{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:45:34Z","timestamp":1771613134138,"version":"3.50.1"},"reference-count":103,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Mobile Edge Computing (MEC) model attracts more users to its services due to its characteristics and rapid delivery approach. This network architecture capability enables users to access the information from the edge of the network. But, the security of this edge network architecture is a big challenge. All the MEC services are available in a shared manner and accessed by users via the Internet. Attacks like the user to root, remote login, Denial of Service (DoS), snooping, port scanning, etc., can be possible in this computing environment due to Internet-based remote service. Intrusion detection is an approach to protect the network by detecting attacks. Existing detection models can detect only the known attacks and the efficiency for monitoring the real-time network traffic is low. The existing intrusion detection solutions cannot identify new unknown attacks. Hence, there is a need of an Edge-based Hybrid Intrusion Detection Framework (EHIDF) that not only detects known attacks but also capable of detecting unknown attacks in real time with low False Alarm Rate (FAR). This paper aims to propose an EHIDF which is mainly considered the Machine Learning (ML) approach for detecting intrusive traffics in the MEC environment. The proposed framework consists of three intrusion detection modules with three different classifiers. The Signature Detection Module (SDM) uses a C4.5 classifier, Anomaly Detection Module (ADM) uses Naive-based classifier, and Hybrid Detection Module (HDM) uses the Meta-AdaboostM1 algorithm. The developed EHIDF can solve the present detection problems by detecting new unknown attacks with low FAR. The implementation results illustrate that EHIDF accuracy is 90.25% and FAR is 1.1%. These results are compared with previous works and found improved performance. The accuracy is improved up to 10.78% and FAR is reduced up to 93%. A game-theoretical approach is also discussed to analyze the security strength of the proposed framework.<\/jats:p>","DOI":"10.1007\/s40747-021-00498-4","type":"journal-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T22:26:43Z","timestamp":1629930403000},"page":"3719-3746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["An edge based hybrid intrusion detection framework for mobile edge computing"],"prefix":"10.1007","volume":"8","author":[{"given":"Ashish","family":"Singh","sequence":"first","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Suresh Chandra","family":"Satapathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"issue":"1","key":"498_CR1","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2017","unstructured":"Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450\u2013465","journal-title":"IEEE Internet Things J"},{"key":"498_CR2","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan WZ, Ahmed E, Hakak S, Yaqoob I, Ahmed A (2019) Edge computing: a survey. Future Gener Comput Syst 97:219\u2013235","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"498_CR3","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1109\/COMST.2021.3061981","volume":"23","author":"Y Siriwardhana","year":"2021","unstructured":"Siriwardhana Y, Porambage P, Liyanage M, Ylianttila M (2021) A survey on mobile augmented reality with 5G mobile edge computing: architectures, applications, and technical aspects. IEEE Commun Surv Tutor 23(2):1160\u20131192","journal-title":"IEEE Commun Surv Tutor"},{"key":"498_CR4","doi-asserted-by":"crossref","unstructured":"Cao H, Wachowicz M, Cha S (2017) Developing an edge computing platform for real-time descriptive analytics. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp 4546\u20134554","DOI":"10.1109\/BigData.2017.8258497"},{"issue":"4","key":"498_CR5","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCE.2016.2590118","volume":"5","author":"D Sabella","year":"2016","unstructured":"Sabella D, Vaillant A, Kuure P, Rauschenbach U, Giust F (2016) Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum Electron Mag 5(4):84\u201391","journal-title":"IEEE Consum Electron Mag"},{"issue":"3","key":"498_CR6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2019.1800411","volume":"26","author":"DD Yueyue","year":"2019","unstructured":"Yueyue DD, Maharjan S, Qiao G, Zhang Y (2019) Artificial intelligence empowered edge computing and caching for internet of vehicles. IEEE Wirel Commun 26(3):12\u201318","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"498_CR7","doi-asserted-by":"crossref","first-page":"4049","DOI":"10.1109\/JIOT.2018.2876088","volume":"6","author":"M Asif-Ur-Rahman","year":"2018","unstructured":"Asif-Ur-Rahman M, Afsana F, Mahmud M, Kaiser MS, Ahmed MR, Kaiwartya O, James-Taylor A (2018) Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J 6(3):4049\u20134062","journal-title":"IEEE Internet Things J"},{"key":"498_CR8","doi-asserted-by":"crossref","unstructured":"Farhin F, Shamim KM, Mahmud M (2020) Towards secured service provisioning for the Internet of Healthcare Things. In: 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT), IEEE, pp 1\u20136","DOI":"10.1109\/AICT50176.2020.9368580"},{"key":"498_CR9","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-981-33-4673-4_36","volume-title":"Proceedings of international conference on trends in computational and cognitive engineering","author":"F Farhin","year":"2021","unstructured":"Farhin F, Shamim KM, Mahmud M (2021) Secured smart healthcare system: blockchain and bayesian inference based approach. Proceedings of international conference on trends in computational and cognitive engineering. Springer, Berlin, pp 455\u2013465"},{"key":"498_CR10","first-page":"317","volume-title":"Proceedings of international conference on trends in computational and cognitive engineering","author":"KM Shamim","year":"2021","unstructured":"Shamim KM, Zenia N, Tabassum F, Mamun SA, Arifur RM, Shahidul IM, Mahmud M (2021) 6G Access network for intelligent internet of healthcare things: opportunity, challenges, and research directions. Proceedings of international conference on trends in computational and cognitive engineering. Springer, Berlin, pp 317\u2013328"},{"issue":"7","key":"498_CR11","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/S1361-3723(04)00087-9","volume":"2004","author":"S Furnell","year":"2004","unstructured":"Furnell S (2004) Enemies within: the problem of insider attacks. Comput Fraud Secur 2004(7):6\u201311","journal-title":"Comput Fraud Secur"},{"issue":"2","key":"498_CR12","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1504\/IJHPCN.2019.097510","volume":"13","author":"P Sharma","year":"2019","unstructured":"Sharma P, Sengupta J, Suri PK (2019) Survey of intrusion detection techniques and architectures in cloud computing. Int J High Perform Comput Netw 13(2):184\u2013198","journal-title":"Int J High Perform Comput Netw"},{"key":"498_CR13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.cose.2018.12.005","volume":"83","author":"YR Mahesh Yadav","year":"2019","unstructured":"Mahesh Yadav YR (2019) Effective analysis of malware detection in cloud computing. Comput Secur 83:14\u201321","journal-title":"Comput Secur"},{"key":"498_CR14","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680\u2013698","journal-title":"Future Gener Comput Syst"},{"key":"498_CR15","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-3-030-34328-6_14","volume-title":"Internet of things in smart technologies for sustainable urban development","author":"S Vimal","year":"2020","unstructured":"Vimal S, Suresh A, Subbulakshmi P, Pradeepa S, Kaliappan M (2020) Edge computing-based intrusion detection system for smart cities development using IoT in urban areas. Internet of things in smart technologies for sustainable urban development. Springer, Berlin, pp 219\u2013237"},{"key":"498_CR16","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.jpdc.2019.12.008","volume":"137","author":"AS Almogren","year":"2020","unstructured":"Almogren AS (2020) Intrusion detection in Edge-of-Things computing. J Parallel Distrib Comput 137:259\u2013265","journal-title":"J Parallel Distrib Comput"},{"key":"498_CR17","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954\u201321961","journal-title":"IEEE Access"},{"issue":"7","key":"498_CR18","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.3390\/electronics9071120","volume":"9","author":"C Liang","year":"2020","unstructured":"Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, Kavianpour S, Idris NB (2020) Intrusion detection system for the Internet of Things based on blockchain and multi-agent systems. Electronics 9(7):1120","journal-title":"Electronics"},{"issue":"4","key":"498_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3382159","volume":"11","author":"A Mudgerikar","year":"2020","unstructured":"Mudgerikar A, Sharma P, Bertino E (2020) Edge-based intrusion detection for IoT devices. ACM Trans Manag Inform Syst (TMIS) 11(4):1\u201321","journal-title":"ACM Trans Manag Inform Syst (TMIS)"},{"key":"498_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8860418","author":"X Cao","year":"2020","unstructured":"Cao X, Fu Y, Chen B (2020) Packet-based intrusion detection using Bayesian topic models in mobile edge computing. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2020\/8860418","journal-title":"Secur Commun Netw"},{"issue":"8","key":"498_CR21","doi-asserted-by":"crossref","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari M, Haider Janjua Z, Vecchio M, Antonelli F (2020) Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J 7(8):6882\u20136897","journal-title":"IEEE Internet Things J"},{"key":"498_CR22","doi-asserted-by":"crossref","first-page":"61024","DOI":"10.1109\/ACCESS.2021.3074664","volume":"9","author":"RV Mendon\u00e7a","year":"2021","unstructured":"Mendon\u00e7a RV, Teodoro AAM, Rosa RL, Saadi M, Carrillo MD, Nardelli PHJ, Rodr\u00edguez DZ (2021) Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9:61024\u201361034","journal-title":"IEEE Access"},{"issue":"1","key":"498_CR23","first-page":"31","volume":"2","author":"A Abid Salih","year":"2021","unstructured":"Abid Salih A, Mohsin AA (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31\u201340","journal-title":"J Soft Comput Data Min"},{"issue":"4","key":"498_CR24","doi-asserted-by":"crossref","first-page":"e4221","DOI":"10.1002\/ett.4221","volume":"32","author":"M Ramaiah","year":"2021","unstructured":"Ramaiah M, Chandrasekaran V, Ravi V, Kumar N (2021) An intrusion detection system using optimized deep neural network architecture. Trans Emerg Telecommun Technol 32(4):e4221","journal-title":"Trans Emerg Telecommun Technol"},{"key":"498_CR25","first-page":"815","volume-title":"Research in intelligent and computing in engineering","author":"BN Singh","year":"2021","unstructured":"Singh BN, Khari M (2021) A survey on hybrid intrusion detection techniques. Research in intelligent and computing in engineering. Springer, Berlin, pp 815\u2013825"},{"key":"498_CR26","doi-asserted-by":"crossref","first-page":"103770","DOI":"10.1016\/j.engappai.2020.103770","volume":"94","author":"A Shahraki","year":"2020","unstructured":"Shahraki A, Abbasi M, Haugen O (2020) Boosting algorithms for network intrusion detection: a comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Eng Appli Artif Intell 94:103770","journal-title":"Eng Appli Artif Intell"},{"issue":"2","key":"498_CR27","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","volume":"6","author":"K Sha","year":"2020","unstructured":"Sha K, Yang TA, Wei W, Davari S (2020) A survey of edge computing-based designs for IoT security. Digit Commun Netw 6(2):195\u2013202","journal-title":"Digit Commun Netw"},{"issue":"9","key":"498_CR28","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1007\/s12652-018-1093-8","volume":"10","author":"E Besharati","year":"2019","unstructured":"Besharati E, Naderan M, Namjoo E (2019) LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. J Ambient Intell Humaniz Comput 10(9):3669\u20133692","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"498_CR29","doi-asserted-by":"crossref","unstructured":"Bakshi A, Dujodwala YB (2010) Securing cloud from DDOS attacks using intrusion detection system in virtual machine. In: Communication Software and Networks, 2010. ICCSN10. Second International Conference, IEEE, pp 260\u2013264","DOI":"10.1109\/ICCSN.2010.56"},{"key":"498_CR30","first-page":"149","volume-title":"The boosting approach to machine learning: an overview Nonlinear estimation and classification","author":"RE Schapire","year":"2003","unstructured":"Schapire RE (2003) The boosting approach to machine learning: an overview Nonlinear estimation and classification. Springer, Berlin, pp 149\u2013171"},{"issue":"1","key":"498_CR31","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424\u2013430","journal-title":"Expert Syst Appl"},{"key":"498_CR32","doi-asserted-by":"crossref","unstructured":"Roschke S, Cheng F, Meinel C (2009) An extensible and virtualization-compatible IDS management architecture. In: 2009 Fifth International Conference on Information Assurance and Security, volume 2, IEEE, pp 130\u2013134","DOI":"10.1109\/IAS.2009.151"},{"issue":"10","key":"498_CR33","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/j.comcom.2007.05.002","volume":"30","author":"AN Toosi","year":"2007","unstructured":"Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201\u20132212","journal-title":"Comput Commun"},{"key":"498_CR34","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh S, Aldwairi M, Bani Yassein M (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152\u2013160","journal-title":"J Comput Sci"},{"issue":"2","key":"498_CR35","first-page":"109","volume":"4","author":"HM Sazzadul","year":"2012","unstructured":"Sazzadul HM, Mukit M, Bikas M, Naser A (2012) An implementation of intrusion detection system using genetic algorithm. Int J Netw Secur Appl (IJNSA) 4(2):109\u2013120","journal-title":"Int J Netw Secur Appl (IJNSA)"},{"issue":"1","key":"498_CR36","doi-asserted-by":"crossref","first-page":"85","DOI":"10.7763\/JACN.2014.V2.87","volume":"2","author":"U Subramanian","year":"2014","unstructured":"Subramanian U, Ong HS (2014) Analysis of the effect of clustering the training data in naive bayes classifier for anomaly network intrusion detection. J Adv Comput Netw 2(1):85\u201388","journal-title":"J Adv Comput Netw"},{"key":"498_CR37","doi-asserted-by":"crossref","unstructured":"Zhengbing H, Jun S, Shirochin VP (2007) An intelligent lightweight intrusion detection system with forensics technique. In: 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IEEE, pp 647\u2013651","DOI":"10.1109\/IDAACS.2007.4488501"},{"issue":"4","key":"498_CR38","first-page":"457","volume":"5","author":"IL Mohammad","year":"2010","unstructured":"Mohammad IL (2010) Anomaly network intrusion detection system based on distributed time-delay neural network (DTDNN). J Eng Sci Technol 5(4):457\u2013471","journal-title":"J Eng Sci Technol"},{"issue":"10","key":"498_CR39","doi-asserted-by":"crossref","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","volume":"32","author":"W-H Chen","year":"2005","unstructured":"Chen W-H, Hsu S-H, Shen H-P (2005) Application of SVM and ANN for intrusion detection. Comput Oper Res 32(10):2617\u20132634","journal-title":"Comput Oper Res"},{"issue":"1","key":"498_CR40","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.icte.2018.01.014","volume":"5","author":"B Hajimirzaei","year":"2019","unstructured":"Hajimirzaei B, Jafari NN (2019) Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1):56\u201359","journal-title":"ICT Express"},{"issue":"1","key":"498_CR41","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"S-J Horng","year":"2011","unstructured":"Horng S-J, Su M-Y, Chen Y-H, Kao T-W, Chen R-J, Lai J-L, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306\u2013313","journal-title":"Expert Syst Appl"},{"key":"498_CR42","doi-asserted-by":"crossref","unstructured":"Varshovi A, Rostamipour M, Sadeghiyan B (2014) A fuzzy Intrusion detection system based on categorization of attacks. In: 2014 6th Conference on Information and Knowledge Technology (IKT), pp 50\u201355","DOI":"10.1109\/IKT.2014.7030332"},{"key":"498_CR43","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.eswa.2017.07.005","volume":"88","author":"Akashdeep","year":"2017","unstructured":"Akashdeep, Manzoor I Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 8:249\u2013257","journal-title":"Expert Syst Appl"},{"key":"498_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sysarc.2019.01.017","volume":"97","author":"ME Dovom","year":"2019","unstructured":"Dovom ME, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Archit 97:1\u20137","journal-title":"J Syst Archit"},{"issue":"7","key":"498_CR45","first-page":"1435","volume":"1","author":"MMM Hassan","year":"2013","unstructured":"Hassan MMM (2013) Network intrusion detection system using genetic algorithm and fuzzy logic. Int J Innov Res Comput Commun Eng 1(7):1435\u20131445","journal-title":"Int J Innov Res Comput Commun Eng"},{"issue":"1","key":"498_CR46","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/s40815-016-0147-3","volume":"19","author":"S Raja","year":"2017","unstructured":"Raja S, Ramaiah S (2017) An efficient fuzzy-based hybrid system to cloud intrusion detection. Int J Fuzzy Syst 19(1):62\u201377","journal-title":"Int J Fuzzy Syst"},{"issue":"1","key":"498_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-016-0060-7","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan N, Ji S-Y, Chaudhary A, Concolato C, Yu B, Jeong DH (2016) A survey of cloud-based network intrusion detection analysis. Hum Centric Comput Inform Sci 6(1):1\u201316","journal-title":"Hum Centric Comput Inform Sci"},{"issue":"1","key":"498_CR48","doi-asserted-by":"crossref","first-page":"35","DOI":"10.5120\/5508-7533","volume":"41","author":"Hatem Hamad","year":"2012","unstructured":"Hamad Hatem, Al-Hoby Mahmoud (2012) Managing Intrusion Detection as a Service in Cloud Networks. International Journal of Computer Applications 41(1):35\u201340","journal-title":"International Journal of Computer Applications"},{"key":"498_CR49","doi-asserted-by":"crossref","unstructured":"Xuren W, Famei H, Rongsheng X (2006) Modeling intrusion detection system by discovering association rule in rough set theory framework. In: 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA06), IEEE, p 24","DOI":"10.1109\/CIMCA.2006.148"},{"key":"498_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2017.07.005","volume":"134","author":"RMR Gauthama","year":"2017","unstructured":"Gauthama RMR, Somu N, Kirthivasan K, Liscano R, Shankar SSVS (2017) An efficient intrusion detection system based on hypergraph: genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl-Based Syst 134:1\u201312","journal-title":"Knowl-Based Syst"},{"key":"498_CR51","doi-asserted-by":"crossref","unstructured":"Houmansadr A, Zonouz SA, Berthier R (2011) A cloud-based intrusion detection and response system for mobile phones. In: 2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), IEEE, pp 31\u201332","DOI":"10.1109\/DSNW.2011.5958860"},{"key":"498_CR52","first-page":"251","volume":"1","author":"H Li","year":"2010","unstructured":"Li H, Liu D (2010) Research on intelligent intrusion prevention system based on snort. Int Conf Comput Mechatron Control Electron Eng 1:251\u2013253","journal-title":"Int Conf Comput Mechatron Control Electron Eng"},{"key":"498_CR53","first-page":"169","volume":"6","author":"L Li","year":"2010","unstructured":"Li L, Yang D-Z, Shen F-C (2010) A novel rule-based Intrusion Detection System using data mining. Int Conf Comput Sci Inform Technol (CSIT) 6:169\u2013172","journal-title":"Int Conf Comput Sci Inform Technol (CSIT)"},{"key":"498_CR54","doi-asserted-by":"crossref","unstructured":"Senthilnayaki B, Venkatalakshmi K, Kannan A (2013) An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier. In: 2013 Fifth International Conference on Advanced Computing (ICoAC), IEEE, pp 1\u20137","DOI":"10.1109\/ICoAC.2013.6921918"},{"issue":"4","key":"498_CR55","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira K, Schulter A, Westphall C, Westphall C (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38\u201343","journal-title":"IT Prof"},{"key":"498_CR56","unstructured":"Xia T, Qu G, Hariri S, Yousif M (2005) An efficient network intrusion detection method based on information theory and genetic algorithm. In: PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, IEEE, pp 11\u201317"},{"issue":"3","key":"498_CR57","doi-asserted-by":"crossref","first-page":"e5242","DOI":"10.1002\/cpe.5242","volume":"33","author":"MKK Pradeep","year":"2021","unstructured":"Pradeep MKK, Saravanan M, Thenmozhi M, Vijayakumar K (2021) Intrusion detection system based on GA-fuzzy classifier for detecting malicious attacks. Concurr Comput 33(3):e5242","journal-title":"Concurr Comput"},{"key":"498_CR58","unstructured":"Botha M, Von Solms R, Perry K, Loubser E, Yamoyany G (2002) The utilization of artificial intelligence in a hybrid intrusion detection system. In: SAICSIT 02: Proceedings of the 2002 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, South African Institute for Computer Scientists and Information Technologists, pp 149\u2013155"},{"key":"498_CR59","first-page":"102582","volume":"55","author":"S Shamshirband","year":"2020","unstructured":"Shamshirband S, Fathi M, Chronopoulos AT, Montieri A, Palumbo F, Pescap\u00e8 A (2020) Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues. J Inform Secur Appl 55:102582","journal-title":"J Inform Secur Appl"},{"issue":"2","key":"498_CR60","first-page":"231","volume":"22","author":"E Mugabo","year":"2020","unstructured":"Mugabo E, Zhang Q-Y (2020) Intrusion detection method based on support vector machine and information gain for mobile cloud computing. IJ Netw Secur 22(2):231\u2013241","journal-title":"IJ Netw Secur"},{"key":"498_CR61","doi-asserted-by":"crossref","unstructured":"Basavaraj D, Tayeb S (2021) Limitations and challenges of Fog and edge-based computing. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), IEEE, pp 1\u20136","DOI":"10.1109\/IEMTRONICS52119.2021.9422535"},{"issue":"5","key":"498_CR62","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MWC.2007.4396943","volume":"14","author":"B Sun","year":"2007","unstructured":"Sun B, Osborne L, Xiao Y, Guizani S (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 14(5):56\u201363","journal-title":"IEEE Wirel Commun"},{"key":"498_CR63","doi-asserted-by":"crossref","first-page":"101283","DOI":"10.1016\/j.phycom.2021.101283","volume":"45","author":"S Lai","year":"2021","unstructured":"Lai S, Zhao R, Tang S, Xia J, Zhou F, Fan L (2021) Intelligent secure mobile edge computing for beyond 5G wireless networks. Phys Commun 45:101283","journal-title":"Phys Commun"},{"key":"498_CR64","doi-asserted-by":"crossref","first-page":"102974","DOI":"10.1016\/j.jnca.2021.102974","volume":"178","author":"A Shakarami","year":"2021","unstructured":"Shakarami A, Shahidinejad A, Ghobaei-Arani M (2021) An autonomous computation offloading strategy in Mobile Edge Computing: a deep learning-based hybrid approach. J Netw Comput Appl 178:102974","journal-title":"J Netw Comput Appl"},{"key":"498_CR65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3064225","author":"N Abdenacer","year":"2021","unstructured":"Abdenacer N, Hangxing W, Nabil AN, Dhelim S, Ning H (2021) A novel framework for mobile edge computing by optimizing task offloading. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2021.3064225","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"498_CR66","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/JPROC.2019.2921977","volume":"107","author":"J Chen","year":"2019","unstructured":"Chen J, Ran X (2019) Deep learning with edge computing: a review. Proc IEEE 107(8):1655\u20131674","journal-title":"Proc IEEE"},{"issue":"6","key":"498_CR67","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MCE.2018.2851723","volume":"7","author":"F Lin","year":"2018","unstructured":"Lin F, Zhou Y, An X, You I, Choo K-KR (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of Internet of Things devices. IEEE Consum Electron Mag 7(6):45\u201350","journal-title":"IEEE Consum Electron Mag"},{"issue":"5","key":"498_CR68","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MNET.001.1800479","volume":"33","author":"H Yao","year":"2019","unstructured":"Yao H, Gao P, Zhang P, Wang J, Jiang C, Lu L (2019) Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection. IEEE Netw 33(5):75\u201381","journal-title":"IEEE Netw"},{"key":"498_CR69","doi-asserted-by":"crossref","first-page":"102125","DOI":"10.1016\/j.simpat.2020.102125","volume":"105","author":"S Pe\u0161i\u0107","year":"2020","unstructured":"Pe\u0161i\u0107 S, Ivanovi\u0107 M, Radovanovi\u0107 M, B\u0103dic\u0103 C (2020) CAAVI-RICS model for observing the security of distributed IoT and edge computing systems. Simul Model Pract Theory 105:102125","journal-title":"Simul Model Pract Theory"},{"key":"498_CR70","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1007\/978-981-15-9129-7_36","volume-title":"International conference on security and privacy in digital economy","author":"Z Li","year":"2020","unstructured":"Li Z, Chen J, Zhang J, Cheng X, Chen B (2020) Detecting advanced persistent threat in edge computing via federated learning. International conference on security and privacy in digital economy. Springer, Berlin, pp 518\u2013532"},{"key":"498_CR71","doi-asserted-by":"crossref","first-page":"73907","DOI":"10.1109\/ACCESS.2020.2988055","volume":"8","author":"J Pacheco","year":"2020","unstructured":"Pacheco J, Benitez VH, Felix-Herran LC, Satam P (2020) Artificial neural networks-based intrusion detection system for Internet of Things fog nodes. IEEE Access 8:73907\u201373918","journal-title":"IEEE Access"},{"key":"498_CR72","first-page":"012179","volume":"1916","author":"P Aravamudhan","year":"2021","unstructured":"Aravamudhan P, Kanimozhi T (2021) A survey on intrusion detection system and prerequisite demands in IoT networks. J Phys 1916:012179","journal-title":"J Phys"},{"key":"498_CR73","doi-asserted-by":"crossref","first-page":"107647","DOI":"10.1016\/j.comnet.2020.107647","volume":"184","author":"K Naseer Qureshi","year":"2021","unstructured":"Naseer Qureshi K, Jeon G, Piccialli F (2021) Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput Netw 184:107647","journal-title":"Comput Netw"},{"key":"498_CR74","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6610675","author":"C Zhang","year":"2021","unstructured":"Zhang C, Chen Y, Meng Y, Ruan F, Chen R, Li Y, Yang Y (2021) A novel framework design of network intrusion detection based on machine learning techniques. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2021\/6610675","journal-title":"Secur Commun Netw"},{"key":"498_CR75","doi-asserted-by":"crossref","unstructured":"Markham T, Payne C (2001) Security at the network edge: a distributed firewall architecture. In: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901, volume\u00a01, IEEE, pp 279\u2013286","DOI":"10.1109\/DISCEX.2001.932222"},{"key":"498_CR76","first-page":"1","volume":"41","author":"AL-H Muna","year":"2018","unstructured":"Muna AL-H, Moustafa N (2018) Identification of malicious activities in industrial Internet of Things based on deep learning models. J Inform Secur Appl 41:1\u201311","journal-title":"J Inform Secur Appl"},{"key":"498_CR77","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1007\/978-3-319-93638-3_44","volume-title":"Australasian conference on information security and privacy","author":"W Meng","year":"2018","unstructured":"Meng W, Wang Y, Li W, Liu Z, Li J, Probst CW (2018) Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing. Australasian conference on information security and privacy. Springer, Berlin, pp 759\u2013767"},{"key":"498_CR78","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7136160","author":"Q Li","year":"2020","unstructured":"Li Q, Hou J, Meng S, Long H (2020) GLIDE: a game theory and data-driven mimicking linkage intrusion detection for edge computing networks. Complexity. https:\/\/doi.org\/10.1155\/2020\/7136160","journal-title":"Complexity"},{"key":"498_CR79","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","volume":"119","author":"R Kozik","year":"2018","unstructured":"Kozik R, Chora\u015b M, Ficco M, Palmieri F (2018) A scalable distributed machine learning approach for attack detection in edge computing environments. J Parallel Distrib Comput 119:18\u201326","journal-title":"J Parallel Distrib Comput"},{"key":"498_CR80","doi-asserted-by":"crossref","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw 90:101842","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"498_CR81","doi-asserted-by":"crossref","first-page":"178","DOI":"10.3390\/app9010178","volume":"9","author":"B Sudqi Khatar","year":"2019","unstructured":"Sudqi Khatar B, Abdul WAWB, Idris IMYIB, Abdulla HM, Ahmed IA (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178","journal-title":"Appl Sci"},{"key":"498_CR82","unstructured":"Sharma R, Aun CC, Leckie C (2020) Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: 2020 IFIP Networking Conference (Networking), IEEE, pp 343\u2013351"},{"key":"498_CR83","doi-asserted-by":"crossref","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simul Model Pract Theory 101:102031","journal-title":"Simul Model Pract Theory"},{"key":"498_CR84","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3076780","author":"H Liu","year":"2021","unstructured":"Liu H, Zhang S, Zhang P, Zhou X, Shao X, Pu G, Zhang Y (2021) Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2021.3076780","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"498_CR85","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-021-02016-z","volume":"2021","author":"Y Gong","year":"2021","unstructured":"Gong Y, Liu Y, Yin C (2021) A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computing. EURASIP J Wirel Commun Netw 2021(1):1\u201322","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"498_CR86","doi-asserted-by":"crossref","unstructured":"Idrissi I, Mostafa AM, Moussaoui O (2021) A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT. Int J Comput Digit Syst:1\u20138","DOI":"10.12785\/ijcds\/110117"},{"key":"498_CR87","doi-asserted-by":"crossref","unstructured":"Alghamdi R, Bellaiche M (2021) A deep intrusion detection system in lambda architecture based on edge cloud computing for IoT. In: 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD), IEEE, pp 561\u2013566","DOI":"10.1109\/ICAIBD51990.2021.9458974"},{"key":"498_CR88","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37\u201350","journal-title":"Comput Netw"},{"issue":"3","key":"498_CR89","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"MA Ayd\u0131n","year":"2009","unstructured":"Ayd\u0131n MA, Zaim AH, Ceylan KG (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35(3):517\u2013526","journal-title":"Comput Electr Eng"},{"issue":"1","key":"498_CR90","doi-asserted-by":"crossref","first-page":"173","DOI":"10.3390\/electronics9010173","volume":"9","author":"A Khraisat","year":"2020","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2020) Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine. Electronics 9(1):173","journal-title":"Electronics"},{"key":"498_CR91","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296\u2013303","journal-title":"Expert Syst Appl"},{"key":"498_CR92","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1075648","author":"\u00d6 Cepheli","year":"2016","unstructured":"Cepheli \u00d6, B\u00fcy\u00fck\u00e7orak S, Karabulut K (2016) Hybrid intrusion detection system for DDoS attacks. J Electr Comput Eng. https:\/\/doi.org\/10.1155\/2016\/1075648","journal-title":"J Electr Comput Eng"},{"issue":"1","key":"498_CR93","doi-asserted-by":"crossref","first-page":"10","DOI":"10.4236\/ait.2021.111002","volume":"11","author":"F Alghayadh","year":"2021","unstructured":"Alghayadh F, Debnath D (2021) A hybrid intrusion detection system for smart home security based on machine learning and user behavior. Adv Internet Things 11(1):10\u201325","journal-title":"Adv Internet Things"},{"key":"498_CR94","first-page":"1","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multi-tiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things 9:1\u201318","journal-title":"IEEE Internet Things"},{"key":"498_CR95","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-59439-2_5","volume-title":"Data analytics and decision support for cybersecurity","author":"N Moustafa","year":"2017","unstructured":"Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. Data analytics and decision support for cybersecurity. Springer, Berlin, pp 127\u2013156"},{"key":"498_CR96","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"498_CR97","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inform Secur J 25(1\u20133):18\u201331","DOI":"10.1080\/19393555.2015.1125974"},{"key":"498_CR98","doi-asserted-by":"crossref","unstructured":"Papamartzivanos D, G\u00f3mez M\u00e1rmol F, Kambourakis G (2018) Dendron: genetic trees driven rule induction for network intrusion detection systems. Future Gener Comput Syst 79:558\u2013574","DOI":"10.1016\/j.future.2017.09.056"},{"issue":"2","key":"498_CR99","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1007\/s10586-019-03008-x","volume":"23","author":"V Kumar","year":"2020","unstructured":"Kumar V, Sinha D, Das AK, Pandey SC, Goswami RT (2020) An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust Comput 23(2):1397\u20131418","journal-title":"Clust Comput"},{"key":"498_CR100","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2019","unstructured":"Kumar V, Das AK, Sinha D (2019) UIDS: a unified intrusion detection system for IoT environment. Evolut Intell 14:47\u201359","journal-title":"Evolut Intell"},{"key":"498_CR101","doi-asserted-by":"crossref","unstructured":"Panda M, Abraham A, Patra MR (2010) Discriminative multinomial Na\u00efve Bayes for network intrusion detection. In: 2010 Sixth International Conference on Information Assurance and Security, IEEE, pp 5\u201310","DOI":"10.1109\/ISIAS.2010.5604193"},{"key":"498_CR102","doi-asserted-by":"crossref","first-page":"101732","DOI":"10.1016\/j.cose.2020.101732","volume":"92","author":"K Singh Gill","year":"2020","unstructured":"Singh Gill K, Saxena S, Sharma A (2020) GTM-CSec: game theoretic model for cloud security based on IDS and honeypot. Comput Secur 92:101732","journal-title":"Comput Secur"},{"key":"498_CR103","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.ins.2018.06.017","volume":"476","author":"L Han","year":"2019","unstructured":"Han L, Zhou M, Jia W, Dalil Z, Xingbo X (2019) Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inform Sci 476:491\u2013504","journal-title":"Inform Sci"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00498-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00498-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00498-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T21:41:43Z","timestamp":1699393303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00498-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":103,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["498"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00498-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,25]]},"assertion":[{"value":"24 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}