{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:53:30Z","timestamp":1775598810347,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12083-025-02172-9","type":"journal-article","created":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T04:04:01Z","timestamp":1767499441000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An autonomous intrusion detection framework leveraging multi-layered stacking ensemble architectures with dynamic machine learning-driven feature subset optimisation"],"prefix":"10.1007","volume":"19","author":[{"given":"Faraj","family":"Chishti","sequence":"first","affiliation":[]},{"given":"Geetanjali","family":"Rathee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"issue":"4","key":"2172_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3399669","volume":"53","author":"A Pekar","year":"2020","unstructured":"Pekar A, Mocnej J, Seah WK, Zolotova I (2020) Application domain-based overview of IoT network traffic characteristics. ACM Comput Surv (CSUR) 53(4):1\u201333","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"3","key":"2172_CR2","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor 22(3):1686\u20131721","journal-title":"IEEE Commun Surv Tutor"},{"key":"2172_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100365","volume":"14","author":"R Ahmad","year":"2021","unstructured":"Ahmad R, Alsmadi I (2021) Machine learning approaches to IoT security: a systematic literature review. Internet Things 14:100365","journal-title":"Internet Things"},{"key":"2172_CR4","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","volume":"171","author":"T Saranya","year":"2020","unstructured":"Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA (2020) Performance analysis of machine learning algorithms in intrusion detection system: a review. Proc Comput Sci 171:1251\u20131260","journal-title":"Proc Comput Sci"},{"key":"2172_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462","volume":"16","author":"AS Dina","year":"2021","unstructured":"Dina AS, Manivannan D (2021) Intrusion detection based on machine learning techniques in computer networks. Internet Things 16:100462","journal-title":"Internet Things"},{"key":"2172_CR6","doi-asserted-by":"crossref","unstructured":"Sowmya T, Anita EM (2023) A comprehensive review of AI based intrusion detection system.\u00a0Meas: Sens\u00a028:100827","DOI":"10.1016\/j.measen.2023.100827"},{"issue":"1","key":"2172_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao HJ, Lin CHR, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"key":"2172_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103546","volume":"136","author":"A Paya","year":"2024","unstructured":"Paya A, Arroni S, Garc\u00eda-D\u00edaz V, G\u00f3mez A (2024) Apollon: a robust defense system against adversarial machine learning attacks in intrusion detection systems. Comput Secur 136:103546","journal-title":"Comput Secur"},{"key":"2172_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108836","volume":"110","author":"Y Cao","year":"2023","unstructured":"Cao Y, Wang Z, Ding H, Zhang J, Li B (2023) An intrusion detection system based on stacked ensemble learning for IoT network. Comput Electr Eng 110:108836","journal-title":"Comput Electr Eng"},{"key":"2172_CR10","doi-asserted-by":"publisher","first-page":"100306","DOI":"10.1016\/j.array.2023.100306","volume":"19","author":"MA Hossain","year":"2023","unstructured":"Hossain MA, Islam MS (2023) Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array 19:100306","journal-title":"Array"},{"issue":"2","key":"2172_CR11","first-page":"7","volume":"4","author":"A Panigrah","year":"2016","unstructured":"Panigrah A, Patra MR (2016) Fuzzy rough classification models for network intrusion detection. Trans Mach Learn Artif Intell 4(2):7\u201322","journal-title":"Trans Mach Learn Artif Intell"},{"key":"2172_CR12","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama BA, Nkenyereye L, Islam SR, Kwak KS (2020) An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access 8:24120\u201324134","journal-title":"IEEE Access"},{"key":"2172_CR13","volume":"55","author":"G Kaur","year":"2020","unstructured":"Kaur G (2020) A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment. J Inf Secur Appl 55:102601","journal-title":"J Inf Secur Appl"},{"key":"2172_CR14","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1016\/j.procs.2020.04.085","volume":"171","author":"P Bedi","year":"2020","unstructured":"Bedi P, Gupta N, Jindal V (2020) Siam-IDS: handling class imbalance problem in intrusion detection systems using siamese neural network. Proc Comput Sci 171:780\u2013789","journal-title":"Proc Comput Sci"},{"issue":"18","key":"2172_CR15","doi-asserted-by":"publisher","first-page":"15387","DOI":"10.1007\/s00521-020-04986-5","volume":"34","author":"H Rajadurai","year":"2022","unstructured":"Rajadurai H, Gandhi UD (2022) A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput Appl 34(18):15387\u201315395","journal-title":"Neural Comput Appl"},{"key":"2172_CR16","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.820","volume":"8","author":"HA Ahmed","year":"2022","unstructured":"Ahmed HA, Hameed A, Bawany NZ (2022) Network intrusion detection using oversampling technique and machine learning algorithms. PeerJ Comput Sci 8:e820","journal-title":"PeerJ Comput Sci"},{"key":"2172_CR17","doi-asserted-by":"crossref","unstructured":"Paulauskas N, Auskalnis J (2017) Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset. In: 2017 Open Conference of Electrical, Electronic and Information Sciences, eStream 2017 - Proceedings of the Conference","DOI":"10.1109\/eStream.2017.7950325"},{"issue":"3","key":"2172_CR18","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa N, Turnbull B, Choo KKR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815\u20134830","journal-title":"IEEE Internet Things J"},{"issue":"24","key":"2172_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17249347","volume":"17","author":"MM Rashid","year":"2020","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Gordon S (2020) Cyberattacks detection in IoT-based smart city applications using machine learning techniques. Int J Environ Res Public Health 17(24):9347","journal-title":"Int J Environ Res Public Health"},{"key":"2172_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Networks 174:107247","journal-title":"Comput Networks"},{"issue":"3","key":"2172_CR21","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.jksuci.2019.05.001","volume":"34","author":"S Subudhi","year":"2022","unstructured":"Subudhi S, Panigrahi S (2022) Application of OPTICS and ensemble learning for database intrusion detection. J King Saud Univ-Comput Inf Sci 34(3):972\u2013981","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"2172_CR22","doi-asserted-by":"crossref","unstructured":"Olasehinde OO, Johnson OV, Olayemi OC (2020) Evaluation of selected meta learning algorithms for the prediction improvement of network intrusion detection system. In: 2020 International Conference in Mathematics, Computer Engineering and Computer Science. ICMCECS","DOI":"10.1109\/ICMCECS47690.2020.240893"},{"key":"2172_CR23","doi-asserted-by":"crossref","unstructured":"Rahman S, Mursal SN, Latif MA, Mushtaq Z, Irfan M, Waqar A (2022) Enhancing network intrusion detection using effective stacking of ensemble classifiers with multi-pronged feature selection technique. 2023 2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2023 - Proceedings","DOI":"10.1109\/ETECTE59617.2023.10396717"},{"issue":"5","key":"2172_CR24","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1007\/s11036-023-02225-4","volume":"29","author":"P Verma","year":"2024","unstructured":"Verma P, Kowsik ARK, Pateriya RK, Bharot N, Vidyarthi A, Gupta D (2024) A stacked ensemble approach to generalize the classifier prediction for the detection of DDoS attack in cloud network. Mob Netw Appl 29(5):1618\u20131632","journal-title":"Mob Netw Appl"},{"key":"2172_CR25","doi-asserted-by":"crossref","unstructured":"Syarif I, Zaluska E, Prugel-Bennett A, Wills G (2012) Application of bagging, boosting and stacking to intrusion detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","DOI":"10.1007\/978-3-642-31537-4_46"},{"issue":"4","key":"2172_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/app13042479","volume":"13","author":"JB Awotunde","year":"2023","unstructured":"Awotunde JB, Folorunso SO, Imoize AL, Odunuga JO, Lee CC, Li CT, Do DT (2023) An ensemble tree-based model for intrusion detection in industrial internet of things networks. Appl Sci 13(4):2479","journal-title":"Appl Sci"},{"issue":"5","key":"2172_CR27","doi-asserted-by":"publisher","first-page":"5693","DOI":"10.1007\/s40747-023-01013-7","volume":"9","author":"N Thockchom","year":"2023","unstructured":"Thockchom N, Singh MM, Nandi U (2023) A novel ensemble learning-based model for network intrusion detection. Complex Intell. Syst 9(5):5693\u20135714","journal-title":"Complex Intell. Syst"},{"key":"2172_CR28","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TMLCN.2024.3395419","volume":"2","author":"MF Saiyedand","year":"2024","unstructured":"Saiyedand MF, Al-Anbagi I (2024) Deep ensemble learning with pruning for DDoS attack detection in IoT networks. IEEE Trans Mach Learn Commun Netw 2:596\u2013616","journal-title":"IEEE Trans Mach Learn Commun Netw"},{"key":"2172_CR29","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","volume":"127","author":"S Roy","year":"2022","unstructured":"Roy S, Li J, Choi BJ, Bai Y (2022) A lightweight supervised intrusion detection mechanism for IoT networks. Fut Gener Comput Syst 127:276\u2013285","journal-title":"Fut Gener Comput Syst"},{"key":"2172_CR30","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1016\/j.procs.2023.01.153","volume":"218","author":"R Golchha","year":"2023","unstructured":"Golchha R, Joshi A, Gupta GP (2023) Voting-based ensemble learning approach for cyber attacks detection in industrial internet of things. Proc Comput Sci 218:1752\u20131759","journal-title":"Proc Comput Sci"},{"issue":"3","key":"2172_CR31","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1007\/s10586-023-04168-7","volume":"27","author":"F Jemili","year":"2024","unstructured":"Jemili F, Meddeb R, Korbaa O (2024) Intrusion detection based on ensemble learning for big data classification. Cluster Comput 27(3):3771\u20133798","journal-title":"Cluster Comput"},{"key":"2172_CR32","doi-asserted-by":"publisher","first-page":"83830","DOI":"10.1109\/ACCESS.2024.3407029","volume":"12","author":"O Arreche","year":"2024","unstructured":"Arreche O, Bibers I, Abdallah M (2024) A two-level ensemble learning framework for enhancing network intrusion detection systems. IEEE Access 12:83830\u201383857","journal-title":"IEEE Access"},{"key":"2172_CR33","doi-asserted-by":"crossref","unstructured":"Sama NU, Ullah S, Kazmi SA, Mazzara M (2024) Cutting-edge intrusion detection in IoT networks: a focus on ensemble models. IEEE Access","DOI":"10.1109\/ACCESS.2024.3491831"},{"key":"2172_CR34","unstructured":"NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB (n.d.)"},{"issue":"1\u20133","key":"2172_CR35","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J Glob Perspect 25(1\u20133):18\u201331","journal-title":"Inf Secur J Glob Perspect"},{"key":"2172_CR36","unstructured":"IDS (2017) | Datasets | Research | Canadian Institute for Cybersecurity | UNB"},{"key":"2172_CR37","doi-asserted-by":"crossref","unstructured":"Moustafa N, Keshky M, Debiez E, Janicke H (2020) Federated TON_IoT windows datasets for evaluating AI-based security applications. In: Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom","DOI":"10.1109\/TrustCom50675.2020.00114"},{"issue":"1","key":"2172_CR38","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar G, Sahin F (2014) A survey on feature selection methods. Comput Electr Eng 40(1):16\u201328","journal-title":"Comput Electr Eng"},{"issue":"10","key":"2172_CR39","doi-asserted-by":"publisher","first-page":"4844","DOI":"10.1109\/TNNLS.2017.2769128","volume":"29","author":"J Huo","year":"2018","unstructured":"Huo J, Gao Y, Shi Y, Yin H (2018) Cross-modal metric learning for AUC optimization. IEEE Trans Neural Netw Learn Syst 29(10):4844\u20134856","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2172_CR40","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2019.11.016","volume":"387","author":"C Ieracitano","year":"2020","unstructured":"Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387:51\u201362","journal-title":"Neurocomputing"},{"key":"2172_CR41","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.future.2021.03.024","volume":"122","author":"H Zhang","year":"2021","unstructured":"Zhang H, Li JL, Liu XM, Dong C (2021) Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Future Gener Comput Syst 122:130\u2013143","journal-title":"Future Gener Comput Syst"},{"key":"2172_CR42","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255\u2013277","journal-title":"Comput Secur"},{"issue":"10","key":"2172_CR43","doi-asserted-by":"publisher","first-page":"10125","DOI":"10.1109\/TII.2022.3231424","volume":"19","author":"F Khan","year":"2023","unstructured":"Khan F, Jan MA, Alturki R, Alshehri MD, Shah ST, ur Rehman A (2023) A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT. IEEE Trans Ind Inf 19(10):10125\u201310132","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"2172_CR44","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3233\/JHS-190620","volume":"25","author":"M Catillo","year":"2019","unstructured":"Catillo M, Rak M, Villano U (2019) Discovery of DoS attacks by the ZED-IDS anomaly detector. J High Speed Netw 25(4):349\u2013365","journal-title":"J High Speed Netw"},{"issue":"4","key":"2172_CR45","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1111\/coin.12220","volume":"35","author":"W Elmasry","year":"2019","unstructured":"Elmasry W, Akbulut A, Zaim AH (2019) Empirical study on multiclass classification-based network intrusion detection. Comput Intell 35(4):919\u2013954","journal-title":"Comput Intell"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02172-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02172-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:19:37Z","timestamp":1773145177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02172-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2172"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02172-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"7 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"37"}}