{"id":"https://openalex.org/W7082632269","doi":"https://doi.org/10.1155/int/8884584","title":"IoT Intrusion Detection: Implementing a Dual\u2010Layered Security Approach","display_name":"IoT Intrusion Detection: Implementing a Dual\u2010Layered Security Approach","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7082632269","doi":"https://doi.org/10.1155/int/8884584"},"language":"en","primary_location":{"id":"doi:10.1155/int/8884584","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8884584","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8884584","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8884584","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Erdal \u00d6zdo\u011fan","orcid":"https://orcid.org/0000-0002-3339-0493"},"institutions":[{"id":"https://openalex.org/I131835042","display_name":"Bursa Uluda\u011f \u00dcni\u0307versi\u0307tesi\u0307","ror":"https://ror.org/03tg3eb07","country_code":"TR","type":"education","lineage":["https://openalex.org/I131835042"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Erdal \u00d6zdo\u011fan","raw_affiliation_strings":["Department of Management Information Systems ,  I\u0307nego\u0308l Faculty of Business Administration ,  Bursa Uludag University ,  Bursa ,  16400 ,  Tu\u0308rkiye ,  uludag.edu.tr"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems ,  I\u0307nego\u0308l Faculty of Business Administration ,  Bursa Uludag University ,  Bursa ,  16400 ,  Tu\u0308rkiye ,  uludag.edu.tr","institution_ids":["https://openalex.org/I131835042"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Onur Ceran","orcid":"https://orcid.org/0000-0003-2147-0506"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Onur Ceran","raw_affiliation_strings":["Department of Management Information Systems ,  Faculty of Applied Sciences ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems ,  Faculty of Applied Sciences ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mevl\u00fct Uysal","orcid":"https://orcid.org/0000-0002-6934-4421"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mevl\u00fct Uysal","raw_affiliation_strings":["Department of Management Information Systems ,  Faculty of Applied Sciences ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems ,  Faculty of Applied Sciences ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr","institution_ids":["https://openalex.org/I95634034"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mutlu Tahsin \u00dcst\u00fcnda\u011f","orcid":"https://orcid.org/0000-0001-6198-2819"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mutlu Tahsin \u00dcst\u00fcnda\u011f","raw_affiliation_strings":["Department of Computer Education and Instructional Technologies ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr"],"affiliations":[{"raw_affiliation_string":"Department of Computer Education and Instructional Technologies ,  Gazi University ,  Ankara ,  06560 ,  Tu\u0308rkiye ,  gazi.edu.tr","institution_ids":["https://openalex.org/I95634034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I131835042"],"apc_list":{"value":2500,"currency":"USD","value_usd":2500},"apc_paid":{"value":2500,"currency":"USD","value_usd":2500},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69874667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.660099983215332,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.660099983215332,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.023900000378489494,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.01979999989271164,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7544000148773193},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5877000093460083},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.5688999891281128},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5331000089645386},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5085999965667725},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.461899995803833},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.43230000138282776},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.43149998784065247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8141999840736389},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7544000148773193},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5877000093460083},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.5688999891281128},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5085999965667725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47279998660087585},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.461899995803833},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.43230000138282776},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.43149998784065247},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4189999997615814},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37599998712539673},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.35899999737739563},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3400000035762787},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3353999853134155},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2847000062465668},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2678999900817871},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.25679999589920044}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/int/8884584","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8884584","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8884584","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:612a1fba-b0c1-4602-8333-9322cf32aecd","is_oa":false,"landing_page_url":"https://avesis.uludag.edu.tr/publication/details/612a1fba-b0c1-4602-8333-9322cf32aecd/oai","pdf_url":null,"source":{"id":"https://openalex.org/S7407055210","display_name":"Bursa Uludag University - AVESIS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1155/int/8884584","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8884584","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8884584","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.666724681854248}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7082632269.pdf","grobid_xml":"https://content.openalex.org/works/W7082632269.grobid-xml"},"referenced_works_count":79,"referenced_works":["https://openalex.org/W1528741131","https://openalex.org/W1612694023","https://openalex.org/W2042670859","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2486588411","https://openalex.org/W2625602624","https://openalex.org/W2740755977","https://openalex.org/W2905155550","https://openalex.org/W2999585430","https://openalex.org/W3009110429","https://openalex.org/W3009422166","https://openalex.org/W3010653946","https://openalex.org/W3014810737","https://openalex.org/W3015246755","https://openalex.org/W3088067349","https://openalex.org/W3109725889","https://openalex.org/W3162195744","https://openalex.org/W3176886883","https://openalex.org/W3180273110","https://openalex.org/W3190323067","https://openalex.org/W3197983285","https://openalex.org/W3203436613","https://openalex.org/W3204162860","https://openalex.org/W3204466840","https://openalex.org/W3209272920","https://openalex.org/W4205136287","https://openalex.org/W4206309573","https://openalex.org/W4212859211","https://openalex.org/W4214945983","https://openalex.org/W4220991692","https://openalex.org/W4221120298","https://openalex.org/W4283205402","https://openalex.org/W4285344458","https://openalex.org/W4311089294","https://openalex.org/W4312747208","https://openalex.org/W4313650586","https://openalex.org/W4313654696","https://openalex.org/W4315562685","https://openalex.org/W4323050995","https://openalex.org/W4353090637","https://openalex.org/W4385723714","https://openalex.org/W4386207859","https://openalex.org/W4386590181","https://openalex.org/W4387806320","https://openalex.org/W4388229168","https://openalex.org/W4388232683","https://openalex.org/W4388567472","https://openalex.org/W4388866002","https://openalex.org/W4389201117","https://openalex.org/W4389477519","https://openalex.org/W4390547141","https://openalex.org/W4390738702","https://openalex.org/W4390755438","https://openalex.org/W4391481650","https://openalex.org/W4391791505","https://openalex.org/W4392029839","https://openalex.org/W4392399462","https://openalex.org/W4392719416","https://openalex.org/W4392826394","https://openalex.org/W4392908661","https://openalex.org/W4393084793","https://openalex.org/W4393089627","https://openalex.org/W4393217316","https://openalex.org/W4393861007","https://openalex.org/W4394677549","https://openalex.org/W4395091182","https://openalex.org/W4396754479","https://openalex.org/W4396805988","https://openalex.org/W4396877881","https://openalex.org/W4398198133","https://openalex.org/W4400508553","https://openalex.org/W4400856174","https://openalex.org/W4404618093","https://openalex.org/W4405284942","https://openalex.org/W4407916980","https://openalex.org/W4408190310","https://openalex.org/W4409172933","https://openalex.org/W4409912024"],"related_works":[],"abstract_inverted_index":{"The":[0,51,101,159],"proliferation":[1],"of":[2,4,34,70,108,111,115,125,155,162,179,188,199],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7],"has":[8],"significantly":[9],"increased":[10],"the":[11,29,55,67,75,118,131,152,177,180,186,197],"attack":[12,157],"surface,":[13],"making":[14],"IoT":[15,35,49,194],"security":[16],"a":[17,42,71,105,189],"critical":[18],"concern.":[19],"Traditional":[20],"intrusion":[21,44],"detection":[22,45,139],"systems":[23],"often":[24],"fall":[25],"short":[26],"in":[27,193],"addressing":[28],"complex":[30],"and":[31,99,113,128],"staged":[32,190],"nature":[33],"attacks.":[36,88],"In":[37,74,117],"this":[38,163],"study,":[39],"we":[40,121],"propose":[41],"dual\u2010layered":[43],"system":[46],"to":[47,60,84,166,204],"enhance":[48],"security.":[50,207],"first":[52],"layer":[53],"employs":[54],"extreme":[56],"gradient":[57],"boosting":[58],"algorithm":[59],"detect":[61,168],"reconnaissance":[62,148,169],"attacks,":[63,149],"which":[64],"are":[65],"typically":[66],"initial":[68],"stage":[69],"multistage":[72],"cyberattack.":[73],"second":[76,119],"layer,":[77],"an":[78],"artificial":[79],"neural":[80],"network":[81],"is":[82,91,165],"utilized":[83],"classify":[85],"various":[86],"IoT\u2010specific":[87],"Our":[89,183],"model":[90,103,164],"evaluated":[92],"using":[93],"three":[94],"benchmark":[95],"datasets:":[96],"UNSW\u2010NB15,":[97],"BoT\u2010IoT,":[98],"IoT\u2010ID20.":[100],"proposed":[102],"demonstrates":[104],"first\u2010stage":[106],"accuracy":[107,123,140],"99.98%,":[109],"sensitivity":[110],"99.14%,":[112],"specificity":[114],"94.47%.":[116],"stage,":[120],"achieved":[122],"rates":[124],"96.97%,":[126],"99.99%,":[127],"98.70%":[129],"across":[130],"datasets.":[132],"This":[133],"two\u2010stage":[134],"approach":[135],"not":[136],"only":[137],"improves":[138],"but":[141],"also":[142],"ensures":[143],"early":[144],"intervention":[145],"by":[146],"identifying":[147],"thereby":[150,175],"reducing":[151,176],"potential":[153],"impact":[154],"subsequent":[156],"stages.":[158],"primary":[160],"objective":[161],"efficiently":[167],"attacks":[170],"with":[171],"minimal":[172],"resource":[173],"consumption,":[174],"workload":[178],"ANN":[181],"model.":[182],"findings":[184],"underscore":[185],"importance":[187],"defense":[191],"mechanism":[192],"networks,":[195],"leveraging":[196],"strengths":[198],"different":[200],"machine":[201],"learning":[202],"algorithms":[203],"provide":[205],"robust":[206]},"counts_by_year":[],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2025-10-10T00:00:00"}
