{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:40Z","timestamp":1765622500567,"version":"3.48.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02153-y","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:56:33Z","timestamp":1762257393000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An optimized incremental learning strategy for efficient intrusion detection"],"prefix":"10.1007","volume":"18","author":[{"given":"Arun","family":"K","sequence":"first","affiliation":[]},{"given":"Aji","family":"S","sequence":"additional","affiliation":[]},{"given":"Mahendra","family":"Data","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"2153_CR1","doi-asserted-by":"publisher","unstructured":"Mayer A, Wool A, Ziskind E (2000) Fang: a firewall analysis engine. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 177\u2013187. https:\/\/doi.org\/10.1109\/SECPRI.2000.848455","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"2153_CR2","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch M et al (1999) Snort: Lightweight intrusion detection for networks. Lisa 99:229\u2013238","journal-title":"Lisa"},{"key":"2153_CR3","doi-asserted-by":"publisher","unstructured":"Iyer A, Liebrock LM (2004) Vulnerability scanning for buffer overflow. In: International conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004., vol 2, pp 116\u20131172. https:\/\/doi.org\/10.1109\/ITCC.2004.1286600","DOI":"10.1109\/ITCC.2004.1286600"},{"key":"2153_CR4","unstructured":"Trustwave (2020) 2020 Trustwave Global Security Report. Trustwave. Accessed: 2023-12-20. https:\/\/www.trustwave.com\/en-us\/resources\/library\/documents\/2020-trustwave-global-security-report\/"},{"key":"2153_CR5","unstructured":"IBM (2023) X-Force Threat Intelligence Index 2022. IBM. Accessed: 2024-01-10. https:\/\/www.ibm.com\/downloads\/documents\/us-en\/107a02e94ac8f670"},{"key":"2153_CR6","doi-asserted-by":"crossref","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2","DOI":"10.1186\/s42400-019-0038-7"},{"key":"2153_CR7","doi-asserted-by":"publisher","unstructured":"Du H, Teng S, Yang M, Zhu Q (2009) Intrusion detection system based on improved svm incremental learning. In: 2009 International Conference on Artificial Intelligence and Computational Intelligence, vol 1, pp 23\u201328. https:\/\/doi.org\/10.1109\/AICI.2009.254","DOI":"10.1109\/AICI.2009.254"},{"key":"2153_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s42256-022-00568-3","volume":"4","author":"G Ven","year":"2022","unstructured":"Ven G, Tuytelaars T, Tolias A (2022) Three types of incremental learning. Nat Mach Intell 4:1\u201313. https:\/\/doi.org\/10.1038\/s42256-022-00568-3","journal-title":"Nat Mach Intell"},{"key":"2153_CR9","doi-asserted-by":"publisher","first-page":"154156","DOI":"10.1109\/ACCESS.2021.3127985","volume":"9","author":"M Data","year":"2021","unstructured":"Data M, Aritsugi M (2021) T-dfnn: An incremental learning algorithm for intrusion detection systems. IEEE Access 9:154156\u2013154171. https:\/\/doi.org\/10.1109\/ACCESS.2021.3127985","journal-title":"IEEE Access"},{"key":"2153_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103107","volume":"127","author":"T Zoppi","year":"2023","unstructured":"Zoppi T, Ceccarelli A, Puccetti T, Bondavalli A (2023) Which algorithm can detect unknown attacks? comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection. Computers & Security 127:103107. https:\/\/doi.org\/10.1016\/j.cose.2023.103107","journal-title":"Computers & Security"},{"key":"2153_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s23020890","volume":"23","author":"A Henry","year":"2023","unstructured":"Henry A, Gautam S, Khanna S, Rabie K, Shongwe T, Bhattacharya P, Sharma B, Chowdhury S (2023) Composition of hybrid deep learning model and feature optimization for intrusion detection system. Sensors 23:1\u201322. https:\/\/doi.org\/10.3390\/s23020890","journal-title":"Sensors"},{"key":"2153_CR12","doi-asserted-by":"publisher","first-page":"61628","DOI":"10.1109\/ACCESS.2019.2915673","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu H, You X, Liu S (2019) Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7:61628\u201361638. https:\/\/doi.org\/10.1109\/ACCESS.2019.2915673","journal-title":"IEEE Access"},{"key":"2153_CR13","doi-asserted-by":"publisher","unstructured":"Feng W, Zhu Q, Zhuang J, Shimin Y (2019) An expert recommendation algorithm based on pearson correlation coefficient and fp-growth. Clust Comput 22. https:\/\/doi.org\/10.1007\/s10586-017-1576-y","DOI":"10.1007\/s10586-017-1576-y"},{"key":"2153_CR14","doi-asserted-by":"publisher","first-page":"69822","DOI":"10.1109\/ACCESS.2022.3187116","volume":"10","author":"I Mbona","year":"2022","unstructured":"Mbona I, Eloff JHP (2022) Detecting zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access 10:69822\u201369838. https:\/\/doi.org\/10.1109\/ACCESS.2022.3187116","journal-title":"IEEE Access"},{"issue":"11","key":"2153_CR15","doi-asserted-by":"publisher","first-page":"5450","DOI":"10.1109\/TIP.2019.2917862","volume":"28","author":"P Perera","year":"2019","unstructured":"Perera P, Patel VM (2019) Learning deep features for one-class classification. IEEE Trans Image Process 28(11):5450\u20135463. https:\/\/doi.org\/10.1109\/TIP.2019.2917862","journal-title":"IEEE Trans Image Process"},{"key":"2153_CR16","volume-title":"Mastering Machine Learning Algorithms","author":"G Bonaccorso","year":"2018","unstructured":"Bonaccorso G (2018) Mastering Machine Learning Algorithms. Packt, Birmingham, U.K"},{"key":"2153_CR17","doi-asserted-by":"publisher","first-page":"90603","DOI":"10.1109\/ACCESS.2021.3090957","volume":"9","author":"T Zoppi","year":"2021","unstructured":"Zoppi T, Ceccarelli A, Bondavalli A (2021) Unsupervised algorithms to detect zero-day attacks: Strategy and application. IEEE Access 9:90603\u201390615. https:\/\/doi.org\/10.1109\/ACCESS.2021.3090957","journal-title":"IEEE Access"},{"key":"2153_CR18","doi-asserted-by":"publisher","first-page":"98685","DOI":"10.1109\/ACCESS.2023.3313596","volume":"11","author":"A Raza","year":"2023","unstructured":"Raza A, Munir K, Almutairi MS, Sehar R (2023) Novel class probability features for optimizing network attack detection with machine learning. IEEE Access 11:98685\u201398694. https:\/\/doi.org\/10.1109\/ACCESS.2023.3313596","journal-title":"IEEE Access"},{"key":"2153_CR19","doi-asserted-by":"publisher","unstructured":"T J, Karuppanan S, (2025) Fuzzy-rule based optimized hybrid deep learning model for network intrusion detection in sdn enabled iot network. Comput & Secur 152:104372. https:\/\/doi.org\/10.1016\/j.cose.2025.104372","DOI":"10.1016\/j.cose.2025.104372"},{"key":"2153_CR20","doi-asserted-by":"publisher","unstructured":"Zhu Y, Wang Y, Zhou L, Xia Y (2025) Fc-trans: Deep learning methods for network intrusion detection in big data environments. Computers & Security 154:104392. https:\/\/doi.org\/10.1016\/j.cose.2025.104392","DOI":"10.1016\/j.cose.2025.104392"},{"key":"2153_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113337","volume":"316","author":"H Dong","year":"2025","unstructured":"Dong H, Kotenko I, Levshun D (2025) Next-generation iiot security: Comprehensive comparative analysis of cnn-based approaches. Knowl-Based Syst 316:113337. https:\/\/doi.org\/10.1016\/j.knosys.2025.113337","journal-title":"Knowl-Based Syst"},{"key":"2153_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Deep learning enabled intrusion detection system for industrial iot environment. Expert Syst Appl 249:123808. https:\/\/doi.org\/10.1016\/j.eswa.2024.123808","journal-title":"Expert Syst Appl"},{"key":"2153_CR23","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10586-025-05135-0","volume":"28","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar H, Katarya R (2025) A hybrid blockchain-based framework for securing intrusion detection systems in internet of things. Clust Comput 28:471. https:\/\/doi.org\/10.1007\/s10586-025-05135-0","journal-title":"Clust Comput"},{"key":"2153_CR24","doi-asserted-by":"publisher","unstructured":"Nandanwar H, Katarya R (2025) Privacy-preserving data sharing in blockchain-enabled iot healthcare management system. Comput J 065. https:\/\/doi.org\/10.1093\/comjnl\/bxaf065","DOI":"10.1093\/comjnl\/bxaf065"},{"key":"2153_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-025-02513-3","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar H, Katarya R (2025) Optimized intrusion detection and secure data management in iot networks using gao-xgboost and ecc-integrated blockchain framework. Knowl Inf Syst. https:\/\/doi.org\/10.1007\/s10115-025-02513-3","journal-title":"Knowl Inf Syst"},{"key":"2153_CR26","doi-asserted-by":"publisher","unstructured":"Nandanwar H, Katarya R (2025) A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In: Sharma DK, Sharma R, Peng SL (eds.) Proceedings of international conference on next-generation communication and computing (NGCCOM 2024). Lecture Notes in Networks and Systems, vol 1305. Springer. https:\/\/doi.org\/10.1007\/978-981-96-3725-6_18","DOI":"10.1007\/978-981-96-3725-6_18"},{"key":"2153_CR27","doi-asserted-by":"publisher","unstructured":"Kumar H, Kumar H, Harish, Nandanwar H, Katarya R (2025) Enhancing security and scalability of iomt systems using blockchain: Addressing key challenges and limitations. In: Proceedings of the 6th international conference on deep learning, artificial intelligence and robotics (ICDLAIR 2024), pp 191\u2013202. Atlantis Press.https:\/\/doi.org\/10.2991\/978-94-6463-740-3_17","DOI":"10.2991\/978-94-6463-740-3_17"},{"key":"2153_CR28","doi-asserted-by":"publisher","unstructured":"Constantinides C, Shiaeles S, Ghita B, Kolokotronis N (2019) A novel online incremental learning intrusion prevention system. In: 2019 10th IFIP International conference on new technologies, mobility and security (NTMS), pp. 1\u20136.https:\/\/doi.org\/10.1109\/NTMS.2019.8763842","DOI":"10.1109\/NTMS.2019.8763842"},{"issue":"1","key":"2153_CR29","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.neunet.2005.04.006","volume":"19","author":"S Furao","year":"2006","unstructured":"Furao S, Hasegawa O (2006) An incremental network for on-line unsupervised classification and topology learning. Neural Netw 19(1):90\u2013106. https:\/\/doi.org\/10.1016\/j.neunet.2005.04.006","journal-title":"Neural Netw"},{"key":"2153_CR30","doi-asserted-by":"publisher","unstructured":"M VMR, Khullar V, Bhosle AA, Salunke MD, Bangare JL, Ingavale A (2022) Streamed incremental learning for cyber attack classification using machine learning. In: 2022 2nd International conference on innovative sustainable computational technologies (CISCT), pp 1\u20135. https:\/\/doi.org\/10.1109\/CISCT55310.2022.10046651","DOI":"10.1109\/CISCT55310.2022.10046651"},{"key":"2153_CR31","doi-asserted-by":"publisher","unstructured":"zg r A, Erdem H, (2016) A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints. https:\/\/doi.org\/10.7287\/PEERJ.PREPRINTS.1954","DOI":"10.7287\/PEERJ.PREPRINTS.1954"},{"key":"2153_CR32","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2153_CR33","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Habibi Lashkari A, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International conference on information systems security and privacy - ICISSP, pp 108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"2153_CR34","doi-asserted-by":"publisher","unstructured":"Das T, Hamdan OA, Shukla RM, Sengupta S, Arslan E (2023) Unr-idd: Intrusion detection dataset using network port statistics. In: 2023 IEEE 20th consumer communications & networking conference (CCNC), pp 497\u2013500. https:\/\/doi.org\/10.1109\/CCNC51644.2023.10059640","DOI":"10.1109\/CCNC51644.2023.10059640"},{"key":"2153_CR35","doi-asserted-by":"publisher","unstructured":"Mohammadian H, Habibi Lashkari A, Ghorbani AA (2024) Poisoning and evasion: Deep learning-based nids under adversarial attacks. In: 2024 21st Annual international conference on privacy, security and trust (PST), pp 1\u20139. https:\/\/doi.org\/10.1109\/PST62714.2024.10788064","DOI":"10.1109\/PST62714.2024.10788064"},{"key":"2153_CR36","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2153_CR37","unstructured":"Canadian Institute for Cybersecurity (2017) IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. University of New Brunswick. Accessed: 2024-06-09. https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"2153_CR38","unstructured":"Canadian Institute for Cybersecurity (2018) IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. University of New Brunswick. Accessed: 2024-06-09. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html"},{"key":"2153_CR39","doi-asserted-by":"publisher","unstructured":"Glavan A, Croitoru V (2023) Incremental learning for edge network intrusion detection. Revue Roumaine des Sciences Techniques, S rie lectrotechnique et nerg tique 68:301\u2013306. https:\/\/doi.org\/10.59277\/RRST-EE.2023.3.9","DOI":"10.59277\/RRST-EE.2023.3.9"},{"key":"2153_CR40","doi-asserted-by":"publisher","unstructured":"Zhao Y, Bi Z, Xu G, Wang C, Xu G (2023) Tree-ids: An incremental intrusion detection system for connected vehicles. In: 2023 IEEE 48th Conference on local computer networks (LCN), pp 1\u20134. https:\/\/doi.org\/10.1109\/LCN58197.2023.10223397","DOI":"10.1109\/LCN58197.2023.10223397"},{"key":"2153_CR41","doi-asserted-by":"publisher","first-page":"18972","DOI":"10.1109\/ACCESS.2024.3361041","volume":"12","author":"A Abdulboriy","year":"2024","unstructured":"Abdulboriy A, Shin JS (2024) An incremental majority voting approach for intrusion detection system based on machine learning. IEEE Access 12:18972\u201318986. https:\/\/doi.org\/10.1109\/ACCESS.2024.3361041","journal-title":"IEEE Access"},{"key":"2153_CR42","doi-asserted-by":"publisher","unstructured":"Sharma H, Kumar P, Sharma K (2024) Recurrent neural network based incremental model for intrusion detection system in iot. Scalable Computing: Practice and Experience 25(5), 3778\u20133795. https:\/\/doi.org\/10.12694\/scpe.v25i5.3004","DOI":"10.12694\/scpe.v25i5.3004"},{"key":"2153_CR43","unstructured":"Bhurani P, Chouhan SS, Mittal N (2024) Exbcil: an exemplar-based class incremental learning for intrusion detection system. International Journal of Machine Learning and Cybernetics, pp 1\u201321"},{"key":"2153_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103982","volume":"144","author":"YA Farrukh","year":"2024","unstructured":"Farrukh YA, Wali S, Khan I, Bastian ND (2024) Ais-nids: An intelligent and self-sustaining network intrusion detection system. Comput & Secur 144:103982. https:\/\/doi.org\/10.1016\/j.cose.2024.103982","journal-title":"Comput & Secur"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02153-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02153-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02153-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:19Z","timestamp":1765622239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02153-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2153"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02153-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"16 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"326"}}