{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:34:01Z","timestamp":1776785641625,"version":"3.51.2"},"reference-count":44,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062971","type":"journal-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T02:40:46Z","timestamp":1745289646000},"page":"5155-5179","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["ERBM: A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments"],"prefix":"10.32604","volume":"83","author":[{"given":"Arshad","family":"Mehmmod","sequence":"first","affiliation":[]},{"given":"Komal","family":"Batool","sequence":"additional","affiliation":[]},{"given":"Ahthsham","family":"Sajid","sequence":"additional","affiliation":[]},{"given":"Muhammad Mansoor","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Mazliham MohD","family":"Su\u2019ud","sequence":"additional","affiliation":[]},{"given":"Inam Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","article-title":"Machine learning in IoT security: current solutions and future challenges","volume":"22","author":"Hussain","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1186\/s42400-021-00077-7","article-title":"A critical review of intrusion detection systems in the Internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets, and challenges","volume":"4","author":"Khraisat","year":"2021","journal-title":"Cybersecurity"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/s11276-023-03495-2","article-title":"Towards an efficient model for network intrusion detection system (IDS): systematic literature review","volume":"30","author":"Abdulganiyu","year":"2024","journal-title":"Wir Netw Cybersecur"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/s40866-024-00192-7","article-title":"Smart electrical substation cybersecurity model based on WPA3 and cooperative hybrid intrusion detection system (CHIDS)","volume":"9","author":"Alsharbaty","year":"2024","journal-title":"Smart Grids Energy"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3909173","DOI":"10.1155\/2024\/3909173","article-title":"A critical review of artificial intelligence based approaches in intrusion detection: a comprehensive analysis","volume":"2024","author":"Muneer","year":"2024","journal-title":"J Eng"},{"key":"ref6","first-page":"557","author":"Kizza","year":"2024","journal-title":"Guide to computer network security, texts in computer science"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"494","DOI":"10.3390\/electronics11030494","article-title":"Threat analysis and distributed denial of service (DDoS) attack recognition in the Internet of Things (IoT)","volume":"11","author":"Ali","year":"2022","journal-title":"Electronics"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3635030","article-title":"Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions","volume":"56","author":"Kebande","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1007\/s10586-019-03008-x","article-title":"An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset","volume":"23","author":"Kumar","year":"2020","journal-title":"Cluster Comput"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.55056\/jec.648","article-title":"A long short-term memory based approach for detecting cyber attacks in IoT using CIC-IoT2023 dataset","volume":"3","author":"Jony","year":"2024","journal-title":"J Edge Comput"},{"key":"ref11","article-title":"Rule-based information extraction: advantages, limitations, and perspectives","author":"Waltl","journal-title":"Jusletter IT 22; 2018"},{"key":"ref12","series-title":"Evolution in Computational Intelligence: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021)","first-page":"115","article-title":"Fuzzy-based methods for the selection and prioritization of software requirements: a systematic literature review","author":"Nazim","year":"2022"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1420680","DOI":"10.3389\/fcomp.2024.1420680","article-title":"Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies","volume":"6","author":"Kaur","year":"2024","journal-title":"Front Comput Sci"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","unstructured":"Kang H, Ahn DH, Lee GM, Yoo JD, Park KH, Kim HK. IoT network intrusion datasetIEEE Dataport. 2019. doi:10.21227\/q70p-q449."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4598","DOI":"10.3390\/math10234598","article-title":"Intelligent deep learning for anomaly-based intrusion detection in IoT smart home networks","volume":"10","author":"Butt","year":"2022","journal-title":"Mathematics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.4108\/eai.6-10-2021.171246","article-title":"A comprehensive survey on intrusion detection based machine learning for IoT networks","volume":"8","author":"Mliki","year":"2021","journal-title":"ICST Trans Secur Saf"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"9395","DOI":"10.1016\/j.aej.2022.02.063","article-title":"A machine learning-based intrusion detection for detecting internet of things network attacks","volume":"61","author":"Kayode","year":"2022","journal-title":"Alex Eng J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1016\/j.icte.2023.03.006","article-title":"Security of internet of things (IoT) using federated learning and deep learning\u2014recent advancements, issues and prospects","volume":"9","author":"Gugueoth","year":"2023","journal-title":"ICT Express"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","article-title":"A systematic literature review for network intrusion detection system (IDS)","volume":"22","author":"Abdulganiyu","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"10852","DOI":"10.1109\/ACCESS.2022.3145007","article-title":"A hybrid approach toward efficient and accurate intrusion detection for in-vehicle networks","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s43926-023-00034-5","article-title":"Anomaly-based intrusion detection system for IoT application","volume":"3","author":"Bhavsar","year":"2023","journal-title":"Disc Inter Things"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"88","DOI":"10.47852\/bonviewJCCE2202270","article-title":"Machine learning-based intrusion detection system: an experimental comparison","volume":"2","author":"Hidayat","year":"2022","journal-title":"J Computat Cognit Eng"},{"key":"ref24","series-title":"32nd International Conference on Microelectronics (ICM)","first-page":"1","article-title":"Detecting botnet attacks in IoT environments: an optimized machine learning approach","author":"Injadat","year":"2020"},{"key":"ref25","first-page":"1","article-title":"Machine learning-enabled IoT security: open issues and challenges under advanced persistent threats","volume":"55","author":"Chen","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3939895","DOI":"10.1155\/2023\/3939895","article-title":"Industrial internet of things intrusion detection method using machine learning and optimization techniques","volume":"2023","author":"Gaber","year":"2023","journal-title":"Wirel Commun Mob Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.3390\/computers12020034","article-title":"A novel deep learning-based intrusion detection system for IoT networks","volume":"12","author":"Awajan","year":"2023","journal-title":"Computers"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","article-title":"Machine learning based intrusion detection systems for IoT applications","volume":"111","author":"Verma","year":"2020","journal-title":"Wireless Pers Commun"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"106436","DOI":"10.1016\/j.ymssp.2019.106436","article-title":"An intrusion detection framework for energy constrained IoT devices","volume":"136","author":"Arshad","year":"2020","journal-title":"Mech Syst Signal Process"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"13241","DOI":"10.1007\/s11227-023-05197-0","article-title":"EIDM: deep learning model for IoT intrusion detection systems","volume":"79","author":"Elnakib","year":"2023","journal-title":"J Supercomput"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","article-title":"Intrusion detection systems for IoT-based smart environments: a survey","volume":"7","author":"Elrawy","year":"2018","journal-title":"J Cloud Comput"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in internet of things","volume":"84","author":"Bogaz","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref33","first-page":"1","article-title":"A hybrid model for intrusion detection in IoT applications","author":"Alghamdi","year":"2022","journal-title":"Wireless Commun Mobile Comput"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/23080477.2021.1972914","article-title":"IoT-based intrusion detection systems: a review","volume":"10","author":"Mohamed","year":"2022","journal-title":"Smart Science"},{"key":"ref35","doi-asserted-by":"crossref","unstructured":"Spadaccino P, Cuomo F. Intrusion detection systems for IoT: opportunities and taxonomy. 2022. doi:10.3390\/app13095427.","DOI":"10.52953\/WNVI5792"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"5427","DOI":"10.3390\/app13095427","article-title":"An intrusion detection system using bot-IoT","volume":"13","author":"Alosaimi","year":"2023","journal-title":"Appl Sci"},{"key":"ref37","first-page":"1","article-title":"Technique for cyberattacks detection based on DNS traffic analysis","volume":"73","author":"Lysenko","year":"2022","journal-title":"Comput Sci"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/fi12030044","article-title":"RDTIDS: rules and decision tree-based intrusion detection system for internet-of-things networks","volume":"12","author":"Ferrag","year":"2020","journal-title":"Future Internet"},{"key":"ref39","first-page":"4462","article-title":"Intrusion detection techniques used for internet of things","volume":"14","author":"Bhargavi","year":"2019","journal-title":"Int J Recent Technol Eng"},{"key":"ref40","unstructured":"Bouazza A, Debbi H, Lakhlef H. Machine learning-based intrusion detection system against routing attacks in the internet of things. 2022 [cited 2025 Feb 1]. Available from: http:\/\/ceur-ws.orgISSN1613(2022):0073."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A survey of machine and deep learning methods for internet of things (IoT) security","volume":"22","author":"Al-garadi","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s43926-020-00001-4","article-title":"Role of artificial intelligence in the internet of things (IoT) cybersecurity","volume":"1","author":"Fair","year":"2021","journal-title":"Discov Internet Things"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"5941","DOI":"10.3390\/s23135941","article-title":"CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment","volume":"23","author":"Neto","year":"2023","journal-title":"Sensors"},{"key":"ref44","series-title":"2021 International Conference on Information Technology (ICIT)","first-page":"290","article-title":"Anomaly-based intrusion detection system using fuzzy logic","author":"Almseidin","year":"2021 Jul 14\u201315"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_62971\/TSP_CMC_62971.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:27:38Z","timestamp":1763342858000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062971","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}