{"id":"https://openalex.org/W4413404027","doi":"https://doi.org/10.1007/s40747-025-02001-9","title":"A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation","display_name":"A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation","publication_year":2025,"publication_date":"2025-08-21","ids":{"openalex":"https://openalex.org/W4413404027","doi":"https://doi.org/10.1007/s40747-025-02001-9"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-025-02001-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-02001-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-02001-9.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-02001-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009940267","display_name":"Md. Alamgir Hossain","orcid":"https://orcid.org/0000-0001-5120-2911"},"institutions":[{"id":"https://openalex.org/I138617543","display_name":"State University of Bangladesh","ror":"https://ror.org/01g14tq52","country_code":"BD","type":"education","lineage":["https://openalex.org/I138617543"]},{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md. Alamgir Hossain","raw_affiliation_strings":["Department of Computer Science and Engineering, State University of Bangladesh, Dhaka, 1461, Bangladesh","Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, State University of Bangladesh, Dhaka, 1461, Bangladesh","institution_ids":["https://openalex.org/I138617543"]},{"raw_affiliation_string":"Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sadman Saif","orcid":null},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Sadman Saif","raw_affiliation_strings":["Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100638790","display_name":"Md Saiful Islam","orcid":"https://orcid.org/0000-0002-5690-5971"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md. Saiful Islam","raw_affiliation_strings":["Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Institute of Information and Communication Technology (IICT), Bangladesh University of Engineering and Technology (BUET), Dhaka, 1000, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009940267"],"corresponding_institution_ids":["https://openalex.org/I138617543","https://openalex.org/I183697816"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":15.2371,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.98976612,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"11","issue":"10","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7516022324562073},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7410799264907837},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.7195789813995361},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6248787045478821},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5459181666374207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34387558698654175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.328323096036911},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1567077338695526},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10187029838562012}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7516022324562073},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7410799264907837},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.7195789813995361},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6248787045478821},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5459181666374207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34387558698654175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.328323096036911},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1567077338695526},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10187029838562012}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-025-02001-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-02001-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-02001-9.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c2d81e61611f483fbc86b53f872563cd","is_oa":true,"landing_page_url":"https://doaj.org/article/c2d81e61611f483fbc86b53f872563cd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 11, Iss 10, Pp 1-23 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-025-02001-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-02001-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-02001-9.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413404027.pdf","grobid_xml":"https://content.openalex.org/works/W4413404027.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W2799758613","https://openalex.org/W3013100408","https://openalex.org/W3042397424","https://openalex.org/W3101185229","https://openalex.org/W3122864121","https://openalex.org/W3129339224","https://openalex.org/W3171908901","https://openalex.org/W3173969732","https://openalex.org/W3201440045","https://openalex.org/W3204183477","https://openalex.org/W4205261415","https://openalex.org/W4206470901","https://openalex.org/W4210629969","https://openalex.org/W4225916836","https://openalex.org/W4280507621","https://openalex.org/W4283369124","https://openalex.org/W4288073864","https://openalex.org/W4294691673","https://openalex.org/W4296179092","https://openalex.org/W4303022566","https://openalex.org/W4312429596","https://openalex.org/W4312494597","https://openalex.org/W4319067227","https://openalex.org/W4323066047","https://openalex.org/W4323338485","https://openalex.org/W4382793227","https://openalex.org/W4383724250","https://openalex.org/W4385234157","https://openalex.org/W4385806329","https://openalex.org/W4386010817","https://openalex.org/W4387870047","https://openalex.org/W4389236267","https://openalex.org/W4390708694","https://openalex.org/W4391708263","https://openalex.org/W4391883051","https://openalex.org/W4391992139","https://openalex.org/W4392719416","https://openalex.org/W4394691859","https://openalex.org/W4394712928","https://openalex.org/W4398250081","https://openalex.org/W4399426579","https://openalex.org/W4400574640","https://openalex.org/W4401942747","https://openalex.org/W4402661220","https://openalex.org/W4403840732","https://openalex.org/W4405498435","https://openalex.org/W4405601732","https://openalex.org/W4406704853","https://openalex.org/W4408285853","https://openalex.org/W4408908660","https://openalex.org/W6925304634"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W1989286518","https://openalex.org/W2945572725","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"The":[0],"exponential":[1],"growth":[2],"of":[3,6,26,191],"the":[4,20,47,117,130,189],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"introduced":[10],"new":[11],"security":[12,190],"vulnerabilities,":[13],"particularly":[14],"from":[15],"botnet":[16,137,155,195],"attacks":[17],"that":[18,128,146],"exploit":[19],"heterogeneity":[21],"and":[22,46,53,110,174,183],"limited":[23],"processing":[24],"capabilities":[25],"IoT":[27,39,69,94,169,192],"devices.":[28],"Traditional":[29],"centralized":[30],"intrusion":[31,70],"detection":[32],"models":[33],"are":[34],"ineffective":[35],"in":[36,159],"protecting":[37],"distributed":[38],"environments":[40],"due":[41],"to":[42,85,106,133],"data":[43,91,170],"privacy":[44,175],"concerns":[45],"challenges":[48],"posed":[49],"by":[50],"non-IID":[51,140,172],"(non-independent":[52],"identically":[54],"distributed)":[55],"data.":[56,142],"In":[57],"response,":[58],"we":[59],"propose":[60],"a":[61,79,124,180],"novel,":[62],"privacy-preserving":[63],"federated":[64,185],"learning":[65,186],"framework":[66,73,178],"tailored":[67],"for":[68,81],"detection.":[71],"Our":[72],"leverages":[74],"SHAP":[75,104],"(Shapley":[76],"Additive":[77],"Explanations),":[78],"technique":[80],"computing":[82],"feature":[83,108,114,126],"importance,":[84],"provide":[86],"interpretable":[87],"insights":[88],"while":[89,164],"maintaining":[90],"privacy.":[92,166],"Each":[93],"client":[95,141],"trains":[96],"locally":[97],"on":[98],"its":[99],"unique,":[100],"heterogeneous":[101],"data,":[102,173],"computes":[103],"values":[105],"quantify":[107],"relevance,":[109],"shares":[111],"only":[112],"distilled":[113],"knowledge":[115,122],"with":[116],"central":[118],"server.":[119],"This":[120],"aggregated":[121],"forms":[123],"global":[125,131],"profile":[127],"enables":[129],"model":[132,148],"accurately":[134],"detect":[135],"diverse":[136],"intrusions":[138],"across":[139,153],"Experimental":[143],"results":[144],"demonstrate":[145],"our":[147,177],"achieves":[149],"near-perfect":[150],"accuracy":[151],"(99.99%)":[152],"various":[154],"types,":[156],"showcasing":[157],"robustness":[158],"identifying":[160],"botnet-specific":[161],"attack":[162],"patterns":[163],"preserving":[165],"By":[167],"addressing":[168],"heterogeneity,":[171],"concerns,":[176],"provides":[179],"scalable,":[181],"interpretable,":[182],"privacy-compliant":[184],"solution,":[187],"advancing":[188],"networks":[193],"against":[194],"intrusions.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
