{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:11:33Z","timestamp":1774879893736,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In the current era, a tremendous volume of data has been generated by using web technologies. The association between different devices and services have also been explored to wisely and widely use recent technologies. Due to the restriction in the available resources, the chance of security violation is increasing highly on the constrained devices. IoT backend with the multi-cloud infrastructure to extend the public services in terms of better scalability and reliability. Several users might access the multi-cloud resources that lead to data threats while handling user requests for IoT services. It poses a new challenge in proposing new functional elements and security schemes. This paper introduces an intelligent Intrusion Detection Framework (IDF) to detect network and application-based attacks. The proposed framework has three phases: data pre-processing, feature selection and classification. Initially, the collected datasets are pre-processed using Integer- Grading Normalization (I-GN) technique that ensures a fair-scaled data transformation process. Secondly, Opposition-based Learning- Rat Inspired Optimizer (OBL-RIO) is designed for the feature selection phase. The progressive nature of rats chooses the significant features. The fittest value ensures the stability of the features from OBL-RIO. Finally, a 2D-Array-based Convolutional Neural Network (2D-ACNN) is proposed as the binary class classifier. The input features are preserved in a 2D-array model to perform on the complex layers. It detects normal (or) abnormal traffic. The proposed framework is trained and tested on the Netflow-based datasets. The proposed framework yields 95.20% accuracy, 2.5% false positive rate and 97.24% detection rate.<\/jats:p>","DOI":"10.1186\/s13677-023-00509-4","type":"journal-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T06:02:30Z","timestamp":1695362550000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Intelligent intrusion detection framework for multi-clouds \u2013 IoT environment using swarm-based deep learning classifier"],"prefix":"10.1186","volume":"12","author":[{"given":"Syed Mohamed Thameem","family":"Nizamudeen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"509_CR1","doi-asserted-by":"crossref","unstructured":"Ejaz W, Anpalagan A (2019) Internet of things for smart cities: technologies, big data and security, Springer, SpringerBriefs in Electrical and Computer Engineering","DOI":"10.1007\/978-3-319-95037-2"},{"issue":"1","key":"509_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43926-021-00006-7","volume":"1","author":"K Fizza","year":"2021","unstructured":"Fizza K, Banerjee A, Mitra K, Jayaraman PP, Ranjan R, Patel P, Georgakopoulos D (2021) Qoe in iot: a vision, survey and future directions. Discover Internet Things 1(1):1\u201314","journal-title":"Discover Internet Things"},{"issue":"3","key":"509_CR3","first-page":"1","volume":"16","author":"Z Huang","year":"2020","unstructured":"Huang Z, Wu W, Shan F, Bian Y, Lu K, Li Z, Wang J, Wang J (2020) Couas: enable cooperation for unmanned aerial systems, ACM Trans. Sens Netw 16(3):1\u201319","journal-title":"Sens Netw"},{"key":"509_CR4","unstructured":"Kreibich C (2001) Network Intrusion Detection: Evasion, Traffic Normalization, and EndTo-End Protocol Semantics"},{"key":"509_CR5","doi-asserted-by":"crossref","unstructured":"Kabir MF, Hartmann S (2018) Cyber security challenges: an efficient intrusion detection system design, in: 2018 International Young Engineers Forum (YEF-ECE), IEEE pp. 19\u201324","DOI":"10.1109\/YEF-ECE.2018.8368933"},{"issue":"5","key":"509_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process Mag 35(5):41\u201349","journal-title":"IEEE Signal Process Mag"},{"issue":"4","key":"509_CR7","doi-asserted-by":"publisher","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","volume":"20","author":"A Nisioti","year":"2018","unstructured":"Nisioti A, Mylonas A, Yoo PD, Katos V (2018) From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun Surv Tutor 20(4):3369\u20133388","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"509_CR8","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in iot security: current solutions and future challenges. IEEE Commun Surv Tutor 22(3):1686\u20131721","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"509_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/JIOT.2021.3098051","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh S, Sulthana R, Shewale T, Chamola V, Benslimane A, Sikdar B (2021) Machine-learning-assisted security and privacy provisioning for edge computing: a survey. IEEE Internet Things J 9(1):236\u2013260","journal-title":"IEEE Internet Things J"},{"key":"509_CR10","doi-asserted-by":"publisher","first-page":"109154","DOI":"10.1016\/j.comnet.2022.109154","volume":"214","author":"CA de Souza","year":"2022","unstructured":"de Souza CA, Westphall CB, Machado RB, Lof L, Westphall CM, Geronimo GA (2022) Intrusion detection and prevention in fog based IoT environments: a systematic literature review. Comput Netw. 214:109154","journal-title":"Comput Netw."},{"issue":"4","key":"509_CR11","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","volume":"20","author":"E Benkhelifa","year":"2018","unstructured":"Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for iot: toward universal and resilient systems. IEEE Commun Surv Tutor 20(4):3496\u20133509","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6","key":"509_CR12","doi-asserted-by":"publisher","first-page":"e4112","DOI":"10.1002\/ett.4112","volume":"32","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A distributed framework for detecting ddos attacks in smart contract-based blockchainiot systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112","journal-title":"Trans Emerg Telecommun Technol"},{"key":"509_CR13","doi-asserted-by":"crossref","unstructured":"Choudhary S, Kesswani N. Detection and prevention of routing attacks in internet of things, in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), IEEE, 2018, pp. 1537\u20131540","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00219"},{"key":"509_CR14","first-page":"1","volume-title":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","author":"S Choudhary","year":"2019","unstructured":"Choudhary S, Kesswani N (2019) Cluster-based intrusion detection method for internet of things. 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA). pp 1\u20138"},{"key":"509_CR15","doi-asserted-by":"crossref","unstructured":"Vishwakarma M, Kesswani N. A two-stage intrusion detection system (tids) for internet of things, in: Advances in Deep Learning, Artifcial Intelligence and Robotics. Springer. 2022. pp. 89\u201397","DOI":"10.1007\/978-3-030-85365-5_9"},{"issue":"1","key":"509_CR16","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/JIOT.2019.2948149","volume":"7","author":"S Murali","year":"2019","unstructured":"Murali S, Jamalipour A (2019) A lightweight intrusion detection for Sybil attack under mobile rpl in the internet of things. IEEE Internet Things J 7(1):379\u2013388","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"509_CR17","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, S\u0142owi\u0144ska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home iot devices. IEEE Internet Things J 6(5):9042\u20139053","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"509_CR18","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"J Li","year":"2018","unstructured":"Li J, Zhao Z, Li R, Zhang H (2018) Ai-based two-stage intrusion detection for software defned iot networks. IEEE Internet Things J 6(2):2093\u20132102","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"509_CR19","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa N, Turnbull B, Choo K-KR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network trafc of internet of things. IEEE Internet Things J 6(3):4815\u20134830","journal-title":"IEEE Internet Things J"},{"key":"509_CR20","first-page":"103","volume":"41","author":"M Baykara","year":"2018","unstructured":"Baykara M, Das R (2018) A novel honeypot based security approach for real-time intrusion detection and prevention systems. J Inform Secur Appl 41:103\u2013116","journal-title":"J Inform Secur Appl"},{"key":"509_CR21","doi-asserted-by":"publisher","first-page":"138451","DOI":"10.1109\/ACCESS.2021.3116219","volume":"9","author":"S Seth","year":"2021","unstructured":"Seth S, Chahal KK, Singh G (2021) A novel ensemble framework for an intelligent intrusion detection system. IEEE Access 9:138451\u2013138467","journal-title":"IEEE Access"},{"issue":"14","key":"509_CR22","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.3390\/su14148707","volume":"14","author":"T-T-H Le","year":"2022","unstructured":"Le T-T-H, Oktian YE, Kim H (2022) Xgboost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems. Sustainability 14(14):8707","journal-title":"Sustainability"},{"issue":"8","key":"509_CR23","doi-asserted-by":"publisher","first-page":"6282","DOI":"10.1109\/JIOT.2020.3026023","volume":"8","author":"B Tushir","year":"2020","unstructured":"Tushir B, Dalal Y, Dezfouli B, Liu Y (2020) A quantitative study of ddos and e-ddos attacks on wif smart home devices. IEEE Internet Things J 8(8):6282\u20136292","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"509_CR24","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1007\/s13369-021-06086-5","volume":"47","author":"A Abbas","year":"2022","unstructured":"Abbas A, Khan MA, Latif S, Ajaz M, Shah AA, Ahmad J (2022) A new ensemble-based intrusion detection system for internet of things. Arab J Sci Eng 47(2):1805\u20131819","journal-title":"Arab J Sci Eng"},{"key":"509_CR25","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks, Ieee. Access 5:21954\u201321961","journal-title":"Access"},{"issue":"1","key":"509_CR26","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1):41\u201350","journal-title":"IEEE Trans Emerg Topics Comput Intell"},{"issue":"12","key":"509_CR27","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo K-KR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting iot and cloud networks. IEEE Internet Things J 8(12):9463\u20139472","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"509_CR28","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2019","unstructured":"Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963\u20131971","journal-title":"IEEE Trans Industr Inf"},{"key":"509_CR29","doi-asserted-by":"crossref","unstructured":"Khan IA, Moustafa N, Pi D, Sallam KM, Zomaya AY, Li B (2022) A new explainable deep learning framework for cyber threat discovery in industrial iot networks, IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2021.3130156"},{"key":"509_CR30","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomalybased intrusion detection system for iot networks through deep learning model. Comput Electr Eng 99:107810","journal-title":"Comput Electr Eng"},{"key":"509_CR31","doi-asserted-by":"publisher","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah I, Mahmoud QH (2021) A framework for anomaly detection in iot networks using conditional generative adversarial networks. IEEE Access 9:165907\u2013165931","journal-title":"IEEE Access"},{"key":"509_CR32","doi-asserted-by":"crossref","unstructured":"Zhao R, Gui G, Xue Z, Yin J, Ohtsuki T, Adebisi B, Gacanin H (2023) A novel intrusion detection method based on lightweight neural network for internet of things, IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2021.3119055"},{"key":"509_CR33","doi-asserted-by":"crossref","unstructured":"Rania A. Elsayed, Reem A. Hamada, Mahmoud I. Abdalla, Shaimaa Ahmed Elsaid, Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Aim Shams Engineering Journal. 2023","DOI":"10.1016\/j.asej.2023.102211"},{"key":"509_CR34","doi-asserted-by":"crossref","unstructured":"Marta Catillo, Antonio Pecchai & Umberto Villiano, CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. Comput Secur. 2023;129","DOI":"10.1016\/j.cose.2023.103210"},{"key":"509_CR35","doi-asserted-by":"crossref","unstructured":"Naeem Firdous Syed, Mengmeng Ge & Zubair Baig, Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks. Comput Netw 2023;225","DOI":"10.1016\/j.comnet.2023.109662"},{"key":"509_CR36","doi-asserted-by":"crossref","unstructured":"Hakan Can Altunay & Zafer Albayrak, A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks, Engineering Science and Technology, an International Journal. 2023;38","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"509_CR37","unstructured":"Dataset download link: https:\/\/staff.itee.uq.edu.au\/marius\/NIDS_datasets\/"},{"key":"509_CR38","doi-asserted-by":"publisher","first-page":"100459","DOI":"10.1016\/j.measen.2022.100459","volume":"24","author":"B Raviprasad","year":"2022","unstructured":"Raviprasad B, Mohan CR, Devi GN, Pugalenthi R, Manikandan LC, Ponnusamy S (2022) Accuracy determination using deep learning technique in cloud-based IoT sensor environment. Meas Sens 24:100459","journal-title":"Meas Sens"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00509-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00509-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00509-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:38:21Z","timestamp":1700354301000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00509-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["509"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00509-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2409418\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"23 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"134"}}