{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:41:44Z","timestamp":1763142104512,"version":"build-2065373602"},"reference-count":74,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T00:00:00Z","timestamp":1689206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European University of Atlantic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.<\/jats:p>","DOI":"10.3390\/s23146379","type":"journal-article","created":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T00:49:30Z","timestamp":1689295770000},"page":"6379","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System"],"prefix":"10.3390","volume":"23","author":[{"given":"Urooj","family":"Akram","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur 63100, Punjab, Pakistan"}]},{"given":"Wareesa","family":"Sharif","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur 63100, Punjab, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1170-6335","authenticated-orcid":false,"given":"Mobeen","family":"Shahroz","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur 63100, Punjab, Pakistan"}]},{"given":"Muhammad Faheem","family":"Mushtaq","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, The Islamia University of Bahawalpur, Bahawalpur 63100, Punjab, Pakistan"}]},{"given":"Daniel Gavilanes","family":"Aray","sequence":"additional","affiliation":[{"name":"Higher Polytechnic School, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Department of Projects, Universidade Internacional do Cuanza, Cuito EN250, Bi\u00e9, Angola"},{"name":"Research Group on Foods, Nutritional Biochemistry and Health, Fundaci\u00f3n Universitaria Internacional de Colombia, Bogot\u00e1 11131, Colombia"}]},{"given":"Ernesto Bautista","family":"Thompson","sequence":"additional","affiliation":[{"name":"Higher Polytechnic School, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Universidad Internacional Iberoamericana Arecibo, Puerto Rico, PR 00613, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-7720","authenticated-orcid":false,"given":"Isabel de la Torre","family":"Diez","sequence":"additional","affiliation":[{"name":"Department of Signal Theory, Communications and Telematics Engineering, Unviersity of Valladolid, Paseo de Bel\u00e9n, 15, 47011 Valladolid, Spain"}]},{"given":"Sirojiddin","family":"Djuraev","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, New Uzbekistan University, Tashkent 100007, Uzbekistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"101728","DOI":"10.1016\/j.scs.2019.101728","article-title":"Internet of Things: Evolution and technologies from a security perspective","volume":"54","author":"Ande","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103766","DOI":"10.1016\/j.micpro.2020.103766","article-title":"Real time monitoring of medical images and nursing intervention after heart valve replacement","volume":"82","author":"Xing","year":"2021","journal-title":"Microprocess. Microsyst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Wang, J., Sun, B., and Zhu, Z. (2023). Biochip Systems for Intelligence and Integration. Systems, 11.","DOI":"10.3390\/systems11010043"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"12039","DOI":"10.1088\/1757-899X\/648\/1\/012039","article-title":"Design of hardware module for the vehicle condition monitoring system based on the internet of things","volume":"648","author":"Fahmi","year":"2019","journal-title":"IOP Conf. Ser."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"108350","DOI":"10.1016\/j.compeleceng.2022.108350","article-title":"A metric focused performance assessment of fog computing environments: A critical review","volume":"103","author":"Rathi","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"105047","DOI":"10.1016\/j.resconrec.2020.105047","article-title":"Opportunities and challenges in IoT-enabled circular business model implementation\u2014A case study","volume":"162","author":"Ingemarsdotter","year":"2020","journal-title":"Resour. Conserv. Recycl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ghorbani, H.R., and Ahmadzadegan, M.H. (2017, January 13\u201314). Security challenges in internet of things: Survey. Proceedings of the 2017 IEEE Conference on Wireless Sensors (ICWiSe), Miri, Malaysia.","DOI":"10.1109\/ICWISE.2017.8267153"},{"key":"ref_8","first-page":"615","article-title":"Vulnerabilities in IoT Devices for Smart Home Environment","volume":"Volume 1","author":"Costa","year":"2019","journal-title":"Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1007\/s11276-020-02535-5","article-title":"Security of internet of things based on cryptographic algorithms: A survey","volume":"27","author":"Mousavi","year":"2021","journal-title":"Wirel. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.gltp.2021.08.045","article-title":"Wireless Sensor Networks: Active and Passive attacks Vulnerabilities and Countermeasures","volume":"2","author":"Keerthika","year":"2021","journal-title":"Glob. Transit. Proc."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","article-title":"Consumer, commercial and industrial iot (in) security: Attack taxonomy and case studies","volume":"9","author":"Xenofontos","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","article-title":"UIDS: A unified intrusion detection system for IoT environment","volume":"14","author":"Kumar","year":"2021","journal-title":"Evol. Intell."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","article-title":"Attack and anomaly detection in iot networks using machine learning techniques: A review","volume":"9","author":"Haji","year":"2021","journal-title":"Asian J. Res. Comput. Sci."},{"key":"ref_14","unstructured":"Ghasemi, M., Saadaat, M., and Ghollasi, O. (2019). Fundamental Research in Electrical Engineering, Springer."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","article-title":"Consumer IoT: Security vulnerability case studies and solutions","volume":"9","author":"Alladi","year":"2020","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Varga, P., Plosz, S., Soos, G., and Hegedus, C. (June, January 31). Security threats and issues in automation IoT. Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway.","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"ref_17","first-page":"8","article-title":"Internet of Things: A survey on the security of IoT frameworks","volume":"38","author":"Ammar","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_18","unstructured":"Gupta, S.S., Khan, M.S., and Sethi, T. (2019, January 12\u201314). Latest Trends in Security, Privacy and Trust in IOT. Proceedings of the 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Emami-Naeini, P., Dixon, H., Agarwal, Y., and Cranor, L.F. (2019, January 4\u20139). Exploring how privacy and security factor into IoT device purchase behavior. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland.","DOI":"10.1145\/3290605.3300764"},{"key":"ref_20","unstructured":"Chen, L., Hu, W., Jamieson, K., Chen, X., Fang, D., and Gummeson, J. (2021, January 12\u201314). Pushing the physical limits of iot devices with programmable metasurfaces. Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21), Virtual."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, D., Peng, W., Deng, W., and Gai, F. (August, January 30). A blockchain-based authentication and security mechanism for iot. Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China.","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"100357","DOI":"10.1016\/j.cosrev.2020.100357","article-title":"Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation","volume":"39","author":"Tama","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_23","first-page":"11055","article-title":"Internet of things architecture: Current challenges and future direction of research","volume":"12","author":"Burhanuddin","year":"2017","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_24","unstructured":"Farhan, L., and Kharel, R. (2019). Modern Sensing Technologies, Springer."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"100318","DOI":"10.1016\/j.cosrev.2020.100318","article-title":"Big data and IoT-based applications in smart environments: A systematic review","volume":"39","author":"Hajjaji","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_26","first-page":"36931","article-title":"An approach to adding simple interface as security gateway architecture for IoT device","volume":"81","author":"Ahmad","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"108040","DOI":"10.1016\/j.comnet.2021.108040","article-title":"A survey on IoT platforms: Communication, security, and privacy perspectives","volume":"192","author":"Babun","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.future.2020.09.006","article-title":"SDN-based cyber defense: A survey","volume":"115","author":"Yurekten","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3011","DOI":"10.1007\/s10586-021-03309-0","article-title":"A novel mechanism to handle address spoofing attacks in SDN based IoT","volume":"24","author":"Aldabbas","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"e4515","DOI":"10.1002\/dac.4515","article-title":"IoT-based platform for environment data sharing in smart cities","volume":"34","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TII.2021.3089462","article-title":"Man in the Middle Attack Mitigation in Internet of Medical Things","volume":"18","author":"Salem","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_32","first-page":"102853","article-title":"FUPE: A security driven task scheduling approach for SDN-based IoT\u2014Fog networks","volume":"60","author":"Javanmardi","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Shafi, Q., Qaisar, S., and Basit, A. (2019, January 1\u20134). Software Defined Machine Learning Based Anomaly Detection in Fog Based IoT Network. Proceedings of the International Conference on Computational Science and Its Applications, St. Petersburg, Russia.","DOI":"10.1007\/978-3-030-24305-0_45"},{"key":"ref_34","unstructured":"Ahmed, S.M., and Rajput, A. (2020). Innovation in Health Informatics, Elsevier."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102352","DOI":"10.1016\/j.cose.2021.102352","article-title":"Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks","volume":"108","author":"Anthi","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"12031","DOI":"10.1088\/1757-899X\/1107\/1\/012031","article-title":"Insider Threat Detection using Binary Classification Algorithms","volume":"1107","author":"Oladimeji","year":"2021","journal-title":"IOP Conf. Ser."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., and Feamster, N. (2018, January 24). Machine learning ddos detection for consumer internet of things devices. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Junejo, K.N., and Goh, J. (2016, January 30). Behaviour-based attack detection and classification in cyber physical systems using machine learning. Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, Xi\u2019an, China.","DOI":"10.1145\/2899015.2899016"},{"key":"ref_39","first-page":"100805","article-title":"Hybrid Bayesian optimization hypertuned catboost approach for malicious access and anomaly detection in IoT nomalyframework","volume":"36","author":"Nayak","year":"2022","journal-title":"Sustain. Comput."},{"key":"ref_40","first-page":"1283472","article-title":"Review of Recent Detection Methods for HTTP DDoS Attack","volume":"2019","author":"Jaafar","year":"2019","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/cpe.5402","article-title":"Machine learning algorithms to detect DDoS attacks in SDN","volume":"32","author":"Santos","year":"2020","journal-title":"Concurr. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.jnca.2018.03.030","article-title":"User behavior analytics-based classification of application layer HTTP-GET flood attacks","volume":"112","author":"Singh","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13635-018-0081-z","article-title":"HADEC: Hadoop-based live DDoS detection framework","volume":"2018","author":"Hameed","year":"2018","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"9463653","DOI":"10.1155\/2018\/9463653","article-title":"A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack","volume":"2018","author":"Zhao","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.aci.2017.10.003","article-title":"HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm","volume":"15","author":"Sreeram","year":"2019","journal-title":"Appl. Comput. Inform."},{"key":"ref_46","first-page":"825","article-title":"A deep learning based intelligent framework to mitigate DDoS attack in fog environment","volume":"34","author":"Priyadarshini","year":"2019","journal-title":"J. King Saud Univ."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TIFS.2020.3017928","article-title":"Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection","volume":"16","author":"Praseed","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_48","first-page":"2677","article-title":"A survey on cyber security threats in IoT-enabled maritime industry","volume":"24","author":"Ashraf","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., and Rasool, N. (2022). A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics, 11.","DOI":"10.3390\/electronics11040667"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"124379","DOI":"10.1109\/ACCESS.2019.2937347","article-title":"Cyber security threats detection in internet of things using deep learning approach","volume":"7","author":"Ullah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_51","first-page":"230","article-title":"Comparative analysis of serial decision tree classification algorithms","volume":"3","author":"Anyanwu","year":"2009","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1007\/s10618-013-0304-3","article-title":"A time-efficient breadth-first level-wise lattice-traversal algorithm to discover rare itemsets","volume":"28","author":"Troiano","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"3363","DOI":"10.1103\/PhysRevLett.71.3363","article-title":"Influence of gap extrema on the tunneling conductance near an impurity in an anisotropic superconductor","volume":"71","author":"Byers","year":"1993","journal-title":"Phys. Rev. Lett."},{"key":"ref_54","unstructured":"Phyu, T.N. (2009, January 18\u201320). Survey of classification techniques in data mining. Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Kulkarni, V.Y., and Sinha, P.K. (2012, January 18\u201320). Pruning of random forest classifiers: A survey and future directions. Proceedings of the 2012 International Conference on Data Science & Engineering (ICDSE), Cochin, India.","DOI":"10.1109\/ICDSE.2012.6282329"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_57","unstructured":"Breiman, L. (1994). Bagging Predictors (Technical Report 421), University of California."},{"key":"ref_58","unstructured":"Lewis, D.D. (1998). European Conference on Machine Learning, Springer."},{"key":"ref_59","unstructured":"Domingos, P., and Pazzani, M. (1996, January 3\u20136). Beyond independence: Conditions for the optimality of the simple bayesian classifier. Proceedings of the 13th International Conference on Machine Learning, Bari, Italy."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.eswa.2005.07.019","article-title":"An effective refinement strategy for KNN text classifier","volume":"30","author":"Tan","year":"2006","journal-title":"Expert Syst. Appl."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2016.06.005","article-title":"A multiobjective weighted voting ensemble classifier based on differential evolution algorithm for text sentiment classification","volume":"62","author":"Onan","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"8481452","DOI":"10.1155\/2022\/8481452","article-title":"ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD","volume":"2022","author":"Esmaeili","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_63","first-page":"12043","article-title":"Network intrusion detection: A comparative study of four classifiers using the NSL-KDD and KDD\u201999 datasets","volume":"2161","author":"Devarakonda","year":"2022","journal-title":"Ournal Phys."},{"key":"ref_64","first-page":"1848","article-title":"A Detailed Analysis on NSL-KDD Dataset using various Machine Learning Techniques for Intrusion Detection","volume":"2","author":"Revathi","year":"2013","journal-title":"Int. J. Eng. Res. Technol. IJERT"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","article-title":"Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TNSE.2020.3004312","article-title":"Aesmote: Adversarial reinforcement learning with smote for anomaly detection","volume":"8","author":"Ma","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s10489-020-01886-y","article-title":"I-SiamIDS: An improved Siam-IDS for handling class imbalance in network-based intrusion detection systems","volume":"51","author":"Bedi","year":"2021","journal-title":"Appl. Intell."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"95864","DOI":"10.1109\/ACCESS.2020.2994931","article-title":"TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection","volume":"8","author":"Chkirbene","year":"2020","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep Learning Approach for Intelligent Intrusion Detection System","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","article-title":"An Adaptive Ensemble Machine Learning Model for Intrusion Detection","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.comnet.2019.05.013","article-title":"Adversarial environment reinforcement learning algorithm for intrusion detection","volume":"159","author":"Caminero","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Abrar, I., Ayub, Z., Masoodi, F., and Bamhdi, A.M. (2020, January 10\u201312). A machine learning approach for intrusion detection system on NSL-KDD dataset. Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India.","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"ref_73","first-page":"465","article-title":"Analysis of Intrusion Detection Systems in UNSW-NB15 and NSL-KDD Datasets with Machine Learning Algorithms","volume":"12","author":"Fuat","year":"2023","journal-title":"Bitlis Eren Univ. Bilim. Derg."},{"key":"ref_74","unstructured":"Siva Shankar, S., Hung, B.T., Chakrabarti, P., Chakrabarti, T., and Parasa, G. (2023). Education and Information Technologies, Springer."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/14\/6379\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:12:24Z","timestamp":1760127144000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/14\/6379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,13]]},"references-count":74,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["s23146379"],"URL":"https:\/\/doi.org\/10.3390\/s23146379","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,7,13]]}}}