{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:44:23Z","timestamp":1773931463970,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01770-9","type":"journal-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T14:03:05Z","timestamp":1682517785000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Intrusion Detection Framework in IoT Networks"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6061-9097","authenticated-orcid":false,"given":"Soumya","family":"Bajpai","sequence":"first","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Brijesh Kumar","family":"Chaurasia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"1770_CR1","unstructured":"Banday MT, Qadri JA, Shah NA. Study of Botnets and their threats to Internet Security. In: Sprouts: Working Papers on Information Systems. 2009;9(24):1\u201313"},{"key":"1770_CR2","doi-asserted-by":"publisher","unstructured":"Zorzi M, Gluhak A, Lange S, Bassi A. From today\u2019s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view. In: IEEE Wireless Communications. 2010;17.p. 44\u201351. https:\/\/doi.org\/10.1109\/MWC.2010.5675777.","DOI":"10.1109\/MWC.2010.5675777"},{"key":"1770_CR3","doi-asserted-by":"publisher","unstructured":"Polat H, Polat O. The effects of DoS attacks on ODL and POX SDN controllers. In: 8th International Conference on Information Technology (ICIT 2017). 2017. p. 554\u20138. https:\/\/doi.org\/10.1109\/ICITECH.2017.8080058.","DOI":"10.1109\/ICITECH.2017.8080058"},{"key":"1770_CR4","doi-asserted-by":"publisher","unstructured":"Misra G, Kumar V, Agarwal A, Agarwal K. Internet of Things (IoT)\u2014a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications (An Upcoming or Future Generation Computer Communication System Technology). American Journal of Electrical and Electronic Engineering. 2016. 4. p. 23\u201332. 2016. https:\/\/doi.org\/10.12691\/ajeee-4-1-4.","DOI":"10.12691\/ajeee-4-1-4"},{"key":"1770_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436","volume":"136","author":"J Arshad","year":"2020","unstructured":"Arshad J, Azad MA, Abdeltaif MM, Salah K. An intrusion detection framework for energy constrained IoT devices. Mech Syst Signal Process. 2020;136: 106436. https:\/\/doi.org\/10.1016\/j.ymssp.2019.106436.","journal-title":"Mech Syst Signal Process"},{"key":"1770_CR6","doi-asserted-by":"crossref","unstructured":"Banafa A. Three major challenges facing IoT\u2014IEEE internet of things. IEEE Internet of Things. 2017. p. 18\u201321. https:\/\/iot.ieee.org\/newsletter\/march-2017\/three-major-challenges-facing-iot.html. Accessed 29 Mar 2022.","DOI":"10.1201\/9781003426240-6"},{"issue":"4","key":"1770_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/COMST.2015.2457491","volume":"17","author":"N Hoque","year":"2015","unstructured":"Hoque N, Bhattacharyya DK, Kalita JK. Botnet in DDoS attacks: trends and challenges. IEEE Commun Surv Tutor. 2015;17(4):1\u201329. https:\/\/doi.org\/10.1109\/COMST.2015.2457491.","journal-title":"IEEE Commun Surv Tutor"},{"key":"1770_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03238-y","author":"L Santos","year":"2021","unstructured":"Santos L, Gon\u00e7alves R, Rabad\u00e3o C, Martins J. A flow-based intrusion detection framework for internet of things networks. Cluster Comput. 2021. https:\/\/doi.org\/10.1007\/s10586-021-03238-y.","journal-title":"Cluster Comput"},{"key":"1770_CR9","doi-asserted-by":"publisher","unstructured":"Thakkar A, Lohiya R. A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Springer Netherlands; 2020. p. 1\u201333. https:\/\/doi.org\/10.1007\/s11831-020-09496-0.","DOI":"10.1007\/s11831-020-09496-0"},{"key":"1770_CR10","doi-asserted-by":"publisher","unstructured":"Ibitoye O, Shafiq O, Matrawy A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: IEEE Global Communications Conference (GLOBECOM 2019). 2019. p. 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9014337.","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"issue":"2","key":"1770_CR11","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.32604\/cmc.2021.018466","volume":"69","author":"N Islam","year":"2021","unstructured":"Islam N, Farhin F, Sultana I, Kaiser S, Rahman S, Mahmud M, Hosen ASMS, Cho GH. Towards machine learning based intrusion detection in IoT networks. Comput Mater Continua. 2021;69(2):1801\u201321. https:\/\/doi.org\/10.32604\/cmc.2021.018466.","journal-title":"Comput Mater Continua"},{"key":"1770_CR12","doi-asserted-by":"crossref","unstructured":"Pandey U, Srivastav VK, Chaurasia BK, Neelu. IoT conceptual model and application. Internet of things frameworks for enabling and emerging technologies. In Ch 1, CRC Press, Taylor & Francis Group, USA; 2022. p. 1\u201322.","DOI":"10.1201\/9781003219620-1"},{"issue":"5","key":"1770_CR13","doi-asserted-by":"publisher","first-page":"450","DOI":"10.36227\/techrxiv.12657158.v1","volume":"3","author":"T Alam","year":"2020","unstructured":"Alam T. A reliable communication framework and its use in internet of things (IoT). Int J S Res CSE IT. 2020;3(5):450\u20136. https:\/\/doi.org\/10.36227\/techrxiv.12657158.v1.","journal-title":"Int J S Res CSE IT"},{"key":"1770_CR14","unstructured":"Online available at: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. Accessed 29 March 2022."},{"key":"1770_CR15","doi-asserted-by":"publisher","first-page":"26521","DOI":"10.1109\/ACCESS.2017.2775180","volume":"5","author":"SB Baker","year":"2017","unstructured":"Baker SB, Xiang W, Atkinson I. Internet of things for smart health-care: technologies, challenges, and opportunities. IEEE Access. 2017;5:26521\u201344. https:\/\/doi.org\/10.1109\/ACCESS.2017.2775180.","journal-title":"IEEE Access"},{"key":"1770_CR16","doi-asserted-by":"publisher","first-page":"86411","DOI":"10.1109\/ACCESS.2020.2992584","volume":"8","author":"Z Zhou","year":"2020","unstructured":"Zhou Z, Yu H, Shi H. Human activity recognition based on improved bayesian convolution network to analyze health care data using wearable IoT device. IEEE Access. 2020;8:86411\u20138. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992584.","journal-title":"IEEE Access"},{"key":"1770_CR17","doi-asserted-by":"publisher","first-page":"135784","DOI":"10.1109\/ACCESS.2020.3007561","volume":"8","author":"SS Sarmah","year":"2020","unstructured":"Sarmah SS. An efficient IoT-based patient monitoring and heart disease prediction system using deep learning modified neural network. IEEE Access. 2020;8:135784\u201397. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007561.","journal-title":"IEEE Access"},{"key":"1770_CR18","doi-asserted-by":"publisher","first-page":"15202","DOI":"10.1109\/ACCESS.2018.2810837","volume":"6","author":"C Xie","year":"2018","unstructured":"Xie C, Yang P, Yang Y. Open knowledge accessing method in IoT-based hospital information system for medical record enrichment. IEEE Access. 2018;6:15202\u201311. https:\/\/doi.org\/10.1109\/ACCESS.2018.2810837.","journal-title":"IEEE Access"},{"key":"1770_CR19","doi-asserted-by":"publisher","first-page":"144059","DOI":"10.1109\/ACCESS.2019.2942846","volume":"7","author":"WA Jabbar","year":"2019","unstructured":"Jabbar WA, Kian TK, Ramli RM, Zubir SN, Zamrizaman NSM, Balfaqih M, Shepelev V, Alharbi S. Design and fabrication of smart home with internet of things enabled automation system. IEEE Access. 2019;7:144059\u201374. https:\/\/doi.org\/10.1109\/ACCESS.2019.2942846.","journal-title":"IEEE Access"},{"issue":"1","key":"1770_CR20","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3745\/JIPS.2011.7.1.111","volume":"7","author":"DM Konidala","year":"2011","unstructured":"Konidala DM, Kim DY, Yeun CY, Lee BC. Security framework for RFID-based applications in smart home environment. J Inf Process Syst. 2011;7(1):111\u201320. https:\/\/doi.org\/10.3745\/JIPS.2011.7.1.111.","journal-title":"J Inf Process Syst"},{"key":"1770_CR21","doi-asserted-by":"publisher","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I. Internet of things (IoT) security: current status, challenges and prospective measures. In: 10th International Conference for Internet Technology and Secured Transactions, (ICITST 2015). 2016. pp. 336\u201341. https:\/\/doi.org\/10.1109\/ICITST.2015.7412116.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"1770_CR22","doi-asserted-by":"publisher","unstructured":"Haq S, Singh Y. Botnet detection using machine learning. In 5th International Conference on Parallel, Distributed and Grid Computing (PDGC 2018). 2018; pp. 240\u2013245. https:\/\/doi.org\/10.1109\/PDGC.2018.8745912.","DOI":"10.1109\/PDGC.2018.8745912"},{"key":"1770_CR23","doi-asserted-by":"publisher","unstructured":"Stevanovic M, Pedersen JM. An efficient flow-based botnet detection using supervised machine learning. In International Conference on Computing, Networking and Communications (ICNC 2014). 2014. pp. 797\u2013801. https:\/\/doi.org\/10.1109\/ICCNC.2014.6785439.","DOI":"10.1109\/ICCNC.2014.6785439"},{"key":"1770_CR24","unstructured":"Ali M. An open source, low-code machine learning library in python PyCaret. An Open Source, Low-Code Machine Learning Library in Python PyCaret Version 231, Apr 2020. Online Available at: https:\/\/www.PycaretOrg. Accessed 29 Mar 2022."},{"key":"1770_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/1828\/1\/012015","volume":"1828","author":"U Gain","year":"2021","unstructured":"Gain U, Hotti V. Low-code AutoML-augmented data pipeline\u2014a review and experiments. J Phys. 2021;1828:1\u20137. https:\/\/doi.org\/10.1088\/1742-6596\/1828\/1\/012015.","journal-title":"J Phys"},{"key":"1770_CR26","unstructured":"Iqbal, FB, Biswas S and Urba R. Performance analysis of intrusion detection systems using the PyCaret machine learning library on the UNSW-NB15 dataset. Diss. Brac University, 2021."},{"key":"1770_CR27","doi-asserted-by":"publisher","unstructured":"Bajpai S, Gupta A. A genetic annealing based new approach for IDS. In: Proceedings of the 2017 international conference on intelligent computing and control systems, ICICCS 2017, vol. 2018. 2017. pp. 42\u20135. https:\/\/doi.org\/10.1109\/ICCONS.2017.8250754.","DOI":"10.1109\/ICCONS.2017.8250754"},{"key":"1770_CR28","unstructured":"Introduction to Decision Tree Algorithm - Explained with Examples, GreatLearning Blog, 2020. Available: https:\/\/www.mygreatlearning.com\/blog\/decision-tree-algorithm\/."},{"key":"1770_CR29","unstructured":"Random Forest Algorithm for Machine Learning, Medium, Apr. 2019. Available: https:\/\/medium.com\/capital-one-tech\/random-forest-algorithm-for-machine-learning-c4b2c8cc9feb."},{"issue":"13","key":"1770_CR30","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.14704\/nq.2022.20.13.NQ88441","volume":"20","author":"S Bajpai","year":"2022","unstructured":"Bajpai S, Sharma K, Chaurasia BK. Intrusion detection system in IoT network using ML. NeuroQuantology. 2022;20(13):3597\u2013601. https:\/\/doi.org\/10.14704\/nq.2022.20.13.NQ88441.","journal-title":"NeuroQuantology"},{"key":"1770_CR31","unstructured":"Sara SJ. Report on learning and development for organizational sustainability. Available: https:\/\/dspace.bracu.ac.bd\/xmlui\/bitstream\/handle\/10361\/17922\/17204055_BBA.pdf?sequence=1&isAllowed=y."}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01770-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01770-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01770-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T15:14:31Z","timestamp":1687014871000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01770-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":31,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["1770"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01770-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,26]]},"assertion":[{"value":"30 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"350"}}