{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T23:06:28Z","timestamp":1764371188358,"version":"3.46.0"},"reference-count":145,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the European University of Atlantic"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01323-2","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T11:05:50Z","timestamp":1764327950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A systematic literature study of machine learning techniques based intrusion detection: datasets, models, challenges, and future directions"],"prefix":"10.1186","volume":"12","author":[{"given":"Hafiz Muhammad Raza Ur","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Saira","family":"Liaquat","sequence":"additional","affiliation":[]},{"given":"Muhammad Junaid","family":"Gul","sequence":"additional","affiliation":[]},{"given":"Muhammad Zeeshan","family":"Jhandir","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Gavilanes","sequence":"additional","affiliation":[]},{"given":"Manuel Masias","family":"Vergara","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"1323_CR1","unstructured":"Sanou B. Facts and 2017 figures. Available online: https:\/\/www.url.com (Accessed: Date) 2017."},{"key":"1323_CR2","unstructured":"Union IT, Sector D. Facts and Figures: focus on Least Developed Countries. Available online: https:\/\/www.url.com (Accessed: Date), 2023."},{"key":"1323_CR3","doi-asserted-by":"publisher","unstructured":"Vartouni AM, Kashi SS, Teshnehlab M. An anomaly detection method to detect web attacks using stacked auto-encoder. In: 2018 6th Iran. Jt. Congr. Fuzzy Intell. Syst. CFIS 2018, vol. 2018-January, 2018. p. 131\u2013134. https:\/\/doi.org\/10.1109\/CFIS.2018.8336654.","DOI":"10.1109\/CFIS.2018.8336654"},{"issue":"2","key":"1323_CR4","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1109\/COMST.2018.2885561","volume":"21","author":"N Sun","year":"2019","unstructured":"Sun N, Zhang J, Rimba P, Gao S, Zhang LY. Data-driven cybersecurity incident prediction: a survey. IEEE Commun Surv Tutor. 2019;21(2):1744\u201372. https:\/\/doi.org\/10.1109\/COMST.2018.2885561.","journal-title":"IEEE Commun Surv Tutor"},{"key":"1323_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9","volume-title":"The Inadequacy of Entropy-Based Ransomware Detection","author":"T McIntosh","year":"2019","unstructured":"McIntosh T, Jang-jaccard J, Watters P, Susnjak T. The Inadequacy of Entropy-Based Ransomware Detection, vol. 1. Springer; 2019. https:\/\/doi.org\/10.1007\/978-3-030-36802-9."},{"key":"1323_CR6","doi-asserted-by":"crossref","unstructured":"Cost of a Data Breach Report 2019.","DOI":"10.1016\/S1361-3723(19)30081-8"},{"key":"1323_CR7","unstructured":"Security I. Cost of a Data Breach Report. Accessed 23 April 2024 2023. https:\/\/www.ibm.com\/downloads\/cas\/E3G5JMBP"},{"key":"1323_CR8","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00318-5","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data. 2020. https:\/\/doi.org\/10.1186\/s40537-020-00318-5.","journal-title":"J Big Data"},{"key":"1323_CR9","doi-asserted-by":"publisher","unstructured":"Ambalavanan V. Cyber threats detection and mitigation using machine learning. https:\/\/doi.org\/10.4018\/978-1-5225-9611-0.ch007.","DOI":"10.4018\/978-1-5225-9611-0.ch007"},{"key":"1323_CR10","unstructured":"al, PO. The comprehensive national cybersecurity initiative, 2009. p. 1\u20135."},{"issue":"1","key":"1323_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3766898","volume":"1","author":"Z Xu","year":"2025","unstructured":"Xu Z, Wu Y, Wang S, Gao J, Qiu T, Wang Z. Deep Learning-based Intrusion Detection Systems: a Survey. J ACM. 2025;1(1):1\u201335 arXiv:2504.07839v2.","journal-title":"J ACM"},{"key":"1323_CR12","doi-asserted-by":"crossref","unstructured":"Retracted: intrusion detection for industrial control systems 2023;2021:9807486.","DOI":"10.1155\/2023\/9807486"},{"key":"1323_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100082","volume":"3","author":"MM Rahman","year":"2025","unstructured":"Rahman MM, Al Shakil S, Mustakim MR. A survey on intrusion detection system in IoT networks. Cyber Security and Applications. 2025;3:100082.","journal-title":"Cyber Security and Applications"},{"key":"1323_CR14","doi-asserted-by":"publisher","unstructured":"Pandeeswari GJ. Analysis of intrusion detection using machine learning techniques. In: 2022 Second International Conference on Advanced Technologies in Intelligent Control and Environment Computation Communication Engineering, 2022. p. 1\u20135. https:\/\/doi.org\/10.1109\/ICATIECE56365.2022.10047057.","DOI":"10.1109\/ICATIECE56365.2022.10047057"},{"key":"1323_CR15","doi-asserted-by":"crossref","unstructured":"Ibitoye O, Shafiq O, Matrawy A. Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks 2019. arXiv:1905.05137.","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"1323_CR16","doi-asserted-by":"publisher","unstructured":"Chacko AA, Edwin B. Intrusion detection using machine learning techniques: An exhaustive review. In: 2023 9th International Conference on Advanced Computing, Communication Systems, vol. 1. 2023. p. 1586\u20131589. https:\/\/doi.org\/10.1109\/ICACCS57279.2023.10112831.","DOI":"10.1109\/ICACCS57279.2023.10112831"},{"issue":"6","key":"1323_CR17","first-page":"56","volume":"7","author":"A Singh","year":"2022","unstructured":"Singh A. Survey on machine learning applications in cyber security problems. Int J Comput Appl. 2022;7(6):56\u201361.","journal-title":"Int J Comput Appl"},{"key":"1323_CR18","doi-asserted-by":"publisher","unstructured":"Gul MJ, Rabia R, Jararweh Y, Rathore MM, Paul A. Security flaws of operating system against live device attacks: A case study on live linux distribution device. In: 2019 Sixth International Conference on Software Defined Systems (SDS), 2019. p. 154\u2013159. https:\/\/doi.org\/10.1109\/SDS.2019.8768590.","DOI":"10.1109\/SDS.2019.8768590"},{"key":"1323_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101531","author":"S Jamshidi","year":"2025","unstructured":"Jamshidi S, Nikanjam A, Nafi KW, Khomh F, Rasta R. Application of deep reinforcement learning for intrusion detection in internet of things: a systematic review. Internet of Things. 2025. https:\/\/doi.org\/10.1016\/j.iot.2025.101531.","journal-title":"Internet of Things"},{"key":"1323_CR20","unstructured":"Jiang H, Nagra J, Ahammad P. Sok: applying machine learning in security\u2014a survey. 2012."},{"issue":"4","key":"1323_CR21","first-page":"265","volume":"6","author":"LS Wijesinghe","year":"2016","unstructured":"Wijesinghe LS, Silva LNBD, Abhayaratne GTA, Krithika P, Priyashan SMDR. Combating cyber crime using artificial agent systems. Int J Sci Res Publ. 2016;6(4):265\u201374.","journal-title":"Int J Sci Res Publ"},{"key":"1323_CR22","doi-asserted-by":"publisher","unstructured":"Das R, Morris TH, Ph D. Machine learning and cyber security. In: 2017 International Conference on Computer, Electrical and Communication Engineering, 2017. p. 1\u20137. https:\/\/doi.org\/10.1109\/ICCECE.2017.8526232.","DOI":"10.1109\/ICCECE.2017.8526232"},{"key":"1323_CR23","unstructured":"Hodo E, Bellekens X, Hamilton A, Tachtatzis C. Shallow and deep networks intrusion detection system: a taxonomy and survey, 1\u201343."},{"key":"1323_CR24","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, et al. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018;6:35365\u201381. https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950.","journal-title":"IEEE Access"},{"issue":"12","key":"1323_CR25","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J Li","year":"2018","unstructured":"Li J. Cyber-security meets artificial intelligence A survey. Frontiers Inf Tech Electro Eng. 2018;19(12):1462\u201374.","journal-title":"Frontiers Inf Tech Electro Eng"},{"key":"1323_CR26","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.cose.2018.11.001","volume":"81","author":"D Ucci","year":"2019","unstructured":"Ucci D, Aniello L, Baldoni R. Survey of machine learning techniques for malware analysis. Comput Secur. 2019;81:123\u201347. https:\/\/doi.org\/10.1016\/j.cose.2018.11.001.","journal-title":"Comput Secur"},{"key":"1323_CR27","doi-asserted-by":"publisher","unstructured":"Apruzzese G. On the effectiveness of machine and deep learning for cyber security. In: 2018 10th International Conference on Cyber Conflict, 2018. p. 371\u2013390. https:\/\/doi.org\/10.23919\/CYCON.2018.8405026.","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"1323_CR28","unstructured":"Veiga AP. No Title. March, 2018."},{"key":"1323_CR29","doi-asserted-by":"crossref","unstructured":"Guan Z. When machine learning meets security issues: A survey. In: 2018 IEEE International Conference on Intelligent Safety Robotics, 2018. p. 158\u2013165.","DOI":"10.1109\/IISR.2018.8535799"},{"key":"1323_CR30","unstructured":"Shalaginov A, Banin S, Dehghantanha A, Franke K, Aug CR. Machine learning aided static malware analysis: a survey and tutorial. Cyber Threat Intell. (1):1\u201337."},{"key":"1323_CR31","doi-asserted-by":"crossref","unstructured":"Sagar BS. Providing cyber security using artificial intelligence: a survey. In: 2019 3rd International Conference on Computer Methodologies and Communications. 2019. p. 717\u2013720.","DOI":"10.1109\/ICCMC.2019.8819719"},{"issue":"s1","key":"1323_CR32","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon D, Kim H, Kim I, Kim KJ, Kim J, Suh SC. A survey of deep learning-based network anomaly detection. Clust Comput. 2019;22(s1):949\u201361. https:\/\/doi.org\/10.1007\/s10586-017-1117-8.","journal-title":"Clust Comput"},{"key":"1323_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122","author":"DS Berman","year":"2019","unstructured":"Berman DS, Buczak AL, Chavis JS, Corbett CL. A survey of deep learning methods for cyber security. Information. 2019. https:\/\/doi.org\/10.3390\/info10040122.","journal-title":"Information"},{"issue":"10","key":"1323_CR34","doi-asserted-by":"publisher","first-page":"2823","DOI":"10.1007\/s13042-018-00906-1","volume":"10","author":"J Mart\u00ednez","year":"2019","unstructured":"Mart\u00ednez J, Carla T, Comesa\u00f1a I, Garc\u00eda PJ. Review: machine learning techniques applied to cyber-security. Int J Mach Learn Cybern. 2019;10(10):2823\u201336. https:\/\/doi.org\/10.1007\/s13042-018-00906-1.","journal-title":"Int J Mach Learn Cybern"},{"issue":"2","key":"1323_CR35","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/JSYST.2020.2992966","volume":"15","author":"T Y\u0131ld\u0131r\u0131m","year":"2021","unstructured":"Y\u0131ld\u0131r\u0131m T, Genovese A, Scotti F. A comprehensive survey of databases and deep learning methods for cybersecurity. IEEE Syst J. 2021;15(2):1717\u201331.","journal-title":"IEEE Syst J"},{"issue":"4","key":"1323_CR36","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TNSM.2020.3016246","volume":"17","author":"B Molina-coronado","year":"2020","unstructured":"Molina-coronado B, Mori U, Mendiburu A, Miguel-alonso J. Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process. IEEE Trans Netw Serv Manage. 2020;17(4):2451\u201379. https:\/\/doi.org\/10.1109\/TNSM.2020.3016246.","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"11","key":"1323_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570954","volume":"55","author":"S Rajapaksha","year":"2023","unstructured":"Rajapaksha S, Kalutarage H, Madzudzo G, Cheah M. Ai-based intrusion detection systems for in-vehicle networks: a survey. ACM Comput Surv. 2023;55(11):1\u201340. https:\/\/doi.org\/10.1145\/3570954.","journal-title":"ACM Comput Surv"},{"issue":"1","key":"1323_CR38","first-page":"702","volume":"72","author":"S Venkatesan","year":"2023","unstructured":"Venkatesan S. Design an intrusion detection system based on feature selection using ml algorithms. Math Stat Eng Appl. 2023;72(1):702\u201310.","journal-title":"Math Stat Eng Appl"},{"issue":"PA","key":"1323_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107231","volume":"127","author":"M Saied","year":"2024","unstructured":"Saied M, Guirguis S, Madbouly M. Review of artificial intelligence for enhancing intrusion detection in the internet of things. Eng Appl Artif Intell. 2024;127(PA):107231. https:\/\/doi.org\/10.1016\/j.engappai.2023.107231.","journal-title":"Eng Appl Artif Intell"},{"issue":"November 2023","key":"1323_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103587","volume":"137","author":"AV Turukmane","year":"2024","unstructured":"Turukmane AV, Devendiran R. Multisvm: an efficient feature selection assisted network intrusion detection system using machine learning. Comput Secur. 2024;137(November 2023):103587. https:\/\/doi.org\/10.1016\/j.cose.2023.103587.","journal-title":"Comput Secur"},{"issue":"November 2023","key":"1323_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2023.100056","volume":"6","author":"Z Sun","year":"2024","unstructured":"Sun Z, An G, Yang Y, Liu Y. Franklin open optimized machine learning enabled intrusion detection system for internet of medical things. Franklin Open. 2024;6(November 2023):100056. https:\/\/doi.org\/10.1016\/j.fraope.2023.100056.","journal-title":"Franklin Open"},{"issue":"5","key":"1323_CR42","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1541\/ieejias.126.589","volume":"126","author":"C Klumpner","year":"2006","unstructured":"Klumpner C, Wijekoon T, Wheeler P. New methods for the active compensation of unbalanced supply voltages for two-stage direct power converters. IEEJ Trans Ind Appl. 2006;126(5):589\u201398. https:\/\/doi.org\/10.1541\/ieejias.126.589.","journal-title":"IEEJ Trans Ind Appl"},{"issue":"5","key":"1323_CR43","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-jaccard","year":"2014","unstructured":"Jang-jaccard J. A survey of emerging threats in cybersecurity. J Comput Syst Sci. 2014;80(5):973\u201393. https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005.","journal-title":"J Comput Syst Sci"},{"key":"1323_CR44","unstructured":"Alazab M, Venkatraman S, Watters P, Alazab M. Zero-day malware detection based on supervised learning algorithms of api call signatures. 2011."},{"issue":"3","key":"1323_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00535-6","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker IH. Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Comput Sci. 2021;2(3):1\u201316. https:\/\/doi.org\/10.1007\/s42979-021-00535-6.","journal-title":"SN Comput Sci"},{"key":"1323_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103445","volume":"134","author":"M Imran","year":"2023","unstructured":"Imran M, Siddiqui HUR, Raza A, Raza MA, Rustam F, Ashraf I. A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems. Computers & Security. 2023;134:103445.","journal-title":"Computers & Security"},{"issue":"19","key":"1323_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13193823","volume":"13","author":"PH Kyaw","year":"2024","unstructured":"Kyaw PH, Gutierrez J, Ghobakhlou A. A systematic review of deep learning techniques for phishing email detection. Electronics. 2024;13(19):3823.","journal-title":"Electronics"},{"issue":"2","key":"1323_CR48","doi-asserted-by":"publisher","DOI":"10.3390\/sym16020248","volume":"16","author":"S Aslam","year":"2024","unstructured":"Aslam S, Aslam H, Manzoor A, Chen H, Rasool A. Antiphishstack: Lstm-based stacked generalization model for optimized phishing url detection. Symmetry. 2024;16(2):248.","journal-title":"Symmetry"},{"issue":"8","key":"1323_CR49","first-page":"1","volume":"16","author":"Z Alamri","year":"2025","unstructured":"Alamri Z, Alhuzali A, Alsulami B, Alghazzawi D. Enhanced phishing website detection using optimized ensemble stacking models. Int J Adv Comput Sci Appl. 2025;16(8):1.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"2","key":"1323_CR50","doi-asserted-by":"publisher","DOI":"10.3390\/jcp5020026","volume":"5","author":"H Jabbar","year":"2025","unstructured":"Jabbar H, Al-Janabi S. Ai-driven phishing detection: enhancing cybersecurity with reinforcement learning. J Cybersecur Privacy. 2025;5(2):26.","journal-title":"J Cybersecur Privacy"},{"key":"1323_CR51","doi-asserted-by":"crossref","unstructured":"Alauthman M, Aldweesh A, Al-Qerem A, Alkasassbeh M, Alateef S, Almomani A. Synthetic content generation impacts on phishing and impersonation attacks. In: Examining Cybersecurity Risks Produced by Generative AI. IGI Global Scientific Publishing; 2025. p. 189\u2013210.","DOI":"10.4018\/979-8-3373-0832-6.ch009"},{"issue":"1","key":"1323_CR52","first-page":"39","volume":"2","author":"AS George","year":"2024","unstructured":"George AS. Riding the AI waves: an analysis of artificial intelligence\u2019s evolving role in combating cyber threats. Part Univ Int Innov J. 2024;2(1):39\u201350.","journal-title":"Part Univ Int Innov J"},{"issue":"3","key":"1323_CR53","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2011","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur. 2011;31(3):357\u201374. https:\/\/doi.org\/10.1016\/j.cose.2011.12.012.","journal-title":"Comput Secur"},{"issue":"2","key":"1323_CR54","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor. 2016;18(2):1153\u201376. https:\/\/doi.org\/10.1109\/COMST.2015.2494502.","journal-title":"IEEE Commun Surv Tutor"},{"key":"1323_CR55","doi-asserted-by":"publisher","unstructured":"Durole PH, Agarwal M. A comprehensive review of advanced artificial intelligence techniques to enhance intrusion detection systems. In: 2024 IEEE Int. Students\u2019 Conf. Electr. Electron. Comput. Sci., 2020. p. 1\u20137. https:\/\/doi.org\/10.1109\/SCEECS61402.2024.10482305.","DOI":"10.1109\/SCEECS61402.2024.10482305"},{"key":"1323_CR56","unstructured":"Citation ES. A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015. 2016;0\u201321."},{"key":"1323_CR57","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal S, Agrawal J. Survey on anomaly detection using data mining techniques. Procedia Comput Sci. 2015;60:708\u201313. https:\/\/doi.org\/10.1016\/j.procs.2015.08.220.","journal-title":"Procedia Comput Sci"},{"key":"1323_CR58","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A. A survey of network-based intrusion detection data sets. Comput Secur. 2019;86:147\u201367.","journal-title":"Comput Secur"},{"key":"1323_CR59","doi-asserted-by":"crossref","unstructured":"Hnamte V, Hussain J. An extensive survey on intrusion detection systems: Datasets and challenges for modern scenario. In: 2021 3rd International Conference on Electrical, Control and Instrumentation Engineering (ICECIE), 2021. p. 1\u201310. IEEE.","DOI":"10.1109\/ICECIE52348.2021.9664737"},{"key":"1323_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104964","volume":"105","author":"D Srivastava","year":"2024","unstructured":"Srivastava D, Singh R, Chakraborty C, Maakar SK, Makkar A, Sinwar D. A framework for detection of cyber attacks by the classification of intrusion detection datasets. Microprocess Microsyst. 2024;105:104964.","journal-title":"Microprocess Microsyst"},{"key":"1323_CR61","doi-asserted-by":"publisher","first-page":"121173","DOI":"10.1109\/ACCESS.2022.3220622","volume":"10","author":"P Jayalaxmi","year":"2022","unstructured":"Jayalaxmi P, Saha R, Kumar G, Conti M, Kim T-H. Machine and deep learning solutions for intrusion detection and prevention in iots: a survey. IEEE Access. 2022;10:121173\u201392.","journal-title":"IEEE Access"},{"key":"1323_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2022.100641","volume":"25","author":"B Madhu","year":"2023","unstructured":"Madhu B, Chari MVG, Vankdothu R, Silivery AK, Aerranagula V. Intrusion detection models for iot networks via deep learning approaches. Meas Sensors. 2023;25:100641.","journal-title":"Meas Sensors"},{"key":"1323_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100516","volume":"38","author":"MA Umer","year":"2022","unstructured":"Umer MA, Junejo KN, Jilani MT, Mathur AP. Machine learning for intrusion detection in industrial control systems: applications, challenges, and recommendations. Int J Crit Infrastruct Protect. 2022;38:100516.","journal-title":"Int J Crit Infrastruct Protect"},{"key":"1323_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462","volume":"16","author":"AS Dina","year":"2021","unstructured":"Dina AS, Manivannan D. Intrusion detection based on machine learning techniques in computer networks. Internet of Things. 2021;16:100462.","journal-title":"Internet of Things"},{"key":"1323_CR65","doi-asserted-by":"publisher","first-page":"80348","DOI":"10.1109\/ACCESS.2023.3296444","volume":"11","author":"Z Azam","year":"2023","unstructured":"Azam Z, Islam MM, Huda MN. Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree. IEEE Access. 2023;11:80348\u201391.","journal-title":"IEEE Access"},{"issue":"1","key":"1323_CR66","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2023.2227780","volume":"35","author":"S Shi","year":"2023","unstructured":"Shi S, Han D, Cui M. A multimodal hybrid parallel network intrusion detection model. Connect Sci. 2023;35(1):2227780.","journal-title":"Connect Sci"},{"key":"1323_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100077","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J. Dependable intrusion detection system using deep convolutional neural network: a novel framework and performance evaluation approach. Telemat Inform Rep. 2023;11:100077.","journal-title":"Telemat Inform Rep"},{"issue":"1","key":"1323_CR68","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s11276-023-03495-2","volume":"30","author":"OH Abdulganiyu","year":"2024","unstructured":"Abdulganiyu OH, Tchakoucht TA, Saheed YK. Retracted article: towards an efficient model for network intrusion detection system (IDS): systematic literature review. Wirel Netw. 2024;30(1):453\u201382.","journal-title":"Wirel Netw"},{"key":"1323_CR69","doi-asserted-by":"publisher","first-page":"27237","DOI":"10.1109\/ACCESS.2024.3367004","volume":"12","author":"H Satilmi\u015f","year":"2024","unstructured":"Satilmi\u015f H, Akleylek S, Tok ZY. A systematic literature review on host-based intrusion detection systems. Ieee Access. 2024;12:27237\u201366.","journal-title":"Ieee Access"},{"key":"1323_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10059-2","author":"DKK Reddy","year":"2024","unstructured":"Reddy DKK, Nayak J, Behera H, Shanmuganathan V, Viriyasitavat W, Dhiman G. A systematic literature review on swarm intelligence based intrusion detection system: past, present and future. Arch Comput Methods Eng. 2024. https:\/\/doi.org\/10.1007\/s11831-023-10059-2.","journal-title":"Arch Comput Methods Eng"},{"key":"1323_CR71","doi-asserted-by":"publisher","unstructured":"Fraley JB. The promise of machine learning in cybersecurity. In: SoutheastCon 2017. pp. 1\u20136. https:\/\/doi.org\/10.1109\/SECON.2017.7925283.","DOI":"10.1109\/SECON.2017.7925283"},{"key":"1323_CR72","doi-asserted-by":"publisher","unstructured":"Dong B, Wang X. Comparison deep learning method to traditional methods using for network intrusion detection. In: 2016 8th IEEE Int. Conf. Commun. Softw. Networks, 2016. p. 581\u2013585. https:\/\/doi.org\/10.1109\/ICCSN.2016.7586590.","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"1323_CR73","doi-asserted-by":"crossref","unstructured":"Husain A, Salem A, Jim C, Dimitoglou G, College H. Development of an efficient network intrusion detection model using extreme gradient boosting (xgboost) on the unsw-nb15 dataset 2019.","DOI":"10.1109\/ISSPIT47144.2019.9001867"},{"key":"1323_CR74","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2018","unstructured":"Wang W, Sheng Y, Wang J, Zeng X, Ye X, Huang Y, et al. Hast-ids: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access. 2018;6:1792\u2013806. https:\/\/doi.org\/10.1109\/ACCESS.2017.2780250.","journal-title":"IEEE Access"},{"key":"1323_CR75","doi-asserted-by":"crossref","unstructured":"Taher KA. Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 Int. Conf. Robot. Signal Process. Tech., 2019. p. 643\u2013646.","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"1323_CR76","doi-asserted-by":"publisher","unstructured":"Hadri A. Intrusion detection system using pca and fuzzy pca techniques. In: 2016 Int. Conf. Adv. Commun. Syst. Inf. Secur., 2016. p. 1\u20137. https:\/\/doi.org\/10.1109\/ACOSIS.2016.7843930.","DOI":"10.1109\/ACOSIS.2016.7843930"},{"key":"1323_CR77","doi-asserted-by":"publisher","first-page":"58392","DOI":"10.1109\/ACCESS.2020.2982418","volume":"8","author":"H Jiang","year":"2020","unstructured":"Jiang H, He Z, Ye G, Zhang H. Network intrusion detection based on pso-xgboost model. IEEE Access. 2020;8:58392\u2013401. https:\/\/doi.org\/10.1109\/ACCESS.2020.2982418.","journal-title":"IEEE Access"},{"key":"1323_CR78","doi-asserted-by":"publisher","unstructured":"Bhamare D. Feasibility of supervised machine learning for cloud security. In: 2016 Int. Conf. Inf. Sci. Secur., 2016. p. 1\u20135. https:\/\/doi.org\/10.1109\/ICISSEC.2016.7885853.","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"1323_CR79","doi-asserted-by":"publisher","unstructured":"Xie M, Hu J, Slay J. Evaluating host-based anomaly detection systems: Application of the one-class svm algorithm to. In: 2014 11th Int. Conf. Fuzzy Syst. Knowl. Discov., 2014. p. 978\u2013982. https:\/\/doi.org\/10.1109\/FSKD.2014.6980972.","DOI":"10.1109\/FSKD.2014.6980972"},{"key":"1323_CR80","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0074-7","author":"S Chowdhury","year":"2017","unstructured":"Chowdhury S, Khanzadeh M, Akula R, Zhang F, Zhang S, Medal H. Botnet detection using graph-based feature clustering. J Big Data. 2017. https:\/\/doi.org\/10.1186\/s40537-017-0074-7.","journal-title":"J Big Data"},{"key":"1323_CR81","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.future.2020.02.017","volume":"107","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Sun Y, Du X, Guizani M. Selection of effective machine learning algorithm and bot-iot attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst. 2020;107:433\u201342. https:\/\/doi.org\/10.1016\/j.future.2020.02.017.","journal-title":"Futur Gener Comput Syst"},{"key":"1323_CR82","doi-asserted-by":"publisher","unstructured":"Ghosh P. Proposed ga-bfss and logistic regression based intrusion detection system. In: Proceedings of the 2015 Third International Conference on Computer Communication Control and Information Technology, 2015. p. 1\u20136. https:\/\/doi.org\/10.1109\/C3IT.2015.7060117.","DOI":"10.1109\/C3IT.2015.7060117"},{"key":"1323_CR83","doi-asserted-by":"publisher","unstructured":"Atienza D, Herrero, Corchado E. Neural analysis of http traffic for web attack detection. In: Proceedings of the 2015 International Conference on Data Mining and Applications, 2015. p. 201\u2013212, https:\/\/doi.org\/10.1007\/978-3-319-19713-5.","DOI":"10.1007\/978-3-319-19713-5"},{"key":"1323_CR84","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0145-4","author":"SM Othman","year":"2018","unstructured":"Othman SM, Mutaher F, Alwi B, Alsohybe NT, Hashida AYA. Intrusion detection model using machine learning algorithm on big data environment. J Big Data. 2018. https:\/\/doi.org\/10.1186\/s40537-018-0145-4.","journal-title":"J Big Data"},{"issue":"January","key":"1323_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"I Firat","year":"2021","unstructured":"Firat I, Ertam F, Sengur A. Machine learning methods for cyber-security intrusion detection: datasets and comparative study. Comput Netw. 2021;188(January):107840. https:\/\/doi.org\/10.1016\/j.comnet.2021.107840.","journal-title":"Comput Netw"},{"key":"1323_CR86","doi-asserted-by":"publisher","first-page":"80348","DOI":"10.1109\/ACCESS.2023.3296444","volume":"11","author":"Z Azam","year":"2023","unstructured":"Azam Z, Islam M, Huda MN. Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree. IEEE Access. 2023;11:80348\u201391.","journal-title":"IEEE Access"},{"key":"1323_CR87","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.04.03","author":"A Iqbal","year":"2019","unstructured":"Iqbal A, Aftab S. A feed-forward and pattern recognition ann model for network intrusion detection. Int J Comput Netw Inf Secur. 2019. https:\/\/doi.org\/10.5815\/ijcnis.2019.04.03.","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"5","key":"1323_CR88","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s40009-023-01223-0","volume":"46","author":"P Dey","year":"2023","unstructured":"Dey P, Bhakta D. A new random forest and support vector machine-based intrusion detection model in networks. Natl Acad Sci Lett. 2023;46(5):471\u20137. https:\/\/doi.org\/10.1007\/s40009-023-01223-0.","journal-title":"Natl Acad Sci Lett"},{"key":"1323_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100233","volume":"7","author":"M Vishwakarma","year":"2023","unstructured":"Vishwakarma M, Kesswani N. A new two-phase intrusion detection system with na\u00efve bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decis Anal J. 2023;7:100233. https:\/\/doi.org\/10.1016\/j.dajour.2023.100233.","journal-title":"Decis Anal J"},{"key":"1323_CR90","doi-asserted-by":"crossref","unstructured":"Alom Z, Taha TM. Network intrusion detection for cyber security using unsupervised deep learning approaches. 2017. p. 63\u201369.","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"1323_CR91","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18558-5","author":"C Kodanda","year":"2024","unstructured":"Kodanda C, Srinivasa RT, Uma RE, Rao S. Attack classification in network intrusion detection system based on optimization strategy and deep learning methodology. Multimedia Tools Appl. 2024. https:\/\/doi.org\/10.1007\/s11042-024-18558-5.","journal-title":"Multimedia Tools Appl"},{"key":"1323_CR92","doi-asserted-by":"publisher","unstructured":"Control J, Biju A, Franklin SW. Evaluated bird swarm optimization based on deep belief network (ebso-dbn) classification technique for iot network intrusion detection 2024, https:\/\/doi.org\/10.1080\/00051144.2023.2269646.","DOI":"10.1080\/00051144.2023.2269646"},{"issue":"Supp02","key":"1323_CR93","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1142\/S0218488520400140","volume":"28","author":"NS Bhati","year":"2020","unstructured":"Bhati NS, Khari M, Garc\u00eda-D\u00edaz V, Verd\u00fa E. A review on intrusion detection systems and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2020;28(Supp02):65\u201391.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"1323_CR94","first-page":"969","volume":"42","author":"NS Bhati","year":"2022","unstructured":"Bhati NS, Khari M. A new ensemble based approach for intrusion detection system using voting. J Intelligent Fuzzy Syst. 2022;42(2):969\u201379.","journal-title":"J Intelligent Fuzzy Syst"},{"key":"1323_CR95","unstructured":"Ever E, Al-Turjman F. Forthcoming networks and sustainability in the iot era. Lecture Notes of the Institute for Computer Sciences. Soc Inform Telecommun Eng. 353"},{"key":"1323_CR96","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7527-3","volume-title":"Research in Intelligent and Computing in Engineering: Select Proceedings of RICE 2020","author":"R Kumar","year":"2021","unstructured":"Kumar R, Quang NH, Solanki VK, Cardona M, Pattnaik PK. Research in Intelligent and Computing in Engineering: Select Proceedings of RICE 2020. Springer; 2021."},{"key":"1323_CR97","doi-asserted-by":"crossref","unstructured":"Bhati NS, Khari M. An ensemble model for network intrusion detection using adaboost, random forest and logistic regression. In: Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2021. Springer; 2022. p. 777\u2013789.","DOI":"10.1007\/978-981-19-4831-2_64"},{"key":"1323_CR98","doi-asserted-by":"crossref","unstructured":"Bhati BS, Dikshita Bhati NS, Chugh G. A comprehensive study of intrusion detection and prevention systems. Wireless Commun Security, 2022;115\u2013142.","DOI":"10.1002\/9781119777465.ch7"},{"key":"1323_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.seppur.2022.121651","volume":"298","author":"VM Nagulapati","year":"2022","unstructured":"Nagulapati VM, Raza Ur Rehman HM, Haider J, Abdul Qyyum M, Choi GS, Lim H. Hybrid machine learning-based model for solubilities prediction of various gases in deep eutectic solvent for rigorous process design of hydrogen purification. Sep Purif Technol. 2022;298:121651. https:\/\/doi.org\/10.1016\/j.seppur.2022.121651.","journal-title":"Sep Purif Technol"},{"key":"1323_CR100","unstructured":"Chanakya G, Kunal P, Sumedh S, Priyanka W, Pn M. Network intrusion prevention system using machine learning techniques. 2017."},{"key":"1323_CR101","doi-asserted-by":"publisher","unstructured":"Kumar M. Intrusion detection system using decision tree algorithm. In: 2012 IEEE 14th International Conference on Communication Technology, 2012. p. 629\u2013634. https:\/\/doi.org\/10.1109\/ICCT.2012.6511281.","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"1323_CR102","doi-asserted-by":"crossref","unstructured":"Rathore MM, Saeed F, Rehman A, Paul A, Daniel A. Intrusion detection using decision tree model in high-speed environment. In: 2018 International Conference on Soft-computing Network Security, 2018. p. 1\u20134.","DOI":"10.1109\/ICSNS.2018.8573631"},{"key":"1323_CR103","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i14\/93690","volume":"10","author":"BB Rao","year":"2017","unstructured":"Rao BB, Swathi K. Fast knn classifiers for network intrusion detection system. Indian J Sci Technol. 2017;10:1\u201310. https:\/\/doi.org\/10.17485\/ijst\/2017\/v10i14\/93690.","journal-title":"Indian J Sci Technol"},{"key":"1323_CR104","doi-asserted-by":"publisher","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","volume":"8","author":"K Shaukat","year":"2020","unstructured":"Shaukat K, Luo S, Varadharajan V, Member S. A survey on machine learning techniques for cyber security in the last decade. IEEE access. 2020;8:222310\u201354. https:\/\/doi.org\/10.1109\/ACCESS.2020.3041951.","journal-title":"IEEE access"},{"key":"1323_CR105","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz N, Jabbar MA. Random forest modeling for network intrusion detection system. Procedia Comput Sci. 2016;89:213\u20137. https:\/\/doi.org\/10.1016\/j.procs.2016.06.047.","journal-title":"Procedia Comput Sci"},{"key":"1323_CR106","doi-asserted-by":"publisher","unstructured":"Sharma R, Kalita HK. Analysis of machine learning techniques based intrusion detection systems. 2016. https:\/\/doi.org\/10.1007\/978-81-322-2529-4.","DOI":"10.1007\/978-81-322-2529-4"},{"key":"1323_CR107","doi-asserted-by":"publisher","unstructured":"Sen S, Gupta KD. Leveraging machine learning approach to setup software-defined network (sdn) controller rules during ddos attack. 2020. https:\/\/doi.org\/10.1007\/978-981-13-7564-4.","DOI":"10.1007\/978-981-13-7564-4"},{"key":"1323_CR108","doi-asserted-by":"publisher","first-page":"129728","DOI":"10.1109\/ACCESS.2021.3113350","volume":"9","author":"HMRU Rehman","year":"2021","unstructured":"Rehman HMRU, On B-W, Ningombam DD, Yi S, Choi GS. Qsod: hybrid policy gradient for deep multi-agent reinforcement learning. IEEE Access. 2021;9:129728\u201341. https:\/\/doi.org\/10.1109\/ACCESS.2021.3113350.","journal-title":"IEEE Access"},{"issue":"2","key":"1323_CR109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101945","volume":"36","author":"T Nandy","year":"2024","unstructured":"Nandy T, Noor R, Kolandaisamy R, Yamani M, Idris I. A review of security attacks and intrusion detection in the vehicular networks. J King Saud Univ Comput Inform Sci. 2024;36(2):101945. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101945.","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"1323_CR110","doi-asserted-by":"publisher","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li P, Wang X. Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access. 2019;7:31711\u201322. https:\/\/doi.org\/10.1109\/ACCESS.2019.2903723.","journal-title":"IEEE Access"},{"key":"1323_CR111","doi-asserted-by":"publisher","unstructured":"Sirisha A. A brief analysis on efficient machine learning techniques for intrusion detection model to provide network security. In: 2023 Int. Conf. Sustain. Comput. Data Commun. Syst., 2023. p. 105\u2013112, https:\/\/doi.org\/10.1109\/ICSCDS56580.2023.10105087.","DOI":"10.1109\/ICSCDS56580.2023.10105087"},{"key":"1323_CR112","doi-asserted-by":"publisher","unstructured":"Siddiqui A, Elsalamouny M, Yoo PD, Muhaidat S, Kim K. Machine-learning-based feature selection techniques for large-scale network intrusion detection. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, 2014. p. 177\u2013181. https:\/\/doi.org\/10.1109\/ICDCSW.2014.14","DOI":"10.1109\/ICDCSW.2014.14"},{"key":"1323_CR113","doi-asserted-by":"publisher","unstructured":"Garg T, Student MT. Comparison of classification techniques for intrusion detection dataset using comparison of classification techniques for intrusion detection dataset using weka. 2018. https:\/\/doi.org\/10.1109\/ICRAIE.2014.6909184.","DOI":"10.1109\/ICRAIE.2014.6909184"},{"key":"1323_CR114","doi-asserted-by":"publisher","unstructured":"Relan NG, Student PG. Implementation of network intrusion detection system using variant of decision tree algorithm. In: 2015 Int. Conf. Nascent Technol. Eng. F., 2015. p. 1\u20135. https:\/\/doi.org\/10.1109\/ICNTE.2015.7029925.","DOI":"10.1109\/ICNTE.2015.7029925"},{"key":"1323_CR115","doi-asserted-by":"publisher","unstructured":"Kotpalliwar MV. Classification of attacks using support vector machine (svm) on kddcup\u201999 ids database. In: 2015 Fifth Int. Conf. Commun. Syst. Netw. Technol., 2015. p. 987\u2013990. https:\/\/doi.org\/10.1109\/CSNT.2015.185.","DOI":"10.1109\/CSNT.2015.185"},{"key":"1323_CR116","doi-asserted-by":"publisher","unstructured":"Subba B, Biswas S, Karmakar S. Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. 2017. https:\/\/doi.org\/10.1109\/ANTS.2016.7947776.","DOI":"10.1109\/ANTS.2016.7947776"},{"issue":"s1","key":"1323_CR117","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric J, Jukic S, Subasi A. An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl. 2017;28(s1):1051\u20138. https:\/\/doi.org\/10.1007\/s00521-016-2418-1.","journal-title":"Neural Comput Appl"},{"key":"1323_CR118","unstructured":"Xu B, Chen S, Zhang H. Incremental k-nn svm method in intrusion detection."},{"key":"1323_CR119","doi-asserted-by":"publisher","unstructured":"Le T, Kim J, Kim H. An effective intrusion detection classifier using long short-term memory with gradient descent optimization. 2017. https:\/\/doi.org\/10.1109\/PlatCon.2017.7883684.","DOI":"10.1109\/PlatCon.2017.7883684"},{"key":"1323_CR120","doi-asserted-by":"crossref","unstructured":"Zhang Q, Qu Y, Deng A. Network intrusion detection using kernel-based fuzzy-rough feature selection. In: 2018 IEEE Int. Conf. Fuzzy Syst., 2018. p. 1\u20136.","DOI":"10.1109\/FUZZ-IEEE.2018.8491578"},{"key":"1323_CR121","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2018.05.002","volume":"41","author":"M Al-hawawreh","year":"2018","unstructured":"Al-hawawreh M, Moustafa N, Sitnikova E. Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl. 2018;41:1\u201311. https:\/\/doi.org\/10.1016\/j.jisa.2018.05.002.","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"1323_CR122","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10586-017-0971-8","volume":"21","author":"A Jamal","year":"2018","unstructured":"Jamal A, Farrukh M, Khan A. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput. 2018;21(1):667\u201380. https:\/\/doi.org\/10.1007\/s10586-017-0971-8.","journal-title":"Cluster Comput"},{"key":"1323_CR123","doi-asserted-by":"publisher","DOI":"10.3390\/computers8030059","author":"A Qureshi","year":"2019","unstructured":"Qureshi A. RNN-ABC: a new swarm optimization based technique for anomaly detection. Computers. 2019. https:\/\/doi.org\/10.3390\/computers8030059.","journal-title":"Computers"},{"key":"1323_CR124","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Networks. 2020. https:\/\/doi.org\/10.1016\/j.comnet.2020.107247.","journal-title":"Comput Networks"},{"key":"1323_CR125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Kp S, Poornachandran P, Al-nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334.","journal-title":"IEEE Access"},{"key":"1323_CR126","unstructured":"Sarnovsky M, Paralic J. Ss symmetry learning and knowledge model. 2020. p. 1\u201314."},{"key":"1323_CR127","doi-asserted-by":"crossref","unstructured":"Kumar P, Kumar AA, Sahayakingsly C, Udayakumar A. Analysis of intrusion detection in cyber attacks using deep learning neural networks, 2021. p. 2565\u20132584.","DOI":"10.1007\/s12083-020-00999-y"},{"issue":"10","key":"1323_CR128","doi-asserted-by":"publisher","first-page":"9723","DOI":"10.1016\/j.jksuci.2021.12.008","volume":"34","author":"M Asif","year":"2022","unstructured":"Asif M, Abbas S, Khan MA, Fatima A, Adnan M, Lee S. Mapreduce based intelligent model for intrusion detection using machine learning technique. J King Saud Univ Comput Inf Sci. 2022;34(10):9723\u201331. https:\/\/doi.org\/10.1016\/j.jksuci.2021.12.008.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1323_CR129","doi-asserted-by":"publisher","unstructured":"Jaradat AS, Barhoush MM, Easa RB. Network intrusion detection system: machine learning approach (May). Intell Dec Technol 2022. https:\/\/doi.org\/10.11591\/ijeecs.v25.i2.pp1151-1158.","DOI":"10.11591\/ijeecs.v25.i2.pp1151-1158"},{"issue":"May","key":"1323_CR130","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100306","volume":"19","author":"A Hossain","year":"2023","unstructured":"Hossain A, Islam S. Ensuring network security with a robust intrusion detection system using. Array. 2023;19(May):100306. https:\/\/doi.org\/10.1016\/j.array.2023.100306.","journal-title":"Array"},{"issue":"3","key":"1323_CR131","doi-asserted-by":"publisher","first-page":"311","DOI":"10.26599\/BDMA.2022.9020038","volume":"6","author":"H Attou","year":"2023","unstructured":"Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y. Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Anal. 2023;6(3):311\u201320. https:\/\/doi.org\/10.26599\/BDMA.2022.9020038.","journal-title":"Big Data Min Anal"},{"key":"1323_CR132","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1109\/ACCESS.2023.3349248","volume":"12","author":"HM Saleh","year":"2024","unstructured":"Saleh HM, Marouane H, Fakhfakh A. Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access. 2024;12:3825\u201336. https:\/\/doi.org\/10.1109\/ACCESS.2023.3349248.","journal-title":"IEEE Access"},{"key":"1323_CR133","doi-asserted-by":"publisher","unstructured":"Raza SN, Rehman H, Lee SG, Sang\u00a0Choi G. Artificial intelligence based camera calibration. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), 2019. p. 1564\u20131569. https:\/\/doi.org\/10.1109\/IWCMC.2019.8766666.","DOI":"10.1109\/IWCMC.2019.8766666"},{"key":"1323_CR134","doi-asserted-by":"publisher","unstructured":"Shafique R, Rustam F, Choi GS, Posa SK, Jurcut AD. In-vehicle networks security using transfer learning approach against ai-generated cyberattacks. In: 2024 35th Irish Signals and Systems Conference (ISSC), 2024. p. 1\u20136. https:\/\/doi.org\/10.1109\/ISSC61953.2024.10603221.","DOI":"10.1109\/ISSC61953.2024.10603221"},{"key":"1323_CR135","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Maglaras L, Janicke H, Smith R. Deep learning techniques for cyber security intrusion detection: A detailed analysis. In: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 2019. BCS Learning & Development","DOI":"10.14236\/ewic\/icscsr19.16"},{"key":"1323_CR136","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging10100254","author":"Y Wu","year":"2024","unstructured":"Wu Y, Zou B, Cao Y. Current status and challenges and future trends of deep learning-based intrusion detection models. J Imaging. 2024. https:\/\/doi.org\/10.3390\/jimaging10100254.","journal-title":"J Imaging"},{"key":"1323_CR137","doi-asserted-by":"crossref","unstructured":"Ambekar NG, Thokchom S. Ul-vae: an unsupervised learning approach for zero-day malware detection using variational autoencoder. In: 2024 International Conference on Computational Intelligence and Network Systems (CINS), 2024. p. 1\u20137. IEEE","DOI":"10.1109\/CINS63881.2024.10864450"},{"key":"1323_CR138","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra N, Pandya S. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access. 2021;9:59353\u201377.","journal-title":"IEEE Access"},{"issue":"20","key":"1323_CR139","doi-asserted-by":"publisher","DOI":"10.3390\/s24206771","volume":"24","author":"A El Akhdar","year":"2024","unstructured":"El Akhdar A, Baidada C, Kartit A, Hanine M, Garc\u00eda CO, Lara RG, et al. Exploring the potential of microservices in internet of things: a systematic review of security and prospects. Sensors. 2024;24(20):6771.","journal-title":"Sensors"},{"key":"1323_CR140","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110437","volume":"125","author":"S Farooq","year":"2025","unstructured":"Farooq S, Altaf A, Shoaib M, Iqbal F, Samee NA, Alohali MA, et al. Analyzing post-quantum cryptographic algorithms efficiency for transport security layer. Comput Electr Eng. 2025;125:110437.","journal-title":"Comput Electr Eng"},{"key":"1323_CR141","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst. 2018;82:761\u20138.","journal-title":"Future Gener Comput Syst"},{"key":"1323_CR142","doi-asserted-by":"crossref","unstructured":"Budhya SS, Lohia S, Deepak G, N, H.K. A survey on intrusion detection systems using various data mining techniques in big data (January). 2022.","DOI":"10.22214\/ijraset.2022.40128"},{"issue":"2","key":"1323_CR143","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1109\/TITS.2022.3164678","volume":"24","author":"I Ashraf","year":"2022","unstructured":"Ashraf I, Park Y, Hur S, Kim SW, Alroobaea R, Zikria YB, et al. A survey on cyber security threats in iot-enabled maritime industry. IEEE Trans Intell Transp Syst. 2022;24(2):2677\u201390.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"1323_CR144","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040667","volume":"11","author":"I Ashraf","year":"2022","unstructured":"Ashraf I, Narra M, Umer M, Majeed R, Sadiq S, Javaid F, et al. A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics. 2022;11(4):667.","journal-title":"Electronics"},{"issue":"16","key":"1323_CR145","doi-asserted-by":"publisher","DOI":"10.3390\/s23167154","volume":"23","author":"N Alturki","year":"2023","unstructured":"Alturki N, Aljrees T, Umer M, Ishaq A, Alsubai S, Saidani O, et al. An intelligent framework for cyber-physical satellite system and iot-aided aerial vehicle security threat detection. Sensors (Basel). 2023;23(16):7154.","journal-title":"Sensors (Basel)"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01323-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01323-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01323-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T23:01:57Z","timestamp":1764370917000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01323-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":145,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1323"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01323-2","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2025,11,28]]},"assertion":[{"value":"26 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"264"}}