{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:04:08Z","timestamp":1771466648911,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002858","name":"the Postdoctoral Science Foundation of China","doi-asserted-by":"crossref","award":["No. 2020M683736"],"award-info":[{"award-number":["No. 2020M683736"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012243","name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong","doi-asserted-by":"publisher","award":["No. SJGY20210456"],"award-info":[{"award-number":["No. SJGY20210456"]}],"id":[{"id":"10.13039\/501100012243","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"the Natural Science Foundation of Heilongjiang Province of China","doi-asserted-by":"crossref","award":["No. LH2021F038"],"award-info":[{"award-number":["No. LH2021F038"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Social Science Foundation of Heilongjiang Province of China","award":["No. 21GLC189"],"award-info":[{"award-number":["No. 21GLC189"]}]},{"name":"the Foreign Expert Projects in Heilongjiang","award":["No. GZ20220131"],"award-info":[{"award-number":["No. GZ20220131"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Intrusion detection in industrial control systems is of great significance to maintain the normal operation of infrastructure. However, the current common intrusion detection models cannot effectively use the semi-quantitative information consisting of expert knowledge and quantitative data, and most of them lack interpretability. Belief Rule Base (BRB), as a hybrid system, can effectively utilize both expert knowledge and historical data. Therefore, this paper proposes a new intrusion detection model for industrial control systems based on a variable interval structure BRB (VI-BRB). Firstly, the interval structure is introduced into BRB. By changing the conjunctive into disjunction, the method of rule generation is changed, and the problem of combinational explosion is effectively solved. Secondly, in view of the difficulty of determining the model interval, a variable interval structure is proposed. By changing fixed intervals into variable intervals, the optimal model structure can be found to improve model performance. Thirdly, an improved enhanced whale optimization algorithm (E-WOA) is proposed to handle the complex constraints in the optimization process of BRB while maintaining the interpretability of the model as much as possible. Finally, by conducting experiments on a natural gas pipeline dataset, VI-BRB achieved an accuracy of 97.3%. The experimental results indicate that VI-BRB can maintain high interpretability while obtaining high accuracy.<\/jats:p>","DOI":"10.1186\/s42400-025-00438-6","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T01:02:58Z","timestamp":1771462978000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A new intrusion detection model based on belief rule base with variable interval structure for industrial control system"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0548-5452","authenticated-orcid":false,"given":"Guangyu","family":"Qian","sequence":"first","affiliation":[]},{"given":"Wei","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"02","key":"438_CR1","doi-asserted-by":"publisher","first-page":"1550033","DOI":"10.1142\/S0218213015500335","volume":"25","author":"M Amini","year":"2016","unstructured":"Amini M, Rezaeenour J, Hadavandi E (2016) A neural network ensemble classifier for effective intrusion detection using fuzzy clustering and radial basis function networks. Int J Artif Intell Tools 25(02):1550033","journal-title":"Int J Artif Intell Tools"},{"key":"438_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.knosys.2012.10.016","volume":"39","author":"L Chang","year":"2013","unstructured":"Chang L, Zhou Y, Jiang J et al (2013) Structure learning for belief rule base expert system: a comparative study. Knowl-Based Syst 39:159\u2013172","journal-title":"Knowl-Based Syst"},{"issue":"9","key":"438_CR3","doi-asserted-by":"publisher","first-page":"1542","DOI":"10.1109\/TSMC.2017.2678607","volume":"48","author":"LL Chang","year":"2017","unstructured":"Chang LL, Zhou ZJ, Chen YW et al (2017) Belief rule base structure and parameter joint optimization under disjunctive assumption for nonlinear complex system modeling. IEEE Trans Syst Man Cybern Syst 48(9):1542\u20131554","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"438_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-023-05284-2","volume":"79","author":"X Cheng","year":"2023","unstructured":"Cheng X, Han P, He W et al (2023) A new interval constructed belief rule base with rule reliability. J Supercomput 79:1\u201333","journal-title":"J Supercomput"},{"key":"438_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.01.023","volume":"75","author":"Z Chiba","year":"2018","unstructured":"Chiba Z, Abghour N, Moussaid K et al (2018) A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput Secur 75:36\u201358","journal-title":"Comput Secur"},{"key":"438_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz N, Jabbar MA (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213\u2013217","journal-title":"Procedia Comput Sci"},{"issue":"11","key":"438_CR7","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1109\/JAS.2020.1003399","volume":"8","author":"Z Feng","year":"2020","unstructured":"Feng Z, He W, Zhou Z et al (2020) A new safety assessment method based on belief rule base with attribute reliability. IEEE\/CAA J Autom Sin 8(11):1774\u20131785","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"438_CR8","doi-asserted-by":"publisher","first-page":"110160","DOI":"10.1016\/j.asoc.2023.110160","volume":"138","author":"P Han","year":"2023","unstructured":"Han P, He W, Cao Y et al (2023) Lithium-ion battery health assessment method based on belief rule base with interpretability. Appl Soft Comput 138:110160","journal-title":"Appl Soft Comput"},{"key":"438_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120485","author":"W He","year":"2023","unstructured":"He W, Cheng X, Zhao X et al (2023) An interval construction belief rule base with interpretability for complex systems. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2023.120485","journal-title":"Expert Syst Appl"},{"key":"438_CR10","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.asoc.2016.05.046","volume":"48","author":"GY Hu","year":"2016","unstructured":"Hu GY, Zhou ZJ, Zhang BC et al (2016) A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm. Appl Soft Comput 48:404\u2013418","journal-title":"Appl Soft Comput"},{"key":"438_CR11","doi-asserted-by":"publisher","first-page":"106147","DOI":"10.1016\/j.knosys.2020.106147","volume":"203","author":"GY Hu","year":"2020","unstructured":"Hu GY, Zhou ZJ, Hu CH et al (2020) Hidden behavior prediction of complex system based on time-delay belief rule base forecasting model. Knowl-Based Syst 203:106147","journal-title":"Knowl-Based Syst"},{"key":"438_CR12","doi-asserted-by":"publisher","first-page":"119451","DOI":"10.1016\/j.eswa.2022.119451","volume":"216","author":"G Hu","year":"2023","unstructured":"Hu G, He W, Sun C et al (2023) Hierarchical belief rule-based model for imbalanced multi-classification. Expert Syst Appl 216:119451","journal-title":"Expert Syst Appl"},{"issue":"1","key":"438_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P et al (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):1\u201322","journal-title":"Cybersecurity"},{"key":"438_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126513","author":"V Kumar","year":"2025","unstructured":"Kumar V, Kumar K, Singh M et al (2025) NIDS-DA: detecting functionally preserved adversarial examples for network intrusion detection system using deep autoencoders. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2025.126513","journal-title":"Expert Syst Appl"},{"key":"438_CR15","doi-asserted-by":"publisher","first-page":"126750","DOI":"10.1016\/j.eswa.2025.126750","volume":"272","author":"B Lei","year":"2025","unstructured":"Lei B, Tang H, Su Y et al (2025) Fuzzy adaptive power optimization control of wind turbine with improved whale optimization algorithm and kernel extreme learning machine. Expert Syst Appl 272:126750","journal-title":"Expert Syst Appl"},{"key":"438_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104488","author":"J Li","year":"2025","unstructured":"Li J, Qian G, He W et al (2025) Industrial control system intrusion detection method based on belief rule base with gradient descent. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2025.104488","journal-title":"Comput Secur"},{"issue":"3","key":"438_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K llgun","year":"1995","unstructured":"llgun K, Kemmerer RA, Porras PA (1995) State transition analysis: a rule-based intrusion detection approach. IEEE Trans Softw Eng 21(3):181\u2013199","journal-title":"IEEE Trans Softw Eng"},{"key":"438_CR18","doi-asserted-by":"crossref","unstructured":"Midi D, Rullo A, Mudgerikar A, et al (2017) Kalis\u2014a system for knowledge-driven adaptable intrusion detection for the Internet of Things. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 656\u2013666","DOI":"10.1109\/ICDCS.2017.104"},{"key":"438_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"438_CR20","doi-asserted-by":"crossref","unstructured":"Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. In: Critical infrastructure protection VIII: 8th IFIP WG 11.10 international conference, ICCIP 2014, Arlington, VA, USA, March 17\u201319, 2014, revised selected papers 8. Springer, Berlin, pp 65\u201378","DOI":"10.1007\/978-3-662-45355-1_5"},{"issue":"3","key":"438_CR21","first-page":"40","volume":"3","author":"SA Mulay","year":"2010","unstructured":"Mulay SA, Devale PR, Garje GV (2010) Intrusion detection system using support vector machine and decision tree. Int J Comput Appl 3(3):40\u201343","journal-title":"Int J Comput Appl"},{"key":"438_CR22","doi-asserted-by":"publisher","first-page":"105858","DOI":"10.1016\/j.compbiomed.2022.105858","volume":"148","author":"MH Nadimi-Shahraki","year":"2022","unstructured":"Nadimi-Shahraki MH, Zamani H, Mirjalili S (2022) Enhanced whale optimization algorithm for medical feature selection: a COVID-19 case study. Comput Biol Med 148:105858","journal-title":"Comput Biol Med"},{"key":"438_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200239","author":"G Qian","year":"2023","unstructured":"Qian G, Hu L, Zhang W et al (2023) A new intrusion detection model for industrial control system based on hierarchical interval-based BRB. Intell Syst Appl. https:\/\/doi.org\/10.1016\/j.iswa.2023.200239","journal-title":"Intell Syst Appl"},{"issue":"4","key":"438_CR24","doi-asserted-by":"publisher","first-page":"2491","DOI":"10.1007\/s10207-024-00845-9","volume":"23","author":"G Qian","year":"2024","unstructured":"Qian G, Li J, He W et al (2024) An online intrusion detection method for industrial control systems based on extended belief rule base. Int J Inf Secur 23(4):2491\u20132514","journal-title":"Int J Inf Secur"},{"issue":"8","key":"438_CR34","doi-asserted-by":"publisher","first-page":"4895","DOI":"10.1109\/TSMC.2019.2944640","volume":"51","author":"SW Tang","year":"2019","unstructured":"Tang SW, Zhou ZJ, Hu CH et al (2019) Perturbation analysis of evidential reasoning rule[J]. IEEE Trans Syst Man\nCyber Syst 51(8):4895\u20134910","journal-title":"IEEE Trans Syst Man Cyber Syst"},{"key":"438_CR25","doi-asserted-by":"publisher","first-page":"110841","DOI":"10.1016\/j.cie.2024.110841","volume":"200","author":"C Wu","year":"2025","unstructured":"Wu C, Fu X, Xia Y (2025) Spare part demand forecasting using PSO trained quantile regression neural network. Comput Ind Eng 200:110841","journal-title":"Comput Ind Eng"},{"issue":"9","key":"438_CR26","doi-asserted-by":"publisher","first-page":"e10481","DOI":"10.1016\/j.heliyon.2022.e10481","volume":"8","author":"Y Xie","year":"2022","unstructured":"Xie Y, He W, Zhu H et al (2022) A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning. Heliyon 8(9):e10481","journal-title":"Heliyon"},{"issue":"2","key":"438_CR27","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TSMCA.2005.851270","volume":"36","author":"JB Yang","year":"2006","unstructured":"Yang JB, Liu J, Wang J, Sii HS, Wang HW (2006) Belief rule-base inference methodology using the evidential reasoning approach\u2014RIMER. IEEE Trans Syst Man Cybern Syst 36(2):266\u2013285","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"438_CR28","doi-asserted-by":"publisher","first-page":"101832","DOI":"10.1016\/j.swevo.2024.101832","volume":"92","author":"Y Yang","year":"2025","unstructured":"Yang Y, Li H, Lei Z et al (2025) A nonlinear dimensionality reduction search improved differential evolution for large-scale optimization. Swarm Evol Comput 92:101832","journal-title":"Swarm Evol Comput"},{"issue":"4","key":"438_CR29","doi-asserted-by":"publisher","first-page":"592","DOI":"10.4218\/etrij.17.0116.0305","volume":"39","author":"BC Zhang","year":"2017","unstructured":"Zhang BC, Hu GY, Zhou ZJ et al (2017) Network intrusion detection based on directed acyclic graph and belief rule base. ETRI J 39(4):592\u2013604","journal-title":"ETRI J"},{"key":"438_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ijar.2019.12.016","volume":"119","author":"A Zhang","year":"2020","unstructured":"Zhang A, Gao F, Yang M et al (2020) A new rule reduction and training method for extended belief rule base based on DBSCAN algorithm. Int J Approx Reason 119:20\u201339","journal-title":"Int J Approx Reason"},{"issue":"8","key":"438_CR31","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1109\/TSMC.2019.2944893","volume":"51","author":"ZJ Zhou","year":"2019","unstructured":"Zhou ZJ, Hu GY, Hu CH et al (2019) A survey of belief rule-base expert system. IEEE Trans Syst Man Cybern Syst 51(8):4944\u20134958","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"438_CR32","doi-asserted-by":"publisher","first-page":"104155","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou W, Xia C, Wang T et al (2025) Hidim: a novel framework of network intrusion detection for hierarchical dependency and class imbalance. Comput Secur 148:104155","journal-title":"Comput Secur"},{"key":"438_CR33","doi-asserted-by":"publisher","first-page":"106096","DOI":"10.1016\/j.knosys.2020.106096","volume":"203","author":"H Zhu","year":"2020","unstructured":"Zhu H, Xiao M, Zhao X et al (2020) A structure optimization method for extended belief-rule-based classification system. Knowl-Based Syst 203:106096","journal-title":"Knowl-Based Syst"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00438-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00438-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00438-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T01:03:02Z","timestamp":1771462982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00438-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["438"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00438-6","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"26 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest and they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"32"}}