiu X (2022) A survey of transformers. AI Open","DOI":"10.1016\/j.aiopen.2022.10.001"},{"key":"2000_CR46","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805"},{"key":"2000_CR47","doi-asserted-by":"crossref","unstructured":"Wang Q, Li B, Xiao T, Zhu J, Li C, Wong DF, Chao LS (2019) Learning deep transformer models for machine translation. arXiv:1906.01787","DOI":"10.18653\/v1\/P19-1176"},{"key":"2000_CR48","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.inffus.2021.11.011","volume":"81","author":"R Shwartz-Ziv","year":"2022","unstructured":"Shwartz-Ziv R, Armon A (2022) Tabular data: deep learning is not all you need. Inf Fusion 81:84\u201390","journal-title":"Inf Fusion"},{"key":"2000_CR49","unstructured":"Bergstra J, Bardenet R, Bengio Y, K\u00e9gl B (2011) Algorithms for hyper-parameter optimization. Adv Neural Inf Process Syst 24"},{"issue":"2","key":"2000_CR50","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/380995.381030","volume":"2","author":"SD Bay","year":"2000","unstructured":"Bay SD, Kibler D, Pazzani MJ, Smyth P (2000) The uci kdd archive of large data sets for data mining research and experimentation. ACM SIGKDD Explor Newslett 2(2):81\u201385","journal-title":"ACM SIGKDD Explor Newslett"},{"key":"2000_CR51","unstructured":"Stolfo J, Fan W, Lee W, Prodromidis A, Chan PK (2000) Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection. Results from the JAM Project by Salvatore pp 1\u201315"},{"key":"2000_CR52","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"key":"2000_CR53","doi-asserted-by":"crossref","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) Ciciot 2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13):5941","DOI":"10.3390\/s23135941"},{"key":"2000_CR54","doi-asserted-by":"crossref","unstructured":"Zhou Z-H (2012) Ensemble methods: foundations and algorithms. CRC press","DOI":"10.1201\/b12207"},{"key":"2000_CR55","doi-asserted-by":"crossref","unstructured":"Yang Y, Lv H, Chen N (2023) A survey on ensemble learning under the era of deep learning. Artif Intell Rev 56(6):5545\u20135589","DOI":"10.1007\/s10462-022-10283-5"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02000-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02000-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02000-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:22Z","timestamp":1758986542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02000-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,14]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2000"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02000-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,14]]},"assertion":[{"value":"20 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"213"}}