{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:40:31Z","timestamp":1776681631238,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-022-03621-3","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T15:03:05Z","timestamp":1653318185000},"page":"367-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4932-1660","authenticated-orcid":false,"given":"Amir","family":"Javadpour","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Forough","family":"Ja\u2019fari","sequence":"additional","affiliation":[]},{"given":"Weizhe","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,23]]},"reference":[{"key":"3621_CR1","doi-asserted-by":"publisher","first-page":"150.936","DOI":"10.1109\/ACCESS.2019.2947652","volume":"7","author":"M De Donno","year":"2019","unstructured":"De Donno, M., Tange, K., Dragoni, N.: Foundations and evolution of modern computing paradigms: cloud, IoT, edge, and fog. IEEE Access 7, 150.936-150.948 (2019)","journal-title":"IEEE Access"},{"key":"3621_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03312-5","author":"A Javadpour","year":"2021","unstructured":"Javadpour, A., Abadi, A.M.H., Rezaei, S., Zomorodian, M., Rostami, A.S.: Improving load balancing for data-duplication in Big Data cloud computing networks. Clust. Comput. (2021). https:\/\/doi.org\/10.1007\/s10586-021-03312-5","journal-title":"Clust. Comput."},{"key":"3621_CR3","first-page":"1","volume":"78","author":"A Javadpour","year":"2021","unstructured":"Javadpour, A., Wang, G.: cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 78, 1\u201323 (2021)","journal-title":"J. Supercomput."},{"key":"3621_CR4","doi-asserted-by":"publisher","first-page":"101470","DOI":"10.1016\/j.cose.2019.02.006","volume":"87","author":"M Gheisari","year":"2019","unstructured":"Gheisari, M., Wang, G., Khan, W.Z., Fern\u00e1ndez-Campusano, C.: A context-aware privacy-preserving method for IoT-based smart city using software defined networking. Comput. Secur. 87, 101470 (2019)","journal-title":"Comput. Secur."},{"issue":"3","key":"3621_CR5","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1007\/s11277-020-07691-7","volume":"115","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S.: Resource management in a peer to peer cloud network for IoT. Wirel. Pers. Commun. 115(3), 2471\u20132488 (2020)","journal-title":"Wirel. Pers. Commun."},{"issue":"9","key":"3621_CR6","doi-asserted-by":"publisher","first-page":"6969","DOI":"10.1007\/s11227-019-03136-6","volume":"76","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S., Li, K.-C.: Detecting straggler MapReduce tasks in Big Data processing infrastructure by neural network. J. Supercomput. 76(9), 6969\u20136993 (2020)","journal-title":"J. Supercomput."},{"key":"3621_CR7","first-page":"1","volume":"123","author":"R Hedayati","year":"2021","unstructured":"Hedayati, R., Mostafavi, S.: A lightweight image encryption algorithm for secure communications in multimedia Internet of Things. Wirel. Pers. Commun. 123, 1\u201323 (2021)","journal-title":"Wirel. Pers. Commun."},{"key":"3621_CR8","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.procs.2019.11.005","volume":"160","author":"H Toumi","year":"2019","unstructured":"Toumi, H., Fagroud, F.Z., Zakouni, A., Talea, M.: Implementing Hy-IDS, mobiles agents and virtual firewall to enhance the security in IaaS cloud. Procedia Comput. Sci. 160, 819\u2013824 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"3621_CR9","doi-asserted-by":"crossref","unstructured":"Sukmana, M.I., Torkura, K.A., Graupner, H., Cheng, F., Meinel, C.: Unified cloud access control model for cloud storage broker. In: 2019 International Conference on Information Networking (ICOIN), pp. 60\u201365. IEEE (2019)","DOI":"10.1109\/ICOIN.2019.8717982"},{"issue":"7","key":"3621_CR10","doi-asserted-by":"publisher","first-page":"3176","DOI":"10.3390\/app11073176","volume":"11","author":"N Torres","year":"2021","unstructured":"Torres, N., Pinto, P., Lopes, S.I.: Security vulnerabilities in LPWANs\u2014an attack vector analysis for the IoT ecosystem. Appl. Sci. 11(7), 3176 (2021)","journal-title":"Appl. Sci."},{"issue":"2","key":"3621_CR11","doi-asserted-by":"publisher","first-page":"022048","DOI":"10.1088\/1757-899X\/981\/2\/022048","volume":"981","author":"RK Marrikukkala","year":"2020","unstructured":"Marrikukkala, R.K., Praveen, P., Yadav, B.P., Jhansi, G., Rao, P.V.R.: Remote data auditing in multi-tenancy cloud storage by using file attribute test technique. IOP Conf. Ser. Mater. Sci. Eng. 981(2), 022048 (2020)","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"3621_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3001017","author":"W Wang","year":"2020","unstructured":"Wang, W., Du, X., Shan, D., Qin, R., Wang, N.: Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans. Cloud Comput. (2020). https:\/\/doi.org\/10.1109\/TCC.2020.3001017","journal-title":"IEEE Trans. Cloud Comput."},{"key":"3621_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jpdc.2018.07.013","volume":"122","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Meng, W., Li, W., Li, J., Liu, W.-X., Xiang, Y.: A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distrib. Comput. 122, 26\u201335 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"7","key":"3621_CR14","first-page":"1","volume":"5","author":"P Alekar","year":"2018","unstructured":"Alekar, P.: Survey on intrusion detection system (IDS). Int. J. Technol. Res. Manag. 5(7), 1\u20135 (2018)","journal-title":"Int. J. Technol. Res. Manag."},{"key":"3621_CR15","doi-asserted-by":"crossref","unstructured":"Visoottiviseth, V., Sakarin, P., Thongwilai, J., Choobanjong, T.: Signature-based and behavior-based attack detection with machine learning for home IoT devices. In: IEEE Region 10 Conference (TENCON), 2020, pp. 829\u2013834. IEEE (2020)","DOI":"10.1109\/TENCON50793.2020.9293811"},{"issue":"16","key":"3621_CR16","doi-asserted-by":"publisher","first-page":"3724","DOI":"10.1002\/sec.1539","volume":"9","author":"M Masdari","year":"2016","unstructured":"Masdari, M., Jalali, M.: A survey and taxonomy of DOS attacks in cloud computing. Secur. Commun. Netw. 9(16), 3724\u20133751 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"3621_CR17","doi-asserted-by":"publisher","first-page":"012121","DOI":"10.1088\/1742-6596\/1804\/1\/012121","volume":"1804","author":"SM Alturfi","year":"2021","unstructured":"Alturfi, S.M., Muhsen, D.K., Mohammed, M.A., Aziz, I.T., Aljshamee, M.: A combination techniques of intrusion prevention and detection for cloud computing. J. Phys. Conf. Ser. 1804(1), 012121 (2021)","journal-title":"J. Phys. Conf. Ser."},{"key":"3621_CR18","doi-asserted-by":"crossref","unstructured":"Ravji, S., Ali, M.: Integrated intrusion detection and prevention system with honeypot in cloud computing. In: 2018 International Conference on Computing, Electronics and Communications Engineering (iCCECE), pp. 95\u2013100. IEEE (2018)","DOI":"10.1109\/iCCECOME.2018.8658593"},{"key":"3621_CR19","doi-asserted-by":"publisher","first-page":"28573","DOI":"10.1109\/ACCESS.2018.2831228","volume":"6","author":"A Dorri","year":"2018","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Multi-agent systems: a survey. IEEE Access 6, 28573\u201328593 (2018)","journal-title":"IEEE Access"},{"key":"3621_CR20","doi-asserted-by":"crossref","unstructured":"Rebbah, M., Rebbah, D.E.H., Smail, O.: Intrusion detection in Cloud Internet of Things environment. In: 2017 International Conference on Mathematics and Information Technology (ICMIT), pp. 65\u201370. IEEE (2017)","DOI":"10.1109\/MATHIT.2017.8259697"},{"key":"3621_CR21","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","volume":"74","author":"AS Sohal","year":"2018","unstructured":"Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340\u2013354 (2018)","journal-title":"Comput. Secur."},{"key":"3621_CR22","doi-asserted-by":"crossref","unstructured":"\u00c1d\u00e1m, N., Mado\u0161, B., Bal\u00e1\u017e, A., Pavlik, T.: Artificial neural network based IDS. In: 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp. 000159\u2013000164. IEEE (2017)","DOI":"10.1109\/SAMI.2017.7880294"},{"key":"3621_CR23","doi-asserted-by":"crossref","unstructured":"Ghosh, P., Mitra, R.: Proposed GA-BFSS and logistic regression based intrusion detection system. In: Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/C3IT.2015.7060117"},{"key":"3621_CR24","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Abharian, S.K., Wang, G.: Feature selection and intrusion detection in cloud environment based on machine learning algorithms. In: IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC), 2017, pp. 1417\u20131421. IEEE (2017)","DOI":"10.1109\/ISPA\/IUCC.2017.00215"},{"issue":"1","key":"3621_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.icte.2018.01.014","volume":"5","author":"B Hajimirzaei","year":"2019","unstructured":"Hajimirzaei, B., Navimipour, N.J.: Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express 5(1), 56\u201359 (2019)","journal-title":"ICT Express"},{"key":"3621_CR26","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.cose.2019.06.013","volume":"86","author":"Z Chiba","year":"2019","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., Rida, M., et al.: Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Comput. Secur. 86, 291\u2013317 (2019)","journal-title":"Comput. Secur."},{"key":"3621_CR27","doi-asserted-by":"crossref","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A clever approach to develop an efficient deep neural network based IDS for cloud environments using a self-adaptive genetic algorithm. In: International Conference on Advanced Communication Technologies and Networking (CommNet), 2019, pp. 1\u20139. IEEE (2019)","DOI":"10.1109\/COMMNET.2019.8742390"},{"key":"3621_CR28","doi-asserted-by":"publisher","first-page":"73907","DOI":"10.1109\/ACCESS.2020.2988055","volume":"8","author":"J Pacheco","year":"2020","unstructured":"Pacheco, J., Benitez, V.H., Felix-Herran, L.C., Satam, P.: Artificial neural networks-based intrusion detection system for Internet of Things fog nodes. IEEE Access 8, 73907\u201373918 (2020)","journal-title":"IEEE Access"},{"key":"3621_CR29","doi-asserted-by":"publisher","first-page":"107417","DOI":"10.1016\/j.comnet.2020.107417","volume":"180","author":"CA de Souza","year":"2020","unstructured":"de Souza, C.A., Westphall, C.B., Machado, R.B., Sobral, J.B.M., dos Santos Vieira, G.: Hybrid approach to intrusion detection in fog-based IoT environments. Comput. Netw. 180, 107417 (2020)","journal-title":"Comput. Netw."},{"issue":"2","key":"3621_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10515-021-00298-7","volume":"28","author":"D Selvapandian","year":"2021","unstructured":"Selvapandian, D., Santhosh, R.: Deep learning approach for intrusion detection in IoT-multi cloud environment. Autom. Softw. Eng. 28(2), 1\u201317 (2021)","journal-title":"Autom. Softw. Eng."},{"key":"3621_CR31","doi-asserted-by":"crossref","unstructured":"Kotpalliwar, M.V., Wajgi, R.: Classification of attacks using support vector machine (SVM) on KDD Cup\u201999 IDS database. In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 987\u2013990. IEEE (2015)","DOI":"10.1109\/CSNT.2015.185"},{"key":"3621_CR32","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/ACCESS.2018.2883142","volume":"7","author":"W Wang","year":"2018","unstructured":"Wang, W., Du, X., Wang, N.: Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access 7, 1345\u20131354 (2018)","journal-title":"IEEE Access"},{"key":"3621_CR33","doi-asserted-by":"publisher","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","volume":"7","author":"TG Nguyen","year":"2019","unstructured":"Nguyen, T.G., Phan, T.V., Nguyen, B.T., So-In, C., Baig, Z.A., Sanguanpong, S.: SeArch: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks. IEEE Access 7, 107678\u2013107694 (2019)","journal-title":"IEEE Access"},{"key":"3621_CR34","doi-asserted-by":"crossref","unstructured":"Martinez, C.V., Sollfrank, M., Vogel-Heuser, B.: A multi-agent approach for hybrid intrusion detection in industrial networks: design and implementation. In: 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), vol. 1, pp. 351\u2013357. IEEE (2019)","DOI":"10.1109\/INDIN41052.2019.8972055"},{"issue":"1","key":"3621_CR35","doi-asserted-by":"publisher","first-page":"012033","DOI":"10.1088\/1742-6596\/1898\/1\/012033","volume":"1898","author":"B Kerim","year":"2021","unstructured":"Kerim, B.: Securing IoT network against DDoS attacks using multi-agent IDS. J. Phys. Conf. Ser. 1898(1), 012033 (2021)","journal-title":"J. Phys. Conf. Ser."},{"key":"3621_CR36","doi-asserted-by":"crossref","unstructured":"Sethi, K., Kumar, R., Prajapati, N., Bera, P.: Deep reinforcement learning based intrusion detection system for cloud infrastructure. In: 2020 International Conference on COMmunication Systems and NETworkS (COMSNETS), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"3621_CR37","first-page":"102923","volume":"61","author":"K Sethi","year":"2021","unstructured":"Sethi, K., Madhav, Y.V., Kumar, R., Bera, P.: Attention based multi-agent intrusion detection systems using reinforcement learning. J. Inf. Secur. Appl. 61, 102923 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"11","key":"3621_CR38","doi-asserted-by":"publisher","first-page":"356","DOI":"10.3390\/info10110356","volume":"10","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xiao, X.: An intrusion detection system based on a simplified residual network. Information 10(11), 356 (2019)","journal-title":"Information"},{"key":"3621_CR39","doi-asserted-by":"crossref","unstructured":"Sun, C.-C., Hong, J., Liu, C.-C.: A coordinated cyber attack detection system (CCADS) for multiple substations. In: Power Systems Computation Conference (PSCC), 2016, pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/PSCC.2016.7540902"},{"key":"3621_CR40","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD Cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"3621_CR41","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Rezaei, S., Li, K.C., Wang, G.: A scalable feature selection and opinion miner using whale optimization algorithm. In: Advances in Signal Processing and Intelligent Recognition Systems, pp. 237\u2013247 (2020)","DOI":"10.1007\/978-981-15-4828-4_20"},{"key":"3621_CR42","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v10i2.6395","author":"R Bala","year":"2019","unstructured":"Bala, R., Nagpal, R.: A review on KDD Cup99 and NSL-KDD dataset. Int. J. Adv. Res. Comput. Sci. (2019). https:\/\/doi.org\/10.26483\/ijarcs.v10i2.6395","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"3621_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06188-0","author":"A Javadpour","year":"2021","unstructured":"Javadpour, A., Rezaei, S., Sangaiah, A.K., Slowik, A., Mahmoodi Khaniabadi, S.: Enhancement in quality of routing service using metaheuristic PSO algorithm in VANET networks. Soft Comput. (2021). https:\/\/doi.org\/10.1007\/s00500-021-06188-0","journal-title":"Soft Comput."},{"issue":"2","key":"3621_CR44","doi-asserted-by":"publisher","first-page":"2993","DOI":"10.1007\/s12652-020-02461-6","volume":"12","author":"F Ja\u2019fari","year":"2021","unstructured":"Ja\u2019fari, F., Mostafavi, S., Mizanian, K., Jafari, E.: An intelligent botnet blocking approach in software defined networks using honeypots. J. Ambient Intell. Humaniz. Comput. 12(2), 2993\u20133016 (2021)","journal-title":"J. Ambient Intell. Humaniz. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03621-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03621-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03621-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:19:15Z","timestamp":1677507555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03621-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3621"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03621-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"17 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}