{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:34:51Z","timestamp":1775230491697,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008431","name":"Consejer\u00eda de Educaci\u00f3n, Junta de Castilla y Le\u00f3n","doi-asserted-by":"publisher","award":["LE078G18"],"award-info":[{"award-number":["LE078G18"]}],"id":[{"id":"10.13039\/501100008431","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013410","name":"Instituto Nacional de Ciberseguridad","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nowadays, the cybersecurity of Internet of Thing (IoT) environments is a big challenge. The analysis of network traffic and the use of automated estimators built up with machine learning techniques have been useful in detecting intrusions in traditional networks. Since the IoT networks require new and particular protocols to control the communications between the different devices involved in the networks, the knowledge acquired in the study of general networks may be unuseful some times. The goal of this paper is twofold. On the one hand, we aim to obtain a consistent dataset of the network traffic of an IoT system based on the Message Queue Telemetry Transport protocol (MQTT) and undergoing certain type of attacks. On the other hand, we want to characterize each of these attacks in terms of the minimum possible number of significant variables allowed by this protocol. Obtaining the data set has been achieved by studying the MQTT protocol in depth, while its characterization has been addressed through a hybrid (filter\/wrapper) feature selection algorithm based on the idea behind the minimum-redundancy maximum-relevance (mRMR) algorithm. The dataset, together with the feature selection algorithm, carries out a characterization of the different attacks which is optimal in terms of the accuracy of the machine learning models trained on it as well as in terms of the capability of explaining their underlying nature. This confirms the consistency of the dataset.<\/jats:p>","DOI":"10.1007\/s40747-023-01000-y","type":"journal-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T03:02:48Z","timestamp":1679022168000},"page":"5281-5296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Characterization of threats in IoT from an MQTT protocol-oriented dataset"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6993-9110","authenticated-orcid":false,"given":"\u00c1ngel Luis","family":"Mu\u00f1oz Casta\u00f1eda","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Antonio Aveleira","family":"Mata","sequence":"additional","affiliation":[]},{"given":"H\u00e9ctor","family":"Al\u00e1iz-Moret\u00f3n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,17]]},"reference":[{"key":"1000_CR1","unstructured":"1998 DARPA Intrusion Detection Evaluation Dataset. MIT Lincoln Laboratory. https:\/\/bit.ly\/2xseCm8. Accessed 22 Apr 2022"},{"key":"1000_CR2","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.procs.2016.09.068","volume":"58","author":"F Alam","year":"2016","unstructured":"Alam F, Mehmood R, Katib I, Albeshri A (2016) Analysis of eight data mining algorithms for smarter internet of things (IoT). Proc Comp Sci 58:437\u2013442","journal-title":"Proc Comp Sci"},{"key":"1000_CR3","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.jnca.2017.02.002","volume":"83","author":"A Ali","year":"2017","unstructured":"Ali A, Shah GA, Farooq MO, Ghani U (2017) Technologies and challenges in developing machine-to-machine applications: a survey. J Netw Comput Appl 83:124\u2013139","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"1000_CR4","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TIFS.2017.2762828","volume":"13","author":"ME Aminanto","year":"2017","unstructured":"Aminanto ME, Choi R, Tanuwidjaja HC, Yoo PD, Kim K (2017) Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans Inf Forensics Secur 13(3):621\u2013636","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1000_CR5","doi-asserted-by":"crossref","unstructured":"Andy S, Rahardjo B, Hanindhito B (2017) Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th international conference on electrical engineering, computer science and informatics (EECSI), pp 1\u20136","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"1000_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.future.2019.08.007","volume":"102","author":"ZA Baig","year":"2020","unstructured":"Baig ZA, Sanguanpong S, Firdous SN, Vo VN, Nguyen TG, So-In C (2020) Averaged dependence estimators for DoS attack detection in IoT networks. Futur Gener Comput Syst 102:198\u2013209","journal-title":"Futur Gener Comput Syst"},{"key":"1000_CR7","doi-asserted-by":"publisher","unstructured":"Bharathi V, Kumar C (2022) Enhanced security for an IoT devices in cyber-physical system against cyber attacks, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICONAT53423.2022.9725884","DOI":"10.1109\/ICONAT53423.2022.9725884"},{"issue":"3","key":"1000_CR8","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1214\/aos\/1024691079","volume":"26","author":"L Breiman","year":"1998","unstructured":"Breiman L (1998) Arcing classifiers. Ann Stat 26(3):801\u2013849","journal-title":"Ann Stat"},{"issue":"1","key":"1000_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"1000_CR10","volume-title":"Classification and regression trees","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman JH, Olshen RA, Stone CJ (1984) Classification and regression trees. Chapman and Hall\/CRC, Boca Raton"},{"key":"1000_CR11","first-page":"27","volume":"13","author":"G Brown","year":"2012","unstructured":"Brown G, Pocock A, Zhao MJ, Lujan M (2012) Conditional likelihood maximisation: a unifying framework for information theoretic feature selection. J Mach Learn Res 13:27\u201366","journal-title":"J Mach Learn Res"},{"key":"1000_CR12","doi-asserted-by":"crossref","unstructured":"Cecchinel C, Jimenez M, Mosser S, Riveill M (2014) An architecture to support the collection of big data in the internet of things. In: 2014 IEEE world congress on services, pp 442\u2013449","DOI":"10.1109\/SERVICES.2014.83"},{"key":"1000_CR13","doi-asserted-by":"crossref","unstructured":"Chaniotis IK, Kyriakos-Ioannis, Kyriakou D, Tselikas ND, Chaniotis IK, Kyriakou KID, Tselikas ND (2015) Is Node.js a viable option for building modern web applications? A performance evaluation study. In: Computing, vol 97, pp 1023\u20131044","DOI":"10.1007\/s00607-014-0394-9"},{"key":"1000_CR14","doi-asserted-by":"publisher","unstructured":"Chen J, Yang T, He B, He L (2021) An analysis and research on wireless network security dataset. In: Proceedings\u20142021 international conference on big data analysis and computer science, BDACS 2021. Institute of Electrical and Electronics Engineers Inc., pp 80\u201383. https:\/\/doi.org\/10.1109\/BDACS53596.2021.00025","DOI":"10.1109\/BDACS53596.2021.00025"},{"key":"1000_CR15","doi-asserted-by":"crossref","unstructured":"Ciklabakkal E, Donmez A, Erdemir M, Suren E, Yilmaz MK, Angin P (2019) Artemis: an intrusion detection system for mqtt attacks in internet of things. In: 38th symposium on reliable distributed systems (SRDS). IEEE, pp 369\u2013371","DOI":"10.1109\/SRDS47363.2019.00053"},{"key":"1000_CR16","unstructured":"Cisco: internet of things at a glance (2016). https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/se\/internet-of-things\/at-a-glance-c45-731471.pdf?dtid=osscdc000283. Accessed 22 Apr 2022"},{"key":"1000_CR17","unstructured":"Collina M (2018) Mosca@github.com. https:\/\/github.com\/mcollina\/mosca. Accessed 22 Apr 2022"},{"key":"1000_CR18","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M Conti","year":"2018","unstructured":"Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. Futur Gener Comput Syst 78:544\u2013546","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"1000_CR19","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"1000_CR20","unstructured":"Defazio A, Bach F, Lacoste-Julien S (2014) Saga: A fast incremental gradient method with support for non-strongly convex composite objectives. In: Proceedings of the 27th international conference on neural information processing systems\u2014vol 1, NIPS\u201914. MIT Press, pp 1646\u20131654"},{"key":"1000_CR21","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"C Ding","year":"2005","unstructured":"Ding C, P H (2005) Minimum redundancy feature selection from microarray gene expression data. J Bioinform Comput Biol 3:185\u2013205","journal-title":"J Bioinform Comput Biol"},{"key":"1000_CR22","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1142\/S0219720005001004","volume":"3","author":"C Ding","year":"2005","unstructured":"Ding C, Peng H (2005) Minimum redundancy feature selection from microarray gene expression data. J Bioinform Comput Biol 3:185\u2013205","journal-title":"J Bioinform Comput Biol"},{"key":"1000_CR23","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-44215-0_14","volume-title":"Mobile web and intelligent information systems","author":"VT Do","year":"2016","unstructured":"Do VT, Engelstad P, Feng B, van Do T (2016) Strengthening mobile network security using machine learning. In: Younas M, Awan I, Kryvinska N, Strauss CT (eds) Mobile web and intelligent information systems. Springer International Publishing, Cham, pp 173\u2013183"},{"issue":"1","key":"1000_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"issue":"4","key":"1000_CR25","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"1999","unstructured":"Friedman JH (1999) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367\u2013378","journal-title":"Comput Stat Data Anal"},{"key":"1000_CR26","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.future.2019.09.038","volume":"104","author":"S Garg","year":"2020","unstructured":"Garg S, Kaur K, Batra S, Kaddoum G, Kumar N, Boukerche A (2020) A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Futur Gener Comput Syst 104:105\u2013118","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"1000_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4249","volume":"33","author":"S Garg","year":"2020","unstructured":"Garg S, Singh R, Obaidat MS, Bhalla VK, Sharma B (2020) Statistical vertical reduction-based data abridging technique for big network traffic dataset. Int J Commun Syst 33(4):1\u201313","journal-title":"Int J Commun Syst"},{"key":"1000_CR28","unstructured":"Gerganov R (2018) nfqsed@github.com. https:\/\/github.com\/rgerganov\/nfqsed. Accessed 22 Apr 2022"},{"key":"1000_CR29","unstructured":"Getting started with mqtt. https:\/\/www.hivemq.com\/blog\/how-to-get-started-with-mqtt. Accessed 22 Apr 2022"},{"key":"1000_CR30","doi-asserted-by":"crossref","unstructured":"Handosa M, Gracanin D, Elmongui HG (2017) Performance evaluation of mqtt-based internet of things systems. In: 2017 Winter simulation conference (WSC), pp 4544\u20134545","DOI":"10.1109\/WSC.2017.8248196"},{"key":"1000_CR31","doi-asserted-by":"crossref","unstructured":"Hindy H, Bayne E, Bures M, Atkinson R, Tachtatzis R, Bellekens X (2020) Machine learning based iot intrusion detection system: an mqtt case study (mqtt-iot-ids2020 dataset). In: Lecture notes in networks and systems, international network conference. Springer International Publishing, pp 73\u201384","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"1000_CR32","unstructured":"Hua\u00a0Yang H, Moody J (1999) Feature selection based on joint mutual information. In: Advances in intelligent data analysis (AIDA), computational intelligence methods and applications (CIMA). IEEE"},{"key":"1000_CR33","doi-asserted-by":"publisher","first-page":"3794","DOI":"10.1016\/j.matpr.2020.06.218","volume":"33","author":"C Kalimuthan","year":"2020","unstructured":"Kalimuthan C, Arokia Renjit J (2020) Review on intrusion detection using feature selection with machine learning techniques. Mater Today Proc 33:3794\u20133802","journal-title":"Mater Today Proc"},{"key":"1000_CR34","unstructured":"KDD Cup 99 Dataset (1999). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 22 Apr 2022"},{"key":"1000_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2016","unstructured":"Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2016) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18:1","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"1000_CR36","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"1000_CR37","unstructured":"Kolter JZ, Johnson MJ (2011) REDD : a public data set for energy disaggregation research. In: Proceedings of the SustKDD workshop on data mining applications in sustainability, pp 1\u20136"},{"key":"1000_CR38","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/TSMC.1987.4309069","volume":"17","author":"TO Kvalseth","year":"1987","unstructured":"Kvalseth TO (1987) Entropy and correlation: some comments. IEEE Trans Syst Man Cybern 17:517\u2013519","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"2","key":"1000_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21020656","volume":"21","author":"X Larriva-Novo","year":"2021","unstructured":"Larriva-Novo X, Villagr\u00e1 VA, Vega-Barbas M, Rivera D, Sanz Rodrigo M (2021) An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets. Sensors (Switzerland) 21(2):1\u201315. https:\/\/doi.org\/10.3390\/s21020656","journal-title":"Sensors (Switzerland)"},{"key":"1000_CR40","unstructured":"Ledun J (2016) jledun@github.com. https:\/\/github.com\/jledun"},{"key":"1000_CR41","first-page":"1","volume":"4662","author":"R Lohiya","year":"2020","unstructured":"Lohiya R, Thakkar A (2020) Application domains, evaluation datasets, and research challenges of IoT: a systematic review. IEEE Internet Things J 4662:1\u201325","journal-title":"IEEE Internet Things J"},{"key":"1000_CR42","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"G Maci\u00e1 Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1 Fern\u00e1ndez G, Camacho J, Mag\u00e1n-Carri\u00f3n R, Garc\u00eda-Teodoro P, Theron R (2018) UGR 16: a new dataset for the evaluation of cyclostationarity-based network IDSs. Comput Secur 73:411\u2013424","journal-title":"Comput Secur"},{"key":"1000_CR43","doi-asserted-by":"crossref","unstructured":"Mosaiyebzadeh F, Araujo\u00a0Rodriguez LG, Macedo\u00a0Batista D, Hirata R (2021) A network intrusion detection system using deep learning against mqtt attacks in iot. In: Younas M, Awan I, Kryvinska N, Strauss C, Thanh DV (eds) 2021 IEEE Latin-American conference on communications (LATINCOM). IEEE, pp 1\u20136","DOI":"10.1109\/LATINCOM53176.2021.9647850"},{"key":"1000_CR44","unstructured":"Mosquitto E index@mosquitto.org. https:\/\/mosquitto.org\/. Acces-sed 22 Apr 2022"},{"issue":"2","key":"1000_CR45","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","volume":"7","author":"P Nimbalkar","year":"2021","unstructured":"Nimbalkar P, Kshirsagar D (2021) Feature selection for intrusion detection system in internet-of-things (IoT). ICT Express 7(2):177\u2013181. https:\/\/doi.org\/10.1016\/j.icte.2021.04.012","journal-title":"ICT Express"},{"key":"1000_CR46","doi-asserted-by":"crossref","unstructured":"Nobakht M, Sivaraman V, Boreli R (2016) A host-based intrusion detection and mitigation framework for smart home iot using openflow. In: 2016 11th International conference on availability, reliability and security (ARES), pp 147\u2013156","DOI":"10.1109\/ARES.2016.64"},{"key":"1000_CR47","unstructured":"OASIS (Organization for the Advancement of Structured Information Standards): MQTT Version 3.1.1. Tech. Rep. October (2014). http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html"},{"key":"1000_CR48","unstructured":"Palsson K (2018) mqtt-malaria@github.com. https:\/\/github.com\/remakeelectric\/mqtt-malaria. Accessed 22 Apr 2022"},{"issue":"3","key":"1000_CR49","first-page":"522","volume":"24","author":"YMP Pa","year":"2016","unstructured":"Pa YMP, Suzuki S, Yoshioka K, Matsumoto T, Kasama T, Rossow C (2016) IoTPOT: a novel honeypot for revealing current IoT threats. J Inf Process 24(3):522\u2013533","journal-title":"J Inf Process"},{"issue":"3","key":"1000_CR50","doi-asserted-by":"publisher","first-page":"865","DOI":"10.32604\/CSSE.2022.018801","volume":"40","author":"V Ponnusamy","year":"2021","unstructured":"Ponnusamy V, Yichiet A, Jhanjhi NZ, Humayun M, Almufareh MF (2021) IoT wireless intrusion detection and network traffic analysis. Comput Syst Sci Eng 40(3):865\u2013879. https:\/\/doi.org\/10.32604\/CSSE.2022.018801","journal-title":"Comput Syst Sci Eng"},{"issue":"20","key":"1000_CR51","doi-asserted-by":"publisher","first-page":"31381","DOI":"10.1007\/s11042-021-10567-y","volume":"80","author":"MA Rahman","year":"2021","unstructured":"Rahman MA, Asyhari AT, Wen OW, Ajra H, Ahmed Y, Anwar F (2021) Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection. Multimedia Tools Appl 80(20):31381\u201331399. https:\/\/doi.org\/10.1007\/s11042-021-10567-y","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"1000_CR52","first-page":"383","volume":"8","author":"MA Razzaq","year":"2017","unstructured":"Razzaq MA, Habid S, Ali M, Ullah S (2017) Security issues in the internet of things (IoT): a comprehensive study. Int J Adv Comput Sci Appl 8(6):383","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1000_CR53","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10107-016-1030-6","volume":"162","author":"M Schmidt","year":"2017","unstructured":"Schmidt M, Le Roux N, Bach F (2017) Minimizing finite sums with the stochastic average gradient. Math Program 162:83\u2013112","journal-title":"Math Program"},{"key":"1000_CR54","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1016\/S0031-3203(01)00084-X","volume":"35","author":"M Sebbana","year":"2002","unstructured":"Sebbana M, Nockb R (2002) A hybrid filter\/wrapper approach of feature selection using information theory. Pattern Recogn 35:835\u2013846","journal-title":"Pattern Recogn"},{"issue":"2","key":"1000_CR55","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2018.2888764","volume":"52","author":"K Siddique","year":"2019","unstructured":"Siddique K, Akhtar Z, Aslam Khan F, Kim Y (2019) KDD Cup 99 data sets: a perspective on the role of data sets in network intrusion detection research. Computer 52(2):41\u201351. https:\/\/doi.org\/10.1109\/MC.2018.2888764","journal-title":"Computer"},{"key":"1000_CR56","first-page":"17","volume":"7","author":"M Stanislav","year":"2015","unstructured":"Stanislav M, Beardsley T (2015) Hacking iot: a case study on baby monitor exposures and vulnerabilities. Rapid 7:17","journal-title":"Rapid"},{"key":"1000_CR57","unstructured":"STARR M Fridge caught sending spam emails in botnet attack. https:\/\/cnet.co\/33exaly. Accessed 22 Apr 2022"},{"issue":"10","key":"1000_CR58","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11994\u201312000","journal-title":"Expert Syst Appl"},{"key":"1000_CR59","unstructured":"Tsamardinos I, Aliferis CF, Statnikov AR (2003) Algorithms for large scale Markov blanket discovery. In: FLAIRS conference"},{"key":"1000_CR60","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in iot networks. IEEE Access 9:103906\u2013103926","journal-title":"IEEE Access"},{"key":"1000_CR61","doi-asserted-by":"crossref","unstructured":"Ullah I, Mahmoud QH (2021) A framework for anomaly detection in iot networks using conditional generative adversarial networks. IEEE Access 9:165907\u2013165931","DOI":"10.1109\/ACCESS.2021.3132127"},{"issue":"8","key":"1000_CR62","doi-asserted-by":"publisher","first-page":"2431","DOI":"10.1007\/s11276-016-1300-5","volume":"23","author":"M Usha","year":"2017","unstructured":"Usha M, Kavitha P (2017) Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Netw 23(8):2431\u20132446","journal-title":"Wireless Netw"},{"key":"1000_CR63","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari I, Chiola G et al (2020) Mqttset, a new dataset for machine learning techniques on mqtt. Sensors (Basel) 20:6578","journal-title":"Sensors (Basel)"},{"key":"1000_CR64","doi-asserted-by":"crossref","unstructured":"Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific design automation conference (ASP-DAC), pp 519\u2013524","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"1000_CR65","first-page":"2837","volume":"11","author":"N Xuan Vinh","year":"2010","unstructured":"Xuan Vinh N, Epps J, Bailey J (2010) Information theoretic measures for clusterings comparison: variants, properties, normalization and correction for chance. J Mach Learn Res 11:2837\u20132854","journal-title":"J Mach Learn Res"},{"key":"1000_CR66","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10994-010-5221-8","volume":"85","author":"H Yu","year":"2011","unstructured":"Yu H, Huang F, Lin C (2011) Dual coordinate descent methods for logistic regression and maximum entropy models. Mach Learn 85:41\u201375","journal-title":"Mach Learn"},{"issue":"February","key":"1000_CR67","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84(February):25\u201337","journal-title":"J Netw Comput Appl"},{"key":"1000_CR68","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jnca.2018.05.004","volume":"116","author":"D Zhou","year":"2018","unstructured":"Zhou D, Yan Z, FU Y, Yai Z (2018) A survey on network data collection. J Netw Comput Appl 116:9\u201323","journal-title":"J Netw Comput Appl"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01000-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01000-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01000-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:18:15Z","timestamp":1695403095000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01000-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,17]]},"references-count":68,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1000"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01000-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,17]]},"assertion":[{"value":"28 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}