{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:19:35Z","timestamp":1774448375502,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:00:00Z","timestamp":1722556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:00:00Z","timestamp":1722556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With development of blockchain technology, clouding computing and Internet of Things (IoT), blockchain and cloud of things (BCoT) has become development tendency. But the security has become the most development hinder of BCoT. Attack detection model is a crucial part of attack revelation mechanism for BCoT. As a consequence, attack detection model has received more concerned. Due to the great diversity and variation of network attacks aiming to BCoT, tradition attack detection models are not suitable for BCoT. In this paper, we propose a novel attack detection model for BCoT, denoted as cVAE-DML. The novel model is based on contrastive variational autoencoder (cVAE) and deep metric learning (DML). By training the cVAE, the proposed model generates private features for attack traffic information as well as shared features between attack traffic information and normal traffic information. Based on those generated features, the proposed model can generate representative new samples to balance the training dataset. At last, the decoder of cVAE is connected to the deep metric learning network to detect attack aiming to BCoT. The efficiency of cVAE-DML is verified using the CIC-IDS 2017 dataset and CSE-CIC-IDS 2018 dataset. The results show that cVAE-DML can improve attack detection efficiency even under the condition of unbalanced samples.<\/jats:p>","DOI":"10.1186\/s13677-024-00678-w","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T10:04:58Z","timestamp":1722593098000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Attack detection model for BCoT based on contrastive variational autoencoder and metric learning"],"prefix":"10.1186","volume":"13","author":[{"given":"Chunwang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaolei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kangyi","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Bangzhou","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Jiazhong","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jiayong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,2]]},"reference":[{"key":"678_CR1","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s11831-020-09426-0","volume":"28","author":"S Namasudra","year":"2021","unstructured":"Namasudra S et al (2021) The revolution of blockchain: State-of-the-art and research challenges. Arch Comput Methods Engine 28:1497\u20131515","journal-title":"Arch Comput Methods Engine"},{"issue":"5","key":"678_CR2","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.1109\/TNSE.2022.3168025","volume":"10","author":"Y Liu","year":"2023","unstructured":"Liu Y, Wangyuan Yu, Ai Z, Guangxia Xu, Zhao L, Tian Z (2023) A blockchain-empowered federated learning in healthcare-based cyber physical systems. IEEE Trans Netw Sci Eng 10(5):2685\u20132696","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"678_CR3","doi-asserted-by":"crossref","unstructured":"Mishra R (2023) Cloud of Things and Blockchain Integration: Architecture, Applications, and Challenges. 2023 International Conference on Artificial Intelligence and Smart Communication (AISC). IEEE, pp 1150\u20131154","DOI":"10.1109\/AISC56616.2023.10084991"},{"key":"678_CR4","doi-asserted-by":"publisher","first-page":"108594","DOI":"10.1016\/j.comnet.2021.108594","volume":"201","author":"Y Liu","year":"2021","unstructured":"Liu Y, Lan Y, Li B, Miao C, Tian Z (2021) Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains. Comput Netw 2021:201:108594","journal-title":"Comput Netw"},{"key":"678_CR5","doi-asserted-by":"crossref","unstructured":"Chaudhari S, Dhumal R, Maktum T (2022) Blockchain of Things: Benefits and Research Challenges[J]. Real-Life Applications of the Internet of Things 313\u2013347","DOI":"10.1201\/9781003277460-17"},{"key":"678_CR6","doi-asserted-by":"crossref","unstructured":"Nguyen DC, Pathirana PN, Ding M et al (2020) Integration of blockchain and cloud of things: Architecture, applications and challenges[J]. IEEE Communications surveys & tutorials 22(4):2521\u20132549","DOI":"10.1109\/COMST.2020.3020092"},{"key":"678_CR7","doi-asserted-by":"publisher","first-page":"2647","DOI":"10.3390\/electronics10212647","volume":"10","author":"S Balogh","year":"2021","unstructured":"Balogh S et al (2021) IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques. Electronics 10:2647","journal-title":"Electronics"},{"key":"678_CR8","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Int Things J 8:9463\u20139472","journal-title":"IEEE Int Things J"},{"key":"678_CR9","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.3390\/app12105015","volume":"12","author":"K Albulayhi","year":"2022","unstructured":"Albulayhi K et al (2022) IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci 12:5015","journal-title":"Appl Sci"},{"key":"678_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/JAS.2021.1004261","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang J et al (2021) Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE\/CAA J Automatica Sinica 9:377\u2013391","journal-title":"IEEE\/CAA J Automatica Sinica"},{"key":"678_CR11","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.future.2022.03.007","volume":"133","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Liu Q (2022) On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples. Futur Gener Comput Syst 133:213\u2013227","journal-title":"Futur Gener Comput Syst"},{"key":"678_CR12","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.ins.2021.05.016","volume":"569","author":"G Andresini","year":"2021","unstructured":"Andresini G, Appice A, Malerba D (2021) Autoencoder-based deep metric learning for network intrusion detection. Inf Sci 569:706\u2013727","journal-title":"Inf Sci"},{"key":"678_CR13","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.ins.2021.08.010","volume":"579","author":"F Jin","year":"2021","unstructured":"Jin F, Chen M, Zhang W et al (2021) attack detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning [J]. Inf Sci 579:814\u2013831","journal-title":"Inf Sci"},{"key":"678_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB et al (2017) A survey of intrusion detection in Internet of Things. J Netw Comp Appl 84:25\u201337","journal-title":"J Netw Comp Appl"},{"key":"678_CR15","doi-asserted-by":"crossref","unstructured":"Dai W, Ng K, Severson K et al (2019) Generative oversampling with a contrastive variational autoencoder[C]\/\/2019 IEEE International Conference on Data Mining (ICDM). IEEE, pp 101\u2013109","DOI":"10.1109\/ICDM.2019.00020"},{"key":"678_CR16","unstructured":"Abid A, Zou J. Contrastive variational autoencoder enhances salient features[J]. arXiv preprint arXiv:1902.04601, 2019."},{"key":"678_CR17","doi-asserted-by":"crossref","unstructured":"Hoffer E, Ailon N (2015) Deep metric learning using triplet network[C]\/\/Similarity-based pattern recognition: third international workshop, SIMBAD 2015, Copenhagen, Denmark, October 12-14, 2015. Proceedings 3, Springer International Publishing, pp 84\u201392","DOI":"10.1007\/978-3-319-24261-3_7"},{"key":"678_CR18","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","volume":"127","author":"S Roy","year":"2022","unstructured":"Roy S, Li J, Choi BJ et al (2022) A lightweight supervised attack detection mechanism for IoT networks[J]. Futur Gener Comput Syst 127:276\u2013285","journal-title":"Futur Gener Comput Syst"},{"key":"678_CR19","doi-asserted-by":"crossref","unstructured":"Vigneswaran RK, et al (2018) Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. 2018 9th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"678_CR20","unstructured":"Sheikh N U, Rahman H, Vikram S, et al. A lightweight signature-based IDS for IoT environment[J]. arXiv preprint arXiv:1811.04582, 2018."},{"issue":"3","key":"678_CR21","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1145\/1015047.1015055","volume":"3","author":"RT Liu","year":"2004","unstructured":"Liu RT, Huang NF, Chen CH et al (2004) A fast string-matching algorithm for network processor-based attack detection system[J]. ACM Trans Embed Comput Syst (TECS) 3(3):614\u2013633","journal-title":"ACM Trans Embed Comput Syst (TECS)"},{"key":"678_CR22","doi-asserted-by":"crossref","unstructured":"Rebbah M, Rebbah DEH, Smail O (2017) Intrusion detection in Cloud Internet of Things environment[C]\/\/2017 International Conference on Mathematics and Information Technology (ICMIT). IEEE 65\u201370","DOI":"10.1109\/MATHIT.2017.8259697"},{"key":"678_CR23","unstructured":"Larijani H, Ahmad J, Mtetwa NA, novel random neural network-based approach for attack detection systems[C]. (2018) 10th Computer Science and Electronic Engineering (CEEC). IEEE 2018:50\u201355"},{"key":"678_CR24","doi-asserted-by":"publisher","first-page":"100557","DOI":"10.1016\/j.iot.2022.100557","volume":"19","author":"S Roy","year":"2022","unstructured":"Roy S, Li J, Bai Y (2022) A two-layer fog-cloud attack detection model for IoT networks [J]. Internet of Things 2022;19:100557","journal-title":"Internet of Things"},{"key":"678_CR25","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J et al (2017) A deep learning approach for attack detection using recurrent neural networks[J]. Ieee Access 5:21954\u201321961","journal-title":"Ieee Access"},{"key":"678_CR26","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP et al (2019) Deep learning approach for intelligent attack detection system[J]. Ieee Access 7:41525\u201341550","journal-title":"Ieee Access"},{"key":"678_CR27","first-page":"1","volume":"2020","author":"P Sun","year":"2020","unstructured":"Sun P et al (2020) DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system. Sec Commun Netw 2020:1\u201311","journal-title":"Sec Commun Netw"},{"key":"678_CR28","doi-asserted-by":"publisher","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Peisong L et al (2019) Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7:31711\u201331722","journal-title":"IEEE Access"},{"key":"678_CR29","doi-asserted-by":"publisher","first-page":"107784","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge M et al (2021) Towards a deep learning-driven intrusion detection approach for Internet of Things. Comp Netw 2021:186:107784","journal-title":"Comp Netw"},{"key":"678_CR30","first-page":"6247","volume":"18","author":"PF de Araujo-Filho","year":"2020","unstructured":"de Araujo-Filho PF, Kaddoum G, Campelo DR, Santos AG, Mac\u00eado D, Zanchettin C (2020) attack detection for cyber-physical systems using generative adversarial networks in fog environment. IEEE Internet Things J. 18:6247","journal-title":"IEEE Internet Things J."},{"key":"678_CR31","doi-asserted-by":"crossref","unstructured":"Andresini G, Appice A, Paolo Caforio F et al (2021) Improving cyber-threat detection by moving the boundary around the normal samples[J]. Machine intelligence and big data analytics for cybersecurity applications 105\u2013127","DOI":"10.1007\/978-3-030-57024-8_5"},{"key":"678_CR32","doi-asserted-by":"crossref","unstructured":"Andresini G et al (2019) Exploiting the auto-encoder residual error for intrusion detection. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS & PW). IEEE, pp 281\u2013290","DOI":"10.1109\/EuroSPW.2019.00038"},{"key":"678_CR33","doi-asserted-by":"publisher","first-page":"53346","DOI":"10.1109\/ACCESS.2020.2980937","volume":"8","author":"G Andresini","year":"2020","unstructured":"Andresini G et al (2020) Multi-channel deep feature learning for intrusion detection. IEEE Access 8:53346\u201353359","journal-title":"IEEE Access"},{"key":"678_CR34","doi-asserted-by":"crossref","unstructured":"Vigneswaran RK, Vinayakumar R, Soman KP et al (2018) Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security[C]\/\/2018 9th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"678_CR35","first-page":"240217","volume":"2014","author":"W Li","year":"2014","unstructured":"Li W et al (2014) A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J Electr Comp Engine 2014:2014:240217","journal-title":"J Electr Comp Engine"},{"issue":"1","key":"678_CR36","first-page":"5","volume":"173","author":"H Shapoorifard","year":"2017","unstructured":"Shapoorifard H, Shamsinejad P (2017) attack detection using a novel hybrid method incorporating an improved KNN[J]. Int J Comput Appl 173(1):5\u20139","journal-title":"Int J Comput Appl"},{"key":"678_CR37","doi-asserted-by":"crossref","unstructured":"Boukhamla A, Gaviro JC (2021) CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed[J]. International Journal of Information and Computer Security 16(1-2):20\u201332","DOI":"10.1504\/IJICS.2021.117392"},{"key":"678_CR38","unstructured":"License:http:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html [Acessed:14-SEP-2018]"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00678-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00678-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00678-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T10:09:17Z","timestamp":1722593357000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00678-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,2]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["678"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00678-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4126223\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,2]]},"assertion":[{"value":"19 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"125"}}