{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:21:41Z","timestamp":1772313701583,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03981-8","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T12:54:51Z","timestamp":1746190491000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Attack Detection Using Deep Multi-agent Reinforcement Learning with Beth Dataset"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1239-1817","authenticated-orcid":false,"given":"A.","family":"Manikandan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1088-1989","authenticated-orcid":false,"given":"S. Deepa","family":"Rajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"issue":"1","key":"3981_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F. Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions, and research directions. Mob Netw Appl. 2023;28(1):296\u2013312.","journal-title":"Mob Netw Appl"},{"key":"3981_CR2","doi-asserted-by":"publisher","first-page":"122679","DOI":"10.1109\/ACCESS.2022.3223370","volume":"10","author":"AA Khan","year":"2022","unstructured":"Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S. Internet of Things (IoT) security with blockchain technology: a state-of-the-art review. IEEE Access 2022;10:122679\u201395.","journal-title":"IEEE Access"},{"issue":"6","key":"3981_CR3","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics. 2023;12(6):1333.","journal-title":"Electronics"},{"issue":"9","key":"3981_CR4","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/s10462-024-10907-y","volume":"57","author":"N Alfriehat","year":"2024","unstructured":"Alfriehat N, Anbar M, Aladaileh M, Hasbullah I, Shurbaji TA, Karuppayah S, Almomani A. RPL-based attack detection approaches in IoT networks: review and taxonomy. Artif Intell Rev. 2024;57(9):248.","journal-title":"Artif Intell Rev"},{"issue":"2","key":"3981_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47672\/ejt.1486","volume":"7","author":"J Bharadiya","year":"2023","unstructured":"Bharadiya J. Machine learning in cybersecurity: techniques and challenges. Eur J Technol. 2023;7(2):1\u201314.","journal-title":"Eur J Technol"},{"key":"3981_CR6","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.procs.2022.01.230","volume":"200","author":"C Medoh","year":"2022","unstructured":"Medoh C, Telukdarie A. The future of cybersecurity: a system dynamics approach. Procedia Comput Sci. 2022;200:318\u201326.","journal-title":"Procedia Comput Sci"},{"key":"3981_CR7","doi-asserted-by":"crossref","unstructured":"Pienta D, Tams S, Thatcher J. Can trust be trusted in cybersecurity? In: Proceedings of the 53rd Hawaii international conference on system Sciences. 2020. pp 4264\u20134273.","DOI":"10.24251\/HICSS.2020.522"},{"key":"3981_CR8","unstructured":"Srivastava G, Jhaveri RH, Bhattacharya S, Pandya S, Maddikunta PKR, Yenduri G, Gadekallu TR. XAI for cybersecurity: state of the art, challenges, open issues and future directions.\u00a02022. arXiv preprint http:\/\/arxiv.org\/abs\/2206.03585."},{"key":"3981_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.58496\/MJCS\/2023\/004","volume":"2023","author":"M Mijwil","year":"2023","unstructured":"Mijwil M, Aljanabi M, Ali AH. Chatgpt: exploring the role of cybersecurity in the protection of medical information. Mesop J Cybersecur. 2023;2023:18\u201321.","journal-title":"Mesop J Cybersecur"},{"key":"3981_CR10","doi-asserted-by":"publisher","first-page":"4166","DOI":"10.1109\/TII.2019.2948046","volume":"16","author":"R Kurte","year":"2020","unstructured":"Kurte R, Salcic Z, Wang KIK. A distributed service framework for the Internet of Things. IEEE Trans Ind Inform. 2020;16:4166\u201376.","journal-title":"IEEE Trans Ind Inform"},{"key":"3981_CR11","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst. 2018;82:761\u20138.","journal-title":"Future Gener Comput Syst"},{"key":"3981_CR12","doi-asserted-by":"publisher","first-page":"2716","DOI":"10.1109\/TII.2019.2956474","volume":"16","author":"F Farivar","year":"2020","unstructured":"Farivar F, Haghighi MS, Jolfaei A, Alazab M. Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT. IEEE Trans Ind Inform. 2020;16:2716\u201325.","journal-title":"IEEE Trans Ind Inform"},{"key":"3981_CR13","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10207-019-00447-w","volume":"19","author":"R Patil","year":"2020","unstructured":"Patil R, Dudeja H, Modi C. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. Int J Inf Secure. 2020;19:147\u201362.","journal-title":"Int J Inf Secure"},{"issue":"20","key":"3981_CR14","doi-asserted-by":"publisher","first-page":"7151","DOI":"10.1080\/00207543.2022.2140221","volume":"61","author":"B Rolf","year":"2023","unstructured":"Rolf B, Jackson I, M\u00fcller M, Lang S, Reggelin T, Ivanov D. A review of reinforcement learning algorithms and applications in supply chain management. Int J Prod Res. 2023;61(20):7151\u201379.","journal-title":"Int J Prod Res"},{"key":"3981_CR15","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-981-19-7784-8_10","volume-title":"Reinforcement learning for sequential decision and optimal control","author":"SE Li","year":"2023","unstructured":"Li SE. Deep reinforcement learning. In: Reinforcement learning for sequential decision and optimal control. Singapore: Springer Nature Singapore; 2023. p. 365\u2013402."},{"key":"3981_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103090","volume":"141","author":"B Jamil","year":"2023","unstructured":"Jamil B, Ijaz H, Shojafar M, Munir K. IRATS: a DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network. Ad Hoc Netw. 2023;141: 103090.","journal-title":"Ad Hoc Netw"},{"key":"3981_CR17","unstructured":"Tang H, Zhang M, Hao J. The ladder in chaos: a simple and effective improvement to general DRL algorithms by policy path trimming and boosting.\u00a02023. arXiv preprint http:\/\/arxiv.org\/abs\/2303.01391."},{"issue":"8","key":"3981_CR18","doi-asserted-by":"publisher","first-page":"3779","DOI":"10.1109\/TNNLS.2021.3121870","volume":"34","author":"TT Nguyen","year":"2021","unstructured":"Nguyen TT, Reddi VJ. Deep reinforcement learning for cyber security. IEEE Trans Neural Netw Learn Syst 2021;34(8):3779\u20133795","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"3981_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963","volume":"141","author":"M Lopez-Martin","year":"2020","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A. Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl. 2020;141: 112963.","journal-title":"Expert Syst Appl"},{"key":"3981_CR20","unstructured":"Wiebe J, Mallah RA, Li L. Learning cyber defence tactics from scratch with multi-agent reinforcement learning.\u00a02023. arXiv preprint http:\/\/arxiv.org\/abs\/2310.05939."},{"key":"3981_CR21","doi-asserted-by":"publisher","first-page":"180184","DOI":"10.1109\/ACCESS.2020.3027463","volume":"8","author":"IA Saeed","year":"2020","unstructured":"Saeed IA, Selamat A, Rohani MF, Krejcar O, Chaudhry JA. A systematic state-of-the-art analysis of multiagent intrusion detection. IEEE Access. 2020;8:180184\u2013209.","journal-title":"IEEE Access"},{"key":"3981_CR22","first-page":"3095","volume":"1\u201312","author":"K Highnam","year":"2021","unstructured":"Highnam K, Arulkumaran K, Hanif Z, Jennings N. BETH dataset: real cybersecurity data for anomaly detection research. CEUR Workshop Proc. 2021;1\u201312:3095.","journal-title":"CEUR Workshop Proc"},{"key":"3981_CR23","doi-asserted-by":"crossref","unstructured":"Lakha B, Mount SL, Serra E, Cuzzocrea A. Anomaly detection in cybersecurity events through graph neural network and transformer based model: a case study with BETH dataset. In:\u00a02022 IEEE International Conference on Big Data (Big Data). IEEE; 2022. p. 5756\u201364.","DOI":"10.1109\/BigData55660.2022.10020336"},{"key":"3981_CR24","doi-asserted-by":"crossref","unstructured":"Khan LP, Hossain A, Dey S. Anomaly detection for Beth dataset using machine learning approaches. In:\u00a02023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE; 2023. p. 1\u20136.","DOI":"10.1109\/ICECCT56650.2023.10179854"},{"issue":"15","key":"3981_CR25","doi-asserted-by":"publisher","first-page":"2574","DOI":"10.3390\/math10152574","volume":"10","author":"A Almalaq","year":"2022","unstructured":"Almalaq A, Albadran S, Mohamed MA. Deep machine learning model-based cyber-attack detection in smart power systems. Mathematics. 2022;10(15):2574.","journal-title":"Mathematics"},{"issue":"66.88","key":"3981_CR26","first-page":"8","volume":"763","author":"K Highnam","year":"2021","unstructured":"Highnam K, Arulkumaran K, Hanif Z, Jennings NR. Beth dataset: real cybersecurity data for anomaly detection research. Training. 2021;763(66.88):8.","journal-title":"Training"},{"key":"3981_CR27","doi-asserted-by":"publisher","first-page":"3215","DOI":"10.1007\/s10462-020-09938-y","volume":"54","author":"W Du","year":"2021","unstructured":"Du W, Ding S. A survey on multi-agent deep reinforcement learning: from the perspective of challenges and applications. Artif Intell Rev. 2021;54:3215\u201338.","journal-title":"Artif Intell Rev"},{"issue":"1","key":"3981_CR28","first-page":"1488344","volume":"2022","author":"L Zhang","year":"2021","unstructured":"Zhang L, Pan Z, Pan Y, Guo S, Liu Y, Xia S, Bai W. A hidden attack sequences detection method based on dynamic reward deep deterministic policy gradient. Secur Commun Netw. 2022;2022(1):1488344.","journal-title":"Secur Commun Netw"},{"key":"3981_CR29","doi-asserted-by":"crossref","unstructured":"Alashhab A, Zahid MS, Muneer A, Abdullahi M. Low-rate DDoS attack detection using deep learning for SDN-enabled IoT networks.\u00a02022. Authorea Preprints.","DOI":"10.14569\/IJACSA.2022.0131141"},{"key":"3981_CR30","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1793","volume":"10","author":"S Abbas","year":"2024","unstructured":"Abbas S, Bouazzi I, Ojo S, Al Hejaili A, Sampedro GA, Almadhor A, Gregus M. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Comput Sci. 2024;10: e1793.","journal-title":"PeerJ Comput Sci"},{"issue":"13","key":"3981_CR31","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors. 2023;23(13):5941.","journal-title":"Sensors"},{"key":"3981_CR32","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TMLCN.2024.3395419","volume":"2","author":"MF Saiyed","year":"2024","unstructured":"Saiyed MF, Al-Anbagi I. Deep ensemble learning with pruning for DDoS attack detection in IoT networks. IEEE Trans Mach Learn Commun Netw 2024;2:596\u2013616. https:\/\/doi.org\/10.1109\/TMLCN.2024.3395419","journal-title":"IEEE Trans Mach Learn Commun Netw"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03981-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03981-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03981-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T12:55:00Z","timestamp":1746190500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03981-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":32,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3981"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03981-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"23 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that they have no competing of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No humans or animals were used in this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and\/or animals"}},{"value":"All authors are given their consent to submit or publish this manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"433"}}