{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:52:33Z","timestamp":1772254353448,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T00:00:00Z","timestamp":1764806400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T00:00:00Z","timestamp":1767744000000},"content-version":"vor","delay-in-days":34,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00818-w","type":"journal-article","created":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:53:30Z","timestamp":1764838410000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FSEGM: feature selection and ensemble generative model for adaptive cloud security"],"prefix":"10.1186","volume":"15","author":[{"given":"Chinmayee","family":"Rout","sequence":"first","affiliation":[]},{"given":"Srinivas","family":"Sethi","sequence":"additional","affiliation":[]},{"given":"J. Chandrakanta","family":"Badajena","sequence":"additional","affiliation":[]},{"given":"Ramesh Kumar","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"issue":"1","key":"818_CR1","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1186\/s13677-024-00712-x","volume":"13","author":"U Ahmed","year":"2024","unstructured":"Ahmed U, Jiangbin Z, Almogren A, Khan S, Sadiq MT, Altameem A, Rehman AU (2024) Explainable AI-based innovative hybrid ensemble model for intrusion detection. J Cloud Comput 13(1):150","journal-title":"J Cloud Comput"},{"key":"818_CR2","unstructured":"Attak H, Combalia M, Gardikis G, Gast\u00f3n B, Jacquin L, Litke A, Pastor A (2018) Application of distributed computing and machine learning technologies to cybersecurity. In Computer & Electronics Security Applications Rendez-vous (C&ESAR), Rennes, 2018"},{"issue":"1","key":"818_CR3","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/s22010140","volume":"22","author":"A Fatani","year":"2021","unstructured":"Fatani A, Dahou A, Al-Qaness MA, Lu S, Elaziz MA (2021) Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system. Sensors 22(1):140","journal-title":"Sensors"},{"issue":"3","key":"818_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi14030089","volume":"14","author":"V Chang","year":"2022","unstructured":"Chang V, Golightly L, Modesti P, Xu QA, Doan LMT, Hall K, Kobusi\u0144ska A (2022) A survey on intrusion detection systems for fog and cloud computing. Future Internet 14(3):89","journal-title":"Future Internet"},{"key":"818_CR5","doi-asserted-by":"crossref","unstructured":"Pai HT, Kang YH, Chung WC (2024) An interpretable generalization mechanism for accurately detecting anomaly and identifying networking intrusion techniques. arXiv preprint arXiv:2403.07959","DOI":"10.1109\/TIFS.2024.3488967"},{"issue":"1","key":"818_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1186\/s13677-024-00707-8","volume":"13","author":"Y Kim","year":"2024","unstructured":"Kim Y, Park G, Kim HK (2024) Domain knowledge free cloud-IDS with lightweight embedding method. J Cloud Comput 13(1):143","journal-title":"J Cloud Comput"},{"issue":"3","key":"818_CR7","doi-asserted-by":"publisher","first-page":"556","DOI":"10.3390\/electronics12030556","volume":"12","author":"C Kavitha","year":"2023","unstructured":"Kavitha C, Gadekallu TR, K N, Kavin BP, Lai WC (2023) Filter-based ensemble feature selection and deep learning model for intrusion detection in cloud computing. Electronics 12(3):556","journal-title":"Electronics"},{"key":"818_CR8","doi-asserted-by":"crossref","unstructured":"Samriya JK, Kumar N (2020 October) A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing. In Materials Today: Proceedings (Vol. 2, No. 1, Elsevier, pp. 23\u201354","DOI":"10.1016\/j.matpr.2020.09.614"},{"issue":"1","key":"818_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1186\/s13677-023-00491-x","volume":"12","author":"AR Al-Ghuwairi","year":"2023","unstructured":"Al-Ghuwairi AR, Sharrab Y, Al-Fraihat D, AlElaimat M, Alsarhan A, Algarni A (2023) Intrusion detection in cloud computing based on time series anomalies utilizing machine learning. J Cloud Comput 12(1):127","journal-title":"J Cloud Comput"},{"key":"818_CR10","doi-asserted-by":"publisher","first-page":"107132","DOI":"10.1016\/j.knosys.2021.107132","volume":"226","author":"PR Kanna","year":"2021","unstructured":"Kanna PR, Santhi P (2021) Unified deep learning approach for efficient intrusion detection system using integrated spatial\u2013temporal features. Knowl-Based Syst 226:107132","journal-title":"Knowl-Based Syst"},{"key":"818_CR11","doi-asserted-by":"publisher","first-page":"e1553","DOI":"10.7717\/peerj-cs.1553","volume":"9","author":"S Emanet","year":"2023","unstructured":"Emanet S, Baydogmus GK, Demir O (2023) An ensemble learning based IDS using voting rule: VEL-IDS. peerj Comput Sci 9:e1553","journal-title":"peerj Comput Sci"},{"key":"818_CR12","doi-asserted-by":"publisher","first-page":"101984","DOI":"10.1016\/j.cose.2020.101984","volume":"97","author":"D Jin","year":"2020","unstructured":"Jin D, Lu Y, Qin J, Cheng Z, Mao Z (2020) SwiftIDS: real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput Secur 97:101984","journal-title":"Comput Secur"},{"key":"818_CR13","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Networks 174:107247","journal-title":"Comput Networks"},{"key":"818_CR14","doi-asserted-by":"publisher","first-page":"105980","DOI":"10.1016\/j.asoc.2019.105980","volume":"87","author":"M Prasad","year":"2020","unstructured":"Prasad M, Tripathi S, Dahal K (2020) An efficient feature selection based Bayesian and rough set approach for intrusion detection. Appl Soft Comput 87:105980","journal-title":"Appl Soft Comput"},{"issue":"11","key":"818_CR15","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.3390\/electronics12112427","volume":"12","author":"M Bakro","year":"2023","unstructured":"Bakro M, Kumar RR, Alabrah AA, Ashraf Z, Bisoy SK, Parveen N, Abdelsalam A (2023) Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier. Electronics 12(11):2427","journal-title":"Electronics"},{"issue":"3","key":"818_CR16","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1007\/s10586-023-04168-7","volume":"27","author":"F Jemili","year":"2024","unstructured":"Jemili F, Meddeb R, Korbaa O (2024) Intrusion detection based on ensemble learning for big data classification. Cluster Comput 27(3):3771\u20133798","journal-title":"Cluster Comput"},{"issue":"10","key":"818_CR17","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.3390\/sym13101764","volume":"13","author":"E Jaw","year":"2021","unstructured":"Jaw E, Wang X (2021) Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach. Symmetry 13(10):1764","journal-title":"Symmetry"},{"key":"818_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.procs.2018.01.095","volume":"127","author":"M Idhammad","year":"2018","unstructured":"Idhammad M, Afdel K, Belouch M (2018) Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Comput Sci 127:35\u201341","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"818_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s10586-024-05060-8","volume":"28","author":"U Ahmed","year":"2025","unstructured":"Ahmed U, Jiangbin Z, Khan S, Sadiq MT (2025) HCIVAD: explainable hybrid voting classifier for network intrusion detection systems. Cluster Comput 28(5):343","journal-title":"Cluster Comput"},{"key":"818_CR20","doi-asserted-by":"publisher","first-page":"104091","DOI":"10.1016\/j.jnca.2024.104091","volume":"235","author":"U Ahmed","year":"2025","unstructured":"Ahmed U, Jiangbin Z, Khan S, Sadiq MT (2025) Consensus hybrid ensemble machine learning for intrusion detection with explainable AI. J Network Comput Appl 235:104091","journal-title":"J Network Comput Appl"},{"issue":"1","key":"818_CR21","doi-asserted-by":"publisher","first-page":"30532","DOI":"10.1038\/s41598-024-81151-1","volume":"14","author":"U Ahmed","year":"2024","unstructured":"Ahmed U, Jiangbin Z, Almogren A, Sadiq M, Rehman AU, Sadiq MT, Choi J (2024) Hybrid bagging and boosting with shap based feature selection for enhanced predictive modeling in intrusion detection systems. Sci Rep 14(1):30532","journal-title":"Sci Rep"},{"key":"818_CR22","unstructured":"Saheed YK, Chukwuere JE (2025) CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network. IEEE Access"},{"key":"818_CR23","doi-asserted-by":"publisher","first-page":"115939","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Misra S (2025) CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in Cyber-physical Systems-enabled IoT networks. Chaos, Solitons Fractals 191:115939","journal-title":"Chaos, Solitons Fractals"},{"key":"818_CR24","first-page":"200519","volume":"26","author":"OH Abdulganiyu","year":"2025","unstructured":"Abdulganiyu OH, Ait Tchakoucht T, Alaoui AEH, Saheed YK (2025) Attention-driven multi-model architecture for unbalanced network traffic intrusion detection via extreme gradient boosting. Intell Syst Appl 26:200519","journal-title":"Intell Syst Appl"},{"issue":"5","key":"818_CR25","doi-asserted-by":"publisher","first-page":"101532","DOI":"10.1016\/j.jksuci.2023.03.010","volume":"35","author":"YK Saheed","year":"2023","unstructured":"Saheed YK, Abdulganiyu OH, Ait Tchakoucht T (2023) A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures. J King Saud Univ-Comput Inf Sci 35(5):101532","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"818_CR26","first-page":"100612","volume":"25","author":"K Samunnisa","year":"2023","unstructured":"Samunnisa K, Kumar GSV, Madhavi K (2023) Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods. Meas: Sensors 25:100612","journal-title":"Meas: Sensors"},{"key":"818_CR27","doi-asserted-by":"publisher","first-page":"64228","DOI":"10.1109\/ACCESS.2023.3289405","volume":"11","author":"M Bakro","year":"2023","unstructured":"Bakro M, Kumar RR, Alabrah A, Ashraf Z, Ahmed MN, Shameem M, Abdelsalam A (2023) An improved design for a cloud intrusion detection system using hybrid features selection approach with ml classifier. IEEE Access 11:64228\u201364247","journal-title":"IEEE Access"},{"issue":"17","key":"818_CR28","doi-asserted-by":"publisher","first-page":"9588","DOI":"10.3390\/app13179588","volume":"13","author":"H Attou","year":"2023","unstructured":"Attou H, Mohy-Eddine M, Guezzaz A, Benkirane S, Azrour M, Alabdultif A, Almusallam N (2023) Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Appl Sci 13(17):9588","journal-title":"Appl Sci"},{"issue":"6","key":"818_CR29","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.3390\/electronics12061423","volume":"12","author":"B Rm","year":"2023","unstructured":"Rm B, Mk JK (2023) Intrusion detection on AWS cloud through hybrid deep learning algorithm. Electronics 12(6):1423","journal-title":"Electronics"},{"key":"818_CR30","doi-asserted-by":"crossref","unstructured":"Aswal K, Dobhal DC, Pathak H (2020 February) Comparative analysis of machine learning algorithms for identification of bot attack on the internet of vehicles (IoV). In 2020 International Conference on Inventive Computation Technologies (ICICT), IEEE, pp. 312\u2013317","DOI":"10.1109\/ICICT48043.2020.9112422"},{"key":"818_CR31","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R (2022) CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10:99837\u201399849","journal-title":"IEEE Access"},{"key":"818_CR32","doi-asserted-by":"crossref","unstructured":"Abdulhammed R, Faezipour M, Musafer H, Abuzneid A (2019 June) Efficient network intrusion detection using PCA-based dimensionality reduction of features. In 2019 International symposium on networks, computers and communications (ISNCC), IEEE, pp. 1\u20136","DOI":"10.1109\/ISNCC.2019.8909140"},{"key":"818_CR33","doi-asserted-by":"crossref","unstructured":"Yang L, Moubayed A, Hamieh I, Shami A (2019 December) Tree-based intelligent intrusion detection system in internet of vehicles. In 2019 IEEE global communications conference (GLOBECOM), IEEE, pp. 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"issue":"1","key":"818_CR34","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Moubayed A, Shami A (2021) MTH-IDS: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J 9(1):616\u2013632","journal-title":"IEEE Internet Things J"},{"key":"818_CR35","doi-asserted-by":"crossref","unstructured":"Yang L, Shami A, Stevens G, De Rusett S (2022 December) LCCDE: a decision-based ensemble framework for intrusion detection in the internet of vehicles. In GLOBECOM 2022\u20132022 IEEE Global Communications Conference, IEEE, pp. 3545\u20133550","DOI":"10.1109\/GLOBECOM48099.2022.10001280"},{"key":"818_CR36","doi-asserted-by":"publisher","first-page":"103330","DOI":"10.1016\/j.adhoc.2023.103330","volume":"153","author":"MS Korium","year":"2024","unstructured":"Korium MS, Saber M, Beattie A, Narayanan A, Sahoo S, Nardelli PH (2024) Intrusion detection system for cyberattacks in the internet of vehicles environment. Ad Hoc Networks 153:103330","journal-title":"Ad Hoc Networks"},{"key":"818_CR37","doi-asserted-by":"crossref","unstructured":"Bansal A, Kaur S (2018) Extreme gradient boosting based tuning for classification in intrusion detection systems. In Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2, Springer Singapore (pp. 372\u2013380)","DOI":"10.1007\/978-981-13-1810-8_37"},{"issue":"4","key":"818_CR38","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3233\/JHS-190620","volume":"25","author":"M Catillo","year":"2019","unstructured":"Catillo M, Rak M, Villano U (2019) Discovery of DoS attacks by the ZED-IDS anomaly detector. J High Speed Networks 25(4):349\u2013365","journal-title":"J High Speed Networks"},{"key":"818_CR39","doi-asserted-by":"crossref","unstructured":"Shi Z, Li J, Wu C, Li J (2019 August) DeepWindow: an efficient method for online network traffic anomaly detection. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), IEEE, pp. 2403\u20132408","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00335"},{"issue":"1","key":"818_CR40","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10586-022-03621-3","volume":"26","author":"A Javadpour","year":"2023","unstructured":"Javadpour A, Pinto P, Ja\u2019fari F, Zhang W (2023) DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput 26(1):367\u2013384","journal-title":"Cluster Comput"},{"issue":"4","key":"818_CR41","doi-asserted-by":"publisher","first-page":"219","DOI":"10.20532\/cit.2023.1005771","volume":"31","author":"L Yin","year":"2023","unstructured":"Yin L, Chen Y (2023) An intrusion detection Model based on random tree algorithm with dimensionality reduction and oversampling. J Comput Inf Technol 31(4):219\u2013231","journal-title":"J Comput Inf Technol"},{"issue":"2","key":"818_CR42","doi-asserted-by":"publisher","first-page":"77","DOI":"10.4018\/IJDCF.2021030105","volume":"13","author":"P Ghosh","year":"2021","unstructured":"Ghosh P, Sarkar D, Sharma J, Phadikar S (2021) An intrusion detection system using modified-firefly algorithm in cloud environment. Int J Digit Crime Forensics (IJDCF) 13(2):77\u201393","journal-title":"Int J Digit Crime Forensics (IJDCF)"},{"issue":"2","key":"818_CR43","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/IOTM.003.2200001","volume":"5","author":"V Ravi","year":"2022","unstructured":"Ravi V, Chaganti R, Alazab M (2022) Deep learning feature fusion approach for an intrusion detection system in SDN-based IoT networks. IEEE Internet Things Mag 5(2):24\u201329","journal-title":"IEEE Internet Things Mag"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00818-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00818-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00818-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T13:22:56Z","timestamp":1767792176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-025-00818-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,4]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["818"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00818-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,4]]},"assertion":[{"value":"26 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"AI tools have been used to improve language related modification in the preparation of this manuscript.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"6"}}