{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:43:50Z","timestamp":1775339030873,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s13042-024-02332-y","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T19:01:56Z","timestamp":1724785316000},"page":"1243-1263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Sapna","family":"Sadhwani","sequence":"first","affiliation":[]},{"given":"Aakar","family":"Mathur","sequence":"additional","affiliation":[]},{"given":"Raja","family":"Muthalagu","sequence":"additional","affiliation":[]},{"given":"Pranav M.","family":"Pawar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"2332_CR1","volume-title":"Techno-economic analysis of cloud computing supported by 5G: a cloud vs on premise based solutions comparison","author":"C Bouras","year":"2023","unstructured":"Bouras C, Chatzigeorgiou C, Kollia A, Pouyioutas P (2023) Techno-economic analysis of cloud computing supported by 5G: a cloud vs on premise based solutions comparison. Springer, Cham"},{"key":"2332_CR2","doi-asserted-by":"publisher","first-page":"86448","DOI":"10.1109\/ACCESS.2020.2992441","volume":"8","author":"A Kirimtat","year":"2020","unstructured":"Kirimtat A, Krejcar O, Kertesz A, Tasgetiren MF (2020) Future trends and current state of smart city concepts: a survey. IEEE Access 8:86448\u201386467. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992441","journal-title":"IEEE Access"},{"issue":"2","key":"2332_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2021.3139624","volume":"6","author":"S Aoki","year":"2022","unstructured":"Aoki S, Yonezawa T, Kawaguchi N (2022) Robotnest: toward a viable testbed for iot-enabled environments and connected and autonomous robots. IEEE Sens Lett 6(2):1\u20134. https:\/\/doi.org\/10.1109\/LSENS.2021.3139624","journal-title":"IEEE Sens Lett"},{"key":"2332_CR4","doi-asserted-by":"publisher","first-page":"73786","DOI":"10.1109\/ACCESS.2022.3188649","volume":"10","author":"S Condran","year":"2022","unstructured":"Condran S, Bewong M, Islam MZ, Maphosa L, Zheng L (2022) Machine learning in precision agriculture: a survey on trends, applications and evaluations over two decades. IEEE Access 10:73786\u201373803. https:\/\/doi.org\/10.1109\/ACCESS.2022.3188649","journal-title":"IEEE Access"},{"issue":"1","key":"2332_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","volume":"9","author":"A Imteaj","year":"2022","unstructured":"Imteaj A, Thakker U, Wang S, Li J, Amini MH (2022) A survey on federated learning for resource-constrained iot devices. IEEE Internet Things J 9(1):1\u201324. https:\/\/doi.org\/10.1109\/JIOT.2021.3095077","journal-title":"IEEE Internet Things J"},{"key":"2332_CR6","unstructured":"Cisco (2022) https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html"},{"key":"2332_CR7","unstructured":"Bhatia S (2013) Detecting distributed denial-of-service attacks and flash events. PhD thesis, Queensland University of Technology. https:\/\/eprints.qut.edu.au\/62031\/"},{"issue":"3","key":"2332_CR8","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1109\/TNSM.2023.3299606","volume":"20","author":"A Zainudin","year":"2023","unstructured":"Zainudin A, Akter R, Kim D-S, Lee J-M (2023) Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps. IEEE Trans Netw Serv Manage 20(3):2442\u20132459. https:\/\/doi.org\/10.1109\/TNSM.2023.3299606","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"1","key":"2332_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/JIOT.2021.3093538","volume":"9","author":"X Chen","year":"2022","unstructured":"Chen X, Feng W, Luo Y, Shen M, Ge N, Wang X (2022) Defending against link flooding attacks in internet of things: a Bayesian game approach. IEEE Internet Things J 9(1):117\u2013128. https:\/\/doi.org\/10.1109\/JIOT.2021.3093538","journal-title":"IEEE Internet Things J"},{"key":"2332_CR10","unstructured":"Kumar B, Sethia R, et al (2024) Analysing the effectiveness of intrusion detection systems against the mirai botnet: a comparative study. Grenze Int J Eng Technol (GIJET) 10"},{"key":"2332_CR11","doi-asserted-by":"publisher","unstructured":"A P, M K (2022) Comparative analysis of dos attack detection in kdd cup99 using machine learning classifier algorithms. In: 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), pp 1570\u20131573. https:\/\/doi.org\/10.1109\/ICESC54411.2022.9885694","DOI":"10.1109\/ICESC54411.2022.9885694"},{"key":"2332_CR12","doi-asserted-by":"publisher","unstructured":"Hussain J, Hnamte V (2021) Deep learning based intrusion detection system: software defined network. In: 2021 Asian Conference on Innovation in Technology (ASIANCON), pp 1\u20136. https:\/\/doi.org\/10.1109\/ASIANCON51346.2021.9544913","DOI":"10.1109\/ASIANCON51346.2021.9544913"},{"key":"2332_CR13","doi-asserted-by":"publisher","unstructured":"Dubey S, Dubey J (2015) Kbb: A hybrid method for intrusion detection. In: 2015 International Conference on computer, communication and control (IC4), pp 1\u20136. https:\/\/doi.org\/10.1109\/IC4.2015.7375704","DOI":"10.1109\/IC4.2015.7375704"},{"key":"2332_CR14","doi-asserted-by":"publisher","unstructured":"Panwar SS, Raiwani YP, Panwar LS (2022) An intrusion detection model for cicids-2017 dataset using machine learning algorithms. In: 2022 International Conference on Advances in Computing, Communication and Materials (ICACCM), pp 1\u201310. https:\/\/doi.org\/10.1109\/ICACCM56405.2022.10009400","DOI":"10.1109\/ICACCM56405.2022.10009400"},{"key":"2332_CR15","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"SD Kurniabudi","year":"2020","unstructured":"Kurniabudi SD, Darmawijoyo BIMY, Bamhdi AM, Budiarto R (2020) Cicids-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8:132911\u2013132921. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843","journal-title":"IEEE Access"},{"key":"2332_CR16","doi-asserted-by":"publisher","unstructured":"Disha RA, Waheed S (2021) A comparative study of machine learning models for network intrusion detection system using unsw-nb 15 dataset. In: 2021 International Conference on Electronics, Communications and Information Technology (ICECIT), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICECIT54077.2021.9641471","DOI":"10.1109\/ICECIT54077.2021.9641471"},{"key":"2332_CR17","doi-asserted-by":"publisher","unstructured":"Tiwari G, Jain R (2022) Detecting and classifying incoming traffic in a secure cloud computing environment using machine learning and deep learning system. In: 2022 IEEE 7th International Conference on Smart Cloud (SmartCloud), pp 16\u201321. https:\/\/doi.org\/10.1109\/SmartCloud55982.2022.00010","DOI":"10.1109\/SmartCloud55982.2022.00010"},{"key":"2332_CR18","doi-asserted-by":"publisher","DOI":"10.3390\/app13179937","author":"S Sadhwani","year":"2023","unstructured":"Sadhwani S, Manibalan B, Muthalagu R, Pawar P (2023) A lightweight model for ddos attack detection using machine learning techniques. Appl Sci. https:\/\/doi.org\/10.3390\/app13179937","journal-title":"Appl Sci"},{"key":"2332_CR19","doi-asserted-by":"publisher","unstructured":"Gupta BB, Tai\u00a0Chui K, Gaurav A, Arya V (2023) Gru-based ddos detection for enhanced security in consumer electronics. In: 2023 IEEE 13th International Conference on Consumer Electronics\u2014Berlin (ICCE-Berlin), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICCE-Berlin58801.2023.10375584","DOI":"10.1109\/ICCE-Berlin58801.2023.10375584"},{"key":"2332_CR20","doi-asserted-by":"publisher","unstructured":"Zhong Y, Yang B, Li Y, Yang H, Li X, Zhang Y (2023) Tackling sybil attacks in intelligent connected vehicles: a review of machine learning and deep learning techniques. In: 2023 8th International Conference on Computational Intelligence and Applications (ICCIA), pp 8\u201312. https:\/\/doi.org\/10.1109\/ICCIA59741.2023.00010","DOI":"10.1109\/ICCIA59741.2023.00010"},{"key":"2332_CR21","doi-asserted-by":"publisher","unstructured":"Das R, Luo T (2023) Lightesd: Fully-automated and lightweight anomaly detection framework for edge computing. In: 2023 IEEE International Conference on Edge Computing and Communications (EDGE), pp 150\u2013158. https:\/\/doi.org\/10.1109\/EDGE60047.2023.00032","DOI":"10.1109\/EDGE60047.2023.00032"},{"key":"2332_CR22","unstructured":"Samarakoon S, Siriwardhana Y, Porambage P, Liyanage M, Chang S-Y, Kim J, Kim J, Ylianttila M (2022) 5G-NIDD: a comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network"},{"key":"2332_CR23","doi-asserted-by":"crossref","unstructured":"Ghani H, Salekzamankhani S, Virdee B (2023) Critical analysis of 5G networks traffic intrusion using pca, t-sne and umap visualization and classifying attacks. arXiv.org","DOI":"10.1007\/978-981-99-6544-1_32"},{"key":"2332_CR24","unstructured":"Ahmed M (2023) Zero-day network intrusion detection using machine learning approach. Auricle Technologies, Pvt., Ltd. https:\/\/www.academia.edu\/109826719\/Zero_day_Network_Intrusion_Detection_using_Machine_Learning_Approach"},{"key":"2332_CR25","doi-asserted-by":"publisher","unstructured":"Yang L, Rajab M, Shami A, Muhaidat S (2023) Diving into zero-touch network security: use-case driven analysis. TechRxiv. https:\/\/doi.org\/10.36227\/techrxiv.23981331.v1","DOI":"10.36227\/techrxiv.23981331.v1"},{"key":"2332_CR26","doi-asserted-by":"publisher","unstructured":"Park C, Park K, Song J, Kim J (2023) Distributed learning-based intrusion detection in 5g and beyond networks, pp 490\u2013495. https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit58263.2023.10188312","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188312"},{"key":"2332_CR27","doi-asserted-by":"publisher","unstructured":"Farzaneh B, Shahriar N, Al\u00a0Muktadir AH, Towhid MS (2023) Dtl-ids: Deep transfer learning-based intrusion detection system in 5g networks. In: 2023 19th International Conference on Network and Service Management (CNSM), pp 1\u20135. https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327918","DOI":"10.23919\/CNSM59352.2023.10327918"},{"key":"2332_CR28","unstructured":"Zainudin A, Alief RN, Putra MAP, Akter R, Kim D-S, Lee J-M (2022) Blockchain-assisted privacy-preserving intrusion detection for secured metaverse. dbpia"},{"key":"2332_CR29","unstructured":"Muhtasim\u00a0Hossain F (1970) Continual federated learning for network anomaly detection in 5G open-ran. Jultika"},{"key":"2332_CR30","unstructured":"Hassan R (2023) Securing 5G networks with federated learning and gan. UNItesi"},{"key":"2332_CR31","doi-asserted-by":"publisher","unstructured":"Altunay HC, Albayrak Z (2021) Network intrusion detection approach based on convolutional neural network. Avrupa Bilim ve Teknoloji Dergisi 26:22\u201329. https:\/\/doi.org\/10.31590\/ejosat.954966","DOI":"10.31590\/ejosat.954966"},{"key":"2332_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322","author":"H Altunay","year":"2023","unstructured":"Altunay H, Albayrak Z (2023) A hybrid cnn + lstm-based intrusion detection system for industrial iot networks. Eng Sci Technol. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol"},{"key":"2332_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614","author":"ZK Maseer","year":"2021","unstructured":"Maseer ZK, Yusof R, Bahaman N, Mostafa SA, Foozy CFM (2021) Benchmarking of machine learning for anomaly based intrusion detection systems in the cicids2017 dataset. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056614","journal-title":"IEEE Access"},{"key":"2332_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/app13095427","author":"S Alosaimi","year":"2023","unstructured":"Alosaimi S, Almutairi SM (2023) An intrusion detection system using bot-iot. Appl Sci. https:\/\/doi.org\/10.3390\/app13095427","journal-title":"Appl Sci"},{"key":"2332_CR35","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo SM (2023) A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput Commun 199:113\u2013125. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput Commun"},{"key":"2332_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12020029","author":"D Musleh","year":"2023","unstructured":"Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM (2023) Intrusion detection system using feature extraction with machine learning algorithms in iot. J Sens Actuat Netw. https:\/\/doi.org\/10.3390\/jsan12020029","journal-title":"J Sens Actuat Netw"},{"issue":"12","key":"2332_CR37","doi-asserted-by":"publisher","first-page":"13241","DOI":"10.1007\/s11227-023-05197-0","volume":"79","author":"O Elnakib","year":"2023","unstructured":"Elnakib O, Shaaban E, Mahmoud M, Emara K (2023) EIDM: deep learning model for IoT intrusion detection systems. J Supercomput 79(12):13241\u201313261. https:\/\/doi.org\/10.1007\/s11227-023-05197-0","journal-title":"J Supercomput"},{"key":"2332_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100077","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J (2023) Dependable intrusion detection system using deep convolutional neural network: a novel framework and performance evaluation approach. Telemat Inform Rep 11:100077. https:\/\/doi.org\/10.1016\/j.teler.2023.100077","journal-title":"Telemat Inform Rep"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02332-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02332-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02332-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T10:42:18Z","timestamp":1738665738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02332-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["2332"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02332-y","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"23 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}