{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T15:12:05Z","timestamp":1767798725275,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T00:00:00Z","timestamp":1767744000000},"content-version":"vor","delay-in-days":35,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00260-z","type":"journal-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:47:23Z","timestamp":1764780443000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimization of distributed network intrusion detection system based on internet of things and federated learning"],"prefix":"10.1007","volume":"6","author":[{"given":"Yiqiong","family":"Liang","sequence":"first","affiliation":[]},{"given":"Mingwan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,3]]},"reference":[{"key":"260_CR1","doi-asserted-by":"publisher","first-page":"p110265","DOI":"10.1016\/j.compeleceng.2025.110265","volume":"123","author":"TA Ahanger","year":"2025","unstructured":"Ahanger TA, Ullah I, Algamdi SA, Tariq U. Machine learning-inspired intrusion detection system for iot: security issues and future challenges. Comput Electr Eng. 2025;123:p110265.","journal-title":"Comput Electr Eng"},{"key":"260_CR2","doi-asserted-by":"publisher","first-page":"117734","DOI":"10.1109\/ACCESS.2021.3107337","volume":"9","author":"DC Attota","year":"2021","unstructured":"Attota DC, Mothukuri V, Parizi RM, Pouriyeh S. An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access. 2021;9:117734\u201345. https:\/\/doi.org\/10.1109\/ACCESS.2021.3107337.","journal-title":"IEEE Access"},{"key":"260_CR3","doi-asserted-by":"publisher","first-page":"52215","DOI":"10.1109\/ACCESS.2024.3386631","volume":"12","author":"MH Bhavsar","year":"2024","unstructured":"Bhavsar MH, Bekele YB, Roy K, Kelly JC, Limbrick D. Fl-ids: federated learning-based intrusion detection system using edge devices for transportation IoT. IEEe Access. 2024;12:52215\u201326. https:\/\/doi.org\/10.1109\/ACCESS.2024.3386631.","journal-title":"IEEe Access"},{"key":"260_CR4","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal S, Sarkar S, Aouedi O, Yenduri G, Piamrat K, Alazab M, Bhattacharya S, Maddikunta PKR, Gadekallu TR. Federated learning for intrusion detection system: Concepts, challenges, and future directions. Comput Commun. 2022;195:346\u201361. https:\/\/doi.org\/10.1016\/j.comcom.2022.09.012.","journal-title":"Comput Commun"},{"issue":"2","key":"260_CR5","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","volume":"19","author":"P Ruzafa-Alc\u00e1zar","year":"2021","unstructured":"Ruzafa-Alc\u00e1zar P, Fern\u00e1ndez-Saura P, M\u00e1rmol-Campos E, Gonz\u00e1lez-Vidal A, Hern\u00e1ndez-Ramos JL, Bernal-Bernabe J, Skarmeta AF. Intrusion detection based on privacy-preserving federated learning for the industrial IoT. IEEE Trans Industr Inf. 2021;19(2):1145\u201354. https:\/\/doi.org\/10.1109\/TII.2021.3126728.","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"260_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10922-022-09691-3","volume":"31","author":"M Sarhan","year":"2023","unstructured":"Sarhan M, Layeghy S, Moustafa N, Portmann M. Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection. J Netw Syst Manage. 2023;31(1):3. https:\/\/doi.org\/10.1007\/s10922-022-09691-3.","journal-title":"J Netw Syst Manage"},{"key":"260_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha O, Ferrag MA, Shu L, Maglaras L, Choo KKR, Nafaa M. Federated learning-based intrusion detection system for agricultural internet of things. J Parallel Distrib Comput. 2022;165:17\u201331. https:\/\/doi.org\/10.1016\/j.jpdc.2022.03.003.","journal-title":"J Parallel Distrib Comput"},{"issue":"1","key":"260_CR8","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M. A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network. 2023;3(1):158\u201379. https:\/\/doi.org\/10.3390\/network3010008.","journal-title":"Network"},{"issue":"3","key":"260_CR9","doi-asserted-by":"publisher","first-page":"509","DOI":"10.3390\/ai4030028","volume":"4","author":"R Lazzarini","year":"2023","unstructured":"Lazzarini R, Tianfield H, Charissis V. Federated learning for IoT intrusion detection. Ai. 2023;4(3):509\u201330. https:\/\/doi.org\/10.3390\/ai4030028.","journal-title":"Ai"},{"issue":"11","key":"260_CR10","doi-asserted-by":"publisher","first-page":"8229","DOI":"10.1109\/JIOT.2022.3150363","volume":"9","author":"B Ghimire","year":"2022","unstructured":"Ghimire B, Rawat DB. Recent advances in federated learning for cybersecurity and cybersecurity for federated learning for the internet of things. IEEE Internet Things J. 2022;9(11):8229\u201349. https:\/\/doi.org\/10.1109\/JIOT.2022.3150363.","journal-title":"IEEE Internet Things J"},{"key":"260_CR11","doi-asserted-by":"publisher","first-page":"121000","DOI":"10.1016\/j.eswa.2023.121000","volume":"234","author":"MJ Idrissi","year":"2023","unstructured":"Idrissi MJ, Alami H, El Mahdaouy A, El Mekki A, Oualil S, Yartaoui Z, Berrada I. Fed-anids: federated learning for anomaly-based network intrusion detection systems. Expert Syst Appl. 2023;234:121000. https:\/\/doi.org\/10.1016\/j.eswa.2023.121000.","journal-title":"Expert Syst Appl"},{"key":"260_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","volume":"164","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Garg S, Hassan MM. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT networks. J Parallel Distrib Comput. 2022;164:55\u201368. https:\/\/doi.org\/10.1016\/j.jpdc.2022.01.030.","journal-title":"J Parallel Distrib Comput"},{"issue":"3","key":"260_CR13","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","volume":"10","author":"C Park","year":"2022","unstructured":"Park C, Lee J, Kim Y, Park JG, Kim H, Hong D. An enhanced AI-based network intrusion detection system using generative adversarial networks. IEEE Internet Things J. 2022;10(3):2330\u201345. https:\/\/doi.org\/10.1109\/JIOT.2022.3211346.","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"260_CR14","doi-asserted-by":"publisher","first-page":"9555","DOI":"10.1007\/s12652-020-02696-3","volume":"12","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R. A distributed ensemble design-based intrusion detection system using fog computing to protect the internet of things networks. J Ambient Intell Humaniz Comput. 2021;12(10):9555\u201372. https:\/\/doi.org\/10.1007\/s12652-020-02696-3.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"260_CR15","doi-asserted-by":"publisher","first-page":"100053","DOI":"10.1109\/ACCESS.2021.3101188","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J. DCNNBiLSTM: an efficient hybrid deep learning-based intrusion detection system. Telematics Inf Rep. 2023;10:100053. https:\/\/doi.org\/10.1109\/ACCESS.2021.3101188.","journal-title":"Telematics Inf Rep"},{"key":"260_CR16","doi-asserted-by":"publisher","first-page":"108156","DOI":"10.1016\/j.compeleceng.2022.108156","volume":"102","author":"V Ravi","year":"2022","unstructured":"Ravi V, Chaganti R, Alazab M. Recurrent deep learning-based feature fusion ensemble meta-classifier approach for an intelligent network intrusion detection system. Comput Electr Eng. 2022;102:108156. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108156.","journal-title":"Comput Electr Eng"},{"key":"260_CR17","doi-asserted-by":"publisher","first-page":"106790","DOI":"10.3390\/pr9050834","volume":"9","author":"GDC Bertoli","year":"2021","unstructured":"Bertoli GDC, J\u00fanior LAP, Saotome O, Dos Santos AL, Verri FAN, Marcondes CAC, Barbieri S, Rodrigues MS, De Oliveira JMP. An end-to-end framework for a machine learning-based network intrusion detection system. IEEE Access. 2021;9:106790\u2013805. https:\/\/doi.org\/10.3390\/pr9050834.","journal-title":"IEEE Access"},{"issue":"5","key":"260_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3390\/pr9050834","volume":"9","author":"MA Khan","year":"2021","unstructured":"Khan MA. Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes. 2021;9(5):834. https:\/\/doi.org\/10.3390\/pr9050834.","journal-title":"Processes"},{"issue":"6","key":"260_CR19","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y. A novel collaborative SRU network with dynamic behaviour aggregation, reduced communication overhead, and explainable features. IEEE J Biomedical Health Inf. 2024;28(6):3228\u201335. https:\/\/doi.org\/10.1109\/JBHI.2024.3352013.","journal-title":"IEEE J Biomedical Health Inf"},{"key":"260_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3499942","author":"IA Khan","year":"2024","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM. Federated-boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer IoT. IEEE Trans Consum Electron. 2024. https:\/\/doi.org\/10.1109\/TCE.2024.3499942.","journal-title":"IEEE Trans Consum Electron"},{"key":"260_CR21","doi-asserted-by":"publisher","first-page":"102002","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, Kousar T. Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inform Fusion. 2024;101:102002.","journal-title":"Inform Fusion"},{"issue":"1","key":"260_CR22","doi-asserted-by":"publisher","first-page":"6172362","DOI":"10.1155\/2022\/6172362","volume":"2022","author":"GMH Bashar","year":"2022","unstructured":"Bashar GMH, Kashem MA, Paul LC. Intrusion detection for Cyber-Physical security system using long Short\u2010Term memory model. Sci Program. 2022;2022(1):6172362. https:\/\/doi.org\/10.1155\/2022\/6172362.","journal-title":"Sci Program"},{"issue":"1","key":"260_CR23","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/tii.2022.3156642","volume":"19","author":"O Aouedi","year":"2022","unstructured":"Aouedi O, Piamrat K, Muller G, Singh K. Federated semisupervised learning for attack detection in industrial internet of things. IEEE Trans Industr Inf. 2022;19(1):286\u201395. https:\/\/doi.org\/10.1109\/tii.2022.3156642.","journal-title":"IEEE Trans Industr Inf"},{"issue":"22","key":"260_CR24","doi-asserted-by":"publisher","first-page":"8974","DOI":"10.3390\/s22228974","volume":"22","author":"P Verma","year":"2022","unstructured":"Verma P, Breslin JG, O\u2019Shea D. Fldid: federated learning enabled deep intrusion detection in smart manufacturing industries. Sensors. 2022;22(22):8974. https:\/\/doi.org\/10.3390\/s22228974.","journal-title":"Sensors"},{"issue":"1","key":"260_CR25","doi-asserted-by":"publisher","first-page":"p8890306","DOI":"10.1155\/2020\/8890306","volume":"2020","author":"P Sun","year":"2020","unstructured":"Sun P, Liu P, Li Q, Liu C, Lu X, Hao R, Chen J. DL-IDS: extracting features using CNN\u2010LSTM hybrid network for intrusion detection system. Secur Communication Networks. 2020;2020(1):p8890306. https:\/\/doi.org\/10.1155\/2020\/8890306.","journal-title":"Secur Communication Networks"},{"issue":"1","key":"260_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s43926-025-00130-8","volume":"5","author":"P Selvam","year":"2025","unstructured":"Selvam P, Karthikeyan P, Manochitra S, Sujith AVLN, Ganesan T, Ayyasamy R, Shuaib M, Alam S, Rajendran A. Federated learning-based hybrid convolutional recurrent neural network for multi-class intrusion detection in IoT networks. Discover Internet Things. 2025;5(1):39. https:\/\/doi.org\/10.1007\/s43926-025-00130-8.","journal-title":"Discover Internet Things"},{"key":"260_CR27","doi-asserted-by":"crossref","unstructured":"Rahmati M, Pagano A. July. Federated Learning-Driven cybersecurity framework for IoT networks with privacy preserving and Real-Time threat detection capabilities. Informatics. Volume 12. MDPI; 2025. p. 62. 3.","DOI":"10.3390\/informatics12030062"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00260-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00260-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00260-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T12:37:43Z","timestamp":1767789463000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00260-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["260"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00260-z","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"14 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All datasets used in this study, including those sourced from Kaggle (\n                      \n                      ), are publicly available and come with licenses that grant permission for research use.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}