{"id":"https://openalex.org/W4394994357","doi":"https://doi.org/10.26599/bdma.2023.9020027","title":"An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks","display_name":"An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks","publication_year":2024,"publication_date":"2024-04-22","ids":{"openalex":"https://openalex.org/W4394994357","doi":"https://doi.org/10.26599/bdma.2023.9020027"},"language":"en","primary_location":{"id":"doi:10.26599/bdma.2023.9020027","is_oa":true,"landing_page_url":"https://doi.org/10.26599/bdma.2023.9020027","pdf_url":"https://ieeexplore.ieee.org/ielx7/8254253/10506765/10506766.pdf","source":{"id":"https://openalex.org/S4210209060","display_name":"Big Data Mining and Analytics","issn_l":"2096-0654","issn":["2096-0654"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311901","host_organization_name":"Tsinghua University Press","host_organization_lineage":["https://openalex.org/P4310311901"],"host_organization_lineage_names":["Tsinghua University Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data Mining and Analytics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ieeexplore.ieee.org/ielx7/8254253/10506765/10506766.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044831669","display_name":"S. Saravanan","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Selvam Saravanan","raw_affiliation_strings":["Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":null,"display_name":"Uma Maheswari Balasubramanian","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Uma Maheswari Balasubramanian","raw_affiliation_strings":["Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Amrita School of Computing, Amrita Vishwa Vidyapeetham,Department of Computer Science and Engineering,Bengaluru,India,560035","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044831669"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":4.6979,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95238754,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"7","issue":"2","first_page":"500","last_page":"511"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7295165657997131},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6179081201553345},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.5874194502830505},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5832133293151855},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4581221342086792},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41585347056388855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3727054297924042},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32015421986579895},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.16578400135040283},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14688539505004883},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08191466331481934},{"id":"https://openalex.org/keywords/cartography","display_name":"Cartography","score":0.060742348432540894},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.054908156394958496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7295165657997131},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6179081201553345},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.5874194502830505},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5832133293151855},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4581221342086792},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41585347056388855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3727054297924042},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32015421986579895},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.16578400135040283},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14688539505004883},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08191466331481934},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.060742348432540894},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.054908156394958496}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.26599/bdma.2023.9020027","is_oa":true,"landing_page_url":"https://doi.org/10.26599/bdma.2023.9020027","pdf_url":"https://ieeexplore.ieee.org/ielx7/8254253/10506765/10506766.pdf","source":{"id":"https://openalex.org/S4210209060","display_name":"Big Data Mining and Analytics","issn_l":"2096-0654","issn":["2096-0654"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311901","host_organization_name":"Tsinghua University Press","host_organization_lineage":["https://openalex.org/P4310311901"],"host_organization_lineage_names":["Tsinghua University Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data Mining and Analytics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2a238a0ca8ac41738cf1f1c0977240e5","is_oa":true,"landing_page_url":"https://doaj.org/article/2a238a0ca8ac41738cf1f1c0977240e5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data Mining and Analytics, Vol 7, Iss 2, Pp 500-511 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.26599/bdma.2023.9020027","is_oa":true,"landing_page_url":"https://doi.org/10.26599/bdma.2023.9020027","pdf_url":"https://ieeexplore.ieee.org/ielx7/8254253/10506765/10506766.pdf","source":{"id":"https://openalex.org/S4210209060","display_name":"Big Data Mining and Analytics","issn_l":"2096-0654","issn":["2096-0654"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311901","host_organization_name":"Tsinghua University Press","host_organization_lineage":["https://openalex.org/P4310311901"],"host_organization_lineage_names":["Tsinghua University Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data Mining and Analytics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394994357.pdf","grobid_xml":"https://content.openalex.org/works/W4394994357.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W410850256","https://openalex.org/W2289463038","https://openalex.org/W2330029115","https://openalex.org/W2489873277","https://openalex.org/W2528421823","https://openalex.org/W2542459869","https://openalex.org/W2795903893","https://openalex.org/W2798145945","https://openalex.org/W2798434712","https://openalex.org/W2891929340","https://openalex.org/W2948779977","https://openalex.org/W2967236799","https://openalex.org/W3005260862","https://openalex.org/W3008932171","https://openalex.org/W3093469966","https://openalex.org/W3131534565","https://openalex.org/W3131930169","https://openalex.org/W3139478953","https://openalex.org/W3153208318","https://openalex.org/W3153970166","https://openalex.org/W3163857886","https://openalex.org/W3173515311","https://openalex.org/W3175350659","https://openalex.org/W3197159805","https://openalex.org/W3198054520","https://openalex.org/W3200219001","https://openalex.org/W3208097639","https://openalex.org/W4205088899","https://openalex.org/W4220733186","https://openalex.org/W4226125749","https://openalex.org/W4281621630","https://openalex.org/W4303449845","https://openalex.org/W4310349991","https://openalex.org/W4360930726","https://openalex.org/W6614148910","https://openalex.org/W6794006112"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W2389214306","https://openalex.org/W3031181660"],"abstract_inverted_index":{"The":[0,32,98,210,245],"current":[1],"large-scale":[2,36,137,177],"Internet":[3],"of":[4,35,69,85,93,100,113,207,222,248,260],"Things":[5],"(IoT)":[6],"networks":[7,38],"typically":[8],"generate":[9],"high-velocity":[10],"network":[11,50,139],"traffic":[12,51],"streams.":[13],"Attackers":[14],"use":[15],"IoT":[16,37,55,65,76,138,178,230],"devices":[17,66,77],"to":[18,40,46,109,165,239],"create":[19],"botnets":[20],"and":[21,61,67,90,102,160,173,198,224],"launch":[22,82],"attacks,":[23],"such":[24],"as":[25,80],"DDoS,":[26],"Spamming,":[27],"Cryptocurrency":[28],"mining,":[29],"Phishing,":[30],"etc.":[31],"service":[33],"providers":[34],"need":[39],"set":[41],"up":[42],"a":[43,150,199],"data":[44,52,151],"pipeline":[45,152],"collect":[47],"the":[48,54,63,72,123,131,166,185,189,192,196,204,208,216,242,258],"vast":[49],"from":[53,75,107,130,203,228,237],"devices,":[56],"store":[57],"it,":[58,60],"analyze":[59],"report":[62],"malicious":[64],"types":[68],"attacks.":[70],"Further,":[71],"attacks":[73,101,175],"originating":[74],"are":[78],"dynamic,":[79],"attackers":[81],"one":[83,88],"kind":[84,92],"attack":[86,94,116,124,134,168,226],"at":[87,95],"time":[89,108,172,247],"another":[91,96],"time.":[97,110],"number":[99,259],"benign":[103,223],"instances":[104,193,202,227],"also":[105,254],"vary":[106],"This":[111],"phenomenon":[112],"change":[114],"in":[115,136,145,170,176,262],"patterns":[117,135,169],"is":[118,183,213,235,253],"called":[119],"concept":[120,181],"drift.":[121],"Hence,":[122],"detection":[125],"system":[126,187],"must":[127],"learn":[128],"continuously":[129],"ever-changing":[132,167],"real-time":[133],"traffic.":[140],"To":[141],"meet":[142],"this":[143,146],"requirement,":[144],"work,":[147],"we":[148],"propose":[149],"with":[153,191,215],"Apache":[154,156,263],"Kafka,":[155],"Spark":[157,264],"structured":[158],"streaming,":[159],"MongoDB":[161],"that":[162,194],"can":[163],"adapt":[164],"real":[171],"classify":[174],"networks.":[179],"When":[180],"drift":[182,197],"detected,":[184],"proposed":[186,211,243],"retrains":[188],"classifier":[190],"cause":[195],"representative":[200],"subsample":[201],"previous":[205],"training":[206,246],"model.":[209],"approach":[212],"evaluated":[214],"latest":[217],"dataset,":[218],"IoT23,":[219],"which":[220],"consists":[221],"several":[225],"various":[229],"devices.":[231],"Attack":[232],"classification":[233],"accuracy":[234],"improved":[236],"97.8%":[238],"99.46%":[240],"by":[241,256],"system.":[244],"distributed":[249],"random":[250],"forest":[251],"algorithm":[252],"studied":[255],"varying":[257],"cores":[261],"environment.":[265]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
