{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:57Z","timestamp":1773615837995,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.3103\/s0146411621020085","type":"journal-article","created":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T12:03:52Z","timestamp":1620993832000},"page":"137-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":94,"title":["Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network"],"prefix":"10.3103","volume":"55","author":[{"family":"Prabhat Kumar","sequence":"first","affiliation":[]},{"given":"Govind P.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Rakesh","family":"Tripathi","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,5,14]]},"reference":[{"key":"7339_CR1","unstructured":"Evans, D., The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco White Paper, 2011."},{"key":"7339_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"M.F. Elrawy","year":"2018","unstructured":"Elrawy, M.F., Awad, A.I., and Hamed, H.F.A., Intrusion detection systems for IoT-based smart environments: A survey, J. Cloud Comput., 2018, vol. 7, no. 1, pp. 1\u201320. https:\/\/doi.org\/10.1186\/s13677-018-0123-6","journal-title":"J. Cloud Comput."},{"key":"7339_CR3","volume-title":"Large DDoS attacks cause outages at Twitter, Spotify, and other sites","author":"D. Etherington","year":"2016","unstructured":"Etherington, D. and Conger, K., Large DDoS attacks cause outages at Twitter, Spotify, and other sites, TechCrunch, 2016."},{"key":"7339_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.comnet.2019.05.014","volume":"160","author":"S. Hajiheidari","year":"2019","unstructured":"Hajiheidari, S., Wakil, K., Badri, M., and Navimipour, N.J., Intrusion detection systems in the Internet of things: A comprehensive investigation, Comput. Networks, 2019, vol. 160, pp. 165\u2013191. https:\/\/doi.org\/10.1016\/j.comnet.2019.05.014","journal-title":"Comput. Networks"},{"key":"7339_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/ATNAC.2014.7020884","volume":"2015","author":"I. Stojmenovic","year":"2014","unstructured":"Stojmenovic, I., Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, 2014 Australas. \n               Telecommun. Networks Appl. Conf. ATNAC 2014, 2015, pp. 117\u2013122. https:\/\/doi.org\/10.1109\/ATNAC.2014.7020884","journal-title":"Telecommun. Networks Appl. Conf. ATNAC"},{"key":"7339_CR6","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N. Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., and Faruki, P., Network intrusion detection for IoT security based on learning techniques, IEEE Commun. Surv. Tutorials, 2019, vol. 21, no. 3, pp. 2671\u20132701. https:\/\/doi.org\/10.1109\/COMST.2019.2896380","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7339_CR7","unstructured":"Pahl, M.O. and Aubet, F.X., All eyes on you: Distributed multi-dimensional IoT microservice anomaly detection, 14th Int. Conf. Netw. Serv. Manag. CNSM 2018 Work. 1st Int. Work. High-Precision Networks Oper. Control. HiPNet 2018 1st Work. Segm. Routing Serv. Funct. Chain. SR+SFC 2, 2018, pp. 72\u201380."},{"key":"7339_CR8","doi-asserted-by":"publisher","unstructured":"Hasan, M., Islam, M.M., Zarif, M.I.I., and Hashem, M.M.A., Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches, Internet Things, 2019, vol. 7, artic. no. 100059. https:\/\/doi.org\/10.1016\/j.iot.2019.100059","DOI":"10.1016\/j.iot.2019.100059"},{"key":"7339_CR9","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"H.H. Pajouh","year":"2019","unstructured":"Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., and Choo, K.K.R., A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Top. Comput., 2019, vol. 7, no. 2, pp. 314\u2013323. https:\/\/doi.org\/10.1109\/TETC.2016.2633228","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"7339_CR10","doi-asserted-by":"publisher","unstructured":"Kumar, V., Das, A.K., and Sinha, D., UIDS: A unified intrusion detection system for IoT environment, Evol. Intell., 2019, artic. no. 0123456789. https:\/\/doi.org\/10.1007\/s12065-019-00291-w","DOI":"10.1007\/s12065-019-00291-w"},{"key":"7339_CR11","doi-asserted-by":"publisher","first-page":"9889","DOI":"10.1007\/s10586-018-1847-2","volume":"22","author":"L. Deng","year":"2019","unstructured":"Deng, L., Li, D., Yao, X., Cox, D., and Wang, H., Mobile network intrusion detection for IoT system based on transfer learning algorithm, Cluster Comput., 2019, vol. 22, pp. 9889\u20139904. https:\/\/doi.org\/10.1007\/s10586-018-1847-2","journal-title":"Cluster Comput."},{"key":"7339_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/JCN.2018.000041","volume":"20","author":"S. Prabavathy","year":"2018","unstructured":"Prabavathy, S., Sundarakantham, K., and Shalinie, S.M., Design of cognitive fog computing for intrusion detection in Internet of Things, J. Commun. Networks, 2018, vol. 20, no. 3, pp. 291\u2013298. https:\/\/doi.org\/10.1109\/JCN.2018.000041","journal-title":"J. Commun. Networks"},{"key":"7339_CR13","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.1109\/TII.2018.2836150","volume":"14","author":"X. Liu","year":"2018","unstructured":"Liu, X., Liu, Y., Liu, A., and Yang, L.T., Defending ON-OFF attacks using light probing messages in smart sensors for industrial communication systems, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 9, pp. 3801\u20133811. https:\/\/doi.org\/10.1109\/TII.2018.2836150","journal-title":"IEEE Trans. Ind. Inf."},{"key":"7339_CR14","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"A. Diro","year":"2018","unstructured":"Diro, A. and Chilamkurti, N., Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst., 2018, vol. 82, pp. 761\u2013768. https:\/\/doi.org\/10.1016\/j.future.2017.08.043","journal-title":"Future Gener. Comput. Syst."},{"key":"7339_CR15","doi-asserted-by":"publisher","unstructured":"Anthi, E., Williams, L., and Burnap, P., Pulse: An adaptive intrusion detection for the internet of things, IET Conf. Publ., 2018, vol. 2018, no. CP740. https:\/\/doi.org\/10.1049\/cp.2018.0035","DOI":"10.1049\/cp.2018.0035"},{"key":"7339_CR16","doi-asserted-by":"publisher","unstructured":"Benmessahel, I., Xie, K., Chellal, M., and Semong, T., A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization, Evol. Intell., 20190, vol. 12, no. 2, pp. 131\u2013146. https:\/\/doi.org\/10.1007\/s12065-019-00199-5","DOI":"10.1007\/s12065-019-00199-5"},{"key":"7339_CR17","doi-asserted-by":"publisher","first-page":"5156","DOI":"10.1007\/s11227-018-2413-7","volume":"74","author":"A. Mehmood","year":"2018","unstructured":"Mehmood, A., Mukherjee, M., Ahmed, S.H., Song, H., and Malik, K.M., NBC-MAIDS: Na\u00efve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks, J. Supercomput., 2018, vol. 74, no. 10, pp. 5156\u20135170. https:\/\/doi.org\/10.1007\/s11227-018-2413-7","journal-title":"J. Supercomput."},{"key":"7339_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0","volume-title":"Noise Reduction in Speech Processing","author":"J. Benesty","year":"2009","unstructured":"Benesty, J., Chen, J., Huang, Y., and Cohen, I., in Noise Reduction in Speech Processing, Springer, 2009. https:\/\/doi.org\/10.1007\/978-3-642-00296-0"},{"key":"7339_CR19","doi-asserted-by":"publisher","first-page":"277","DOI":"10.2307\/1167293","volume":"23","author":"S.C. Trent","year":"1998","unstructured":"Trent, S.C., Artiles, A.J., and Englert, C.S., From deficit thinking to social constructivism: A review of theory, research, and practice in special education, Rev. Res. Educ., 1998, vol. 23, pp. 277\u2013307. https:\/\/doi.org\/10.2307\/1167293","journal-title":"Rev. Res. Educ."},{"key":"7339_CR20","doi-asserted-by":"publisher","unstructured":"Reddy, G.T., Kaluri, R., Reddy, P.K., Lakshmanna, K., Koppu, S., and Rajput, D.S., A novel approach for home surveillance system using IoT adaptive security, Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur - India, February 26\u201328, \n               2019, 2019, pp. 1616\u20131620. https:\/\/doi.org\/10.2139\/ssrn.3356525","DOI":"10.2139\/ssrn.3356525"},{"key":"7339_CR21","volume-title":"Data Analysis in the Cloud: Models, Techniques and Applications","author":"D. Talia","year":"2015","unstructured":"Talia, D., Trunfio, P., and Marozzo, F., Data Analysis in the Cloud: Models, Techniques and Applications, Elsevier, 2015."},{"key":"7339_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"K.A.P. da Costa","year":"2019","unstructured":"da Costa, K.A.P., Papa, J.P., Lisboa, C.O., Munoz, R., and de Albuquerque, V.H.C., Internet of Things: A survey on machine learning-based intrusion detection approaches, Comput. Networks, 2019, vol. 151, pp. 147\u2013157. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.023","journal-title":"Comput. Networks"},{"key":"7339_CR23","unstructured":"DS2OS traffic traces, Kaggle. https:\/\/www.kaggle.com\/francoisxa\/ds2ostraffictraces. Accessed September 25, 2019."},{"key":"7339_CR24","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","volume":"160","author":"R.M. Swarna Priya","year":"2020","unstructured":"Swarna Priya, R.M., et al., An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture, Comput. Commun., 2020, vol. 160, pp. 139\u2013149. https:\/\/doi.org\/10.1016\/j.comcom.2020.05.048","journal-title":"Comput. Commun."},{"key":"7339_CR25","volume-title":"Malware threats and solutions for trustworthy mobile systems design, Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment","author":"J. Milosevic","year":"2017","unstructured":"Milosevic, J., Regazzoni, F., and Malek, M., Malware threats and solutions for trustworthy mobile systems design, Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, Springer, 2017."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621020085.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621020085","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621020085.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:20Z","timestamp":1773612320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621020085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["7339"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621020085","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"23 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}