{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:36:50Z","timestamp":1775788610774,"version":"3.50.1"},"reference-count":49,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054836","type":"journal-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T07:35:30Z","timestamp":1728632130000},"page":"2299-2316","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments"],"prefix":"10.32604","volume":"81","author":[{"given":"Bassam Mohammad","family":"Elzaghmouri","sequence":"first","affiliation":[]},{"given":"Yosef Hasan Fayez","family":"Jbara","sequence":"additional","affiliation":[]},{"given":"Said","family":"Elaiwat","sequence":"additional","affiliation":[]},{"given":"Nisreen","family":"Innab","sequence":"additional","affiliation":[]},{"given":"Ahmed Abdelgader Fadol","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Mohammed Awad Mohammed","family":"Ataelfadiel","sequence":"additional","affiliation":[]},{"given":"Farah H.","family":"Zawaideh","sequence":"additional","affiliation":[]},{"given":"Mouiad Fadeil","family":"Alawneh","sequence":"additional","affiliation":[]},{"given":"Asef","family":"Al-Khateeb","sequence":"additional","affiliation":[]},{"given":"Marwan","family":"Abu-Zanona","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-030-75657-4_5","volume":"89","author":"Sahai","year":"2021","journal-title":"Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing"},{"key":"ref2","article-title":"Smart android based home automation system using internet of things (IoT)\u2019","volume":"14","author":"Khan","year":"2022, Art. no. 10717","journal-title":"Sustainability"},{"key":"ref3","article-title":"Security threats and measures in the Internet of Things for smart city infrastructure: A state of art","volume":"34","author":"Sharma","year":"2023, Art. no. e4571","journal-title":"Trans. Emerg. Telecomm. Technol."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2020.105903","article-title":"The role of the Internet of Things in healthcare: Future trends and challenges","volume":"199","author":"Aghdam","year":"2021, Art. no. 105903","journal-title":"Comput. Methods Programs Biomed."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1256","DOI":"10.1109\/TEM.2020.2978014","article-title":"Toward trust in Internet of Things ecosystems: Design principles for blockchain-based IoT applications","volume":"67","author":"Lockl","year":"2020","journal-title":"IEEE Trans. Eng. Manage."},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.3390\/s21051809","article-title":"Internet of things: Evolution, concerns and security challenges","volume":"21","author":"Malhotra","year":"2021, Art. no. 1809","journal-title":"Sensors"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1080\/23742917.2023.2228053","article-title":"Securing IoT devices against emerging security threats: Challenges and mitigation techniques","volume":"7","author":"Aziz Al Kabir","year":"2023","journal-title":"J. Cyber Secur. Tech."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2024.3372630","article-title":"Securing the IoT application layer from an MQTT protocol perspective: Challenges and research prospects","author":"Lakshminarayana","year":"2024","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","article-title":"Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions","volume":"25","author":"Moustafa","year":"2023","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2022.03.001","article-title":"Host-based IDS: A review and open issues of an anomaly detection system in IoT","volume":"133","author":"Martins","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/s21092987","article-title":"A multi-layer classification approach for intrusion detection in IoT networks based on deep learning","volume":"21","author":"Qaddoura","year":"2021, Art. no. 2987","journal-title":"Sensors"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.12.009","article-title":"Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin search algorithm","volume":"175","author":"Asgharzadeh","year":"2023","journal-title":"J. Parallel Distr. Comput."},{"key":"ref13","series-title":"Int. Conf. Model Data Eng.","first-page":"237","article-title":"A survey on intrusion detection systems for IoT networks based on long short-term memory","author":"Oueslati","year":"2023"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1007\/s12083-023-01510-z","article-title":"IoT intrusion detection model based on gated recurrent unit and residual network","volume":"16","author":"Zhao","year":"2023","journal-title":"Peer Peer Netw. Appl."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1186\/s40537-021-00544-5","article-title":"IDS-attention: An efficient algorithm for intrusion detection systems using attention mechanism","volume":"8","author":"Laghrissi","year":"Dec. 2021","journal-title":"J. Big Data"},{"key":"ref16","article-title":"A machine learning based framework for IoT device identification and abnormal traffic detection","volume":"33","author":"Salman","year":"Mar. 2022, Art. no. e3743","journal-title":"Trans. Emerg. Tel. Tech."},{"key":"ref17","unstructured":"S. Pokhrel, R. Abbas, and B. Aryal, \u201cIoT security: Botnet detection in IoT using machine learning,\u201d 2021, arxiv:2104.02231."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","article-title":"Attack and anomaly detection in IoT networks using machine learning techniques: A review","volume":"9","author":"Haji","year":"2021","journal-title":"Asian J. Res. Comput. Sci."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.48084\/etasr.4202","article-title":"Attack detection in IoT using machine learning","volume":"11","author":"Anwer","year":"2021","journal-title":"Eng., Technol. Appl. Sci. Res."},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.3390\/s20164372","article-title":"Machine learning-based IoT-botnet attack detection with sequential architecture","volume":"20","author":"Soe","year":"2020, Art. no. 4372","journal-title":"Sensors"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.3390\/computers12020034","article-title":"A novel deep learning-based intrusion detection system for IoT networks","volume":"12","author":"Awajan","year":"Feb. 2023, Art. no. 2","journal-title":"Computers"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"117734","DOI":"10.1109\/ACCESS.2021.3107337","article-title":"An ensemble multi-view federated learning intrusion detection for IoT","volume":"9","author":"Attota","year":"2021","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.3390\/electronics13071391","article-title":"Using ensemble learning for anomaly detection in cyber-physical systems","volume":"13","author":"Jeffrey","year":"2024, Art. no. 1391","journal-title":"Electronics"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/s23146507","article-title":"CNN-CNN: Dual convolutional neural network approach for feature selection and attack detection on internet of things networks","volume":"23","author":"Alabsi","year":"2023, Art. no. 6507","journal-title":"Sensors"},{"key":"ref25","series-title":"2023 Int. Conf. Sustainable Comput. Data Commun. Syst. (ICSCDS)","article-title":"CNN-based approach for IoT intrusion attack detection","author":"Kumar"},{"key":"ref26","unstructured":"K. Kostas, \u201cCNN based IoT device identification,\u201d Apr. 26, 2023, arXiv:2304.13894."},{"key":"ref27","series-title":"2022 Int. Conf. Commun., Comput. Internet Things (IC3IoT)","first-page":"1","article-title":"DDoSLSTM: Detection of distributed denial of service attacks on IoT devices using LSTM model","author":"Gaur","year":"2022"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/3806459","article-title":"Botnet attack detection by using CNN-LSTM model for Internet of Things applications","volume":"2021","author":"Alkahtani","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-023-00178-5","article-title":"Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset","volume":"6","author":"Sharmila","year":"Sep. 2023","journal-title":"Cybersecurity"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6955","DOI":"10.1007\/s00521-024-09439-x","article-title":"Comparative study of ML models for IIoT intrusion detection: Impact of data preprocessing and balancing","volume":"36","author":"Eid","year":"May 2024","journal-title":"Neural Comput. Appl."},{"key":"ref31","first-page":"473","article-title":"Network intrusion traffic detection based on feature extraction","volume":"78","author":"Yu","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref32","first-page":"2121","article-title":"AID4I: An intrusion detection framework for industrial internet of things using automated machine learning","volume":"76","author":"Sezgin","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103251","article-title":"Towards DDoS attack detection using deep learning approach","volume":"129","author":"Aktar","year":"2023, Art. no. 103251","journal-title":"Comput. Secur."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","article-title":"Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network","volume":"10","author":"Thakkar","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.comcom.2023.04.018","article-title":"CANET: A hierarchical cnn-attention model for network intrusion detection","volume":"205","author":"Ren","year":"2023","journal-title":"Comput. Commun."},{"key":"ref36","first-page":"4973","article-title":"Performance evaluation of various ensemble classifiers for malware detection","volume":"62","author":"Dhanya","year":"2022","journal-title":"Mat. Today: Proc."},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.3390\/jsan10030058","article-title":"Network attack classification in IoT using support vector machines","volume":"10","author":"Ioannou","year":"2021","journal-title":"J. Sens. Actuator Netw."},{"key":"ref38","first-page":"717","article-title":"Internet of Things (IoT) security enhancement using XGboost machine learning techniques","volume":"77","author":"Doghramachi","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.3390\/s23167256","article-title":"Detection of Android malware in the Internet of Things through the K-nearest neighbor algorithm","volume":"23","author":"Babbar","year":"2023, Art. no. 7256","journal-title":"Sensors"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11276-023-03478-3","article-title":"Identifying SH-IoT devices from network traffic characteristics using random forest classifier","volume":"30","author":"Chowdhury","year":"2024","journal-title":"Wirel. Netw."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"16637","DOI":"10.1007\/s12652-023-04666-x","article-title":"IoT networks attacks detection using multi-novel features and extra tree random-voting ensemble classifier (ER-VEC)","volume":"14","author":"Sarwar","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref42","article-title":"Attack classification of an intrusion detection system using deep learning and hyperparameter optimization","volume":"58","author":"Kunang","year":"2021, Art. no. 102804","journal-title":"J. Inf. Secur. Appl."},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.3390\/info14010041","article-title":"Deep learning approach for SDN-enabled intrusion detection system in IoT networks","volume":"14","author":"Chaganti","year":"Jan. 2023","journal-title":"Information"},{"key":"ref44","article-title":"Deep learning for improving attack detection system using CSE-CICIDS2018","volume":"20","author":"Hagar","year":"2022","journal-title":"NeuroQuantology"},{"key":"ref45","series-title":"2023 Int. Conf. Intell. Syst. Commun., IoT Secur. (ICISCoIS)","first-page":"44","article-title":"A novel hybrid deep learning model for botnet attacks detection in a secure IoMT Environment","author":"Kumar","year":"2023"},{"key":"ref46","unstructured":"S. Leoshchenkoa, A. Oliinyka, S. Subbotina, and T. Kolpakovaa, \u201cImplementation of swarm intelligence methods for preprocessing in neuroevolution synthesis,\u201d 2023. Accessed: Jul. 29, 2024. [Online]. Available: https:\/\/ceur-ws.org\/Vol-3702\/paper36.pdf"},{"key":"ref47","series-title":"2023 Int. Conf. Artif. Intell. Innov. Healthcare Ind. (ICAIIHI)","article-title":"Real-time monitoring and anomaly detection in hospital IoT networks using machine learning","author":"Kumar"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"656","DOI":"10.57152\/malcom.v4i2.1304","article-title":"Comparative analysis of machine learning models for intrusion detection in internet of things networks using the RT-IoT2022 dataset","volume":"4","author":"Airlangga","year":"2024","journal-title":"MALCOM: Indonesian J. Mach. Learn. Comput. Sci."},{"key":"ref49","journal-title":"UCI Machine Learning Repository"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_54836\/TSP_CMC_54836.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:06:04Z","timestamp":1741320364000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054836","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}