{"id":"https://openalex.org/W4409686992","doi":"https://doi.org/10.32604/cmc.2025.062971","title":"ERBM: A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments","display_name":"ERBM: A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409686992","doi":"https://doi.org/10.32604/cmc.2025.062971"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.062971","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062971","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.062971","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117256555","display_name":"Arshad Mehmmod","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Arshad Mehmmod","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024638395","display_name":"Komal Batool","orcid":"https://orcid.org/0009-0001-9601-6845"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Komal Batool","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Ahthsham Sajid","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahthsham Sajid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080030634","display_name":"Muhammad Mansoor Alam","orcid":"https://orcid.org/0000-0001-5773-7140"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Mansoor Alam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078925693","display_name":"Mazliham Mohd Su\u2019ud","orcid":"https://orcid.org/0000-0001-9975-4483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mazliham MohD Su\u2019ud","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5073594482","display_name":"Inam Ullah Khan","orcid":"https://orcid.org/0000-0002-1566-6273"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Inam Ullah Khan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5117256555"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.7252,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89960286,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"83","issue":"3","first_page":"5155","last_page":"5179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9146999716758728,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7075428366661072},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6845334768295288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6682551503181458},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49919819831848145},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4439469575881958},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2590234875679016}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7075428366661072},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6845334768295288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6682551503181458},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49919819831848145},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4439469575881958},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2590234875679016}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.062971","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062971","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:shdl.mmu.edu.my:13864","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196753","display_name":"Siti Hasmah Digital Library-MMU Institutiona Repository (Multimedia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173029219","host_organization_name":"Multimedia University","host_organization_lineage":["https://openalex.org/I173029219"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.062971","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.062971","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Traditional":[0],"rule-based":[1,253],"Intrusion":[2],"Detection":[3],"Systems":[4],"(IDS)":[5],"are":[6,101],"commonly":[7],"employed":[8],"owing":[9],"to":[10,16,55,66,73,103,115,238,259],"their":[11],"simple":[12],"design":[13],"and":[14,25,41,63,78,90,149,158,180,221],"ability":[15,214],"detect":[17],"known":[18],"threats.":[19,262],"Nevertheless,":[20],"as":[21,110,142],"dynamic":[22],"network":[23,107],"traffic":[24,108],"a":[26,197,233,245],"new":[27],"degree":[28],"of":[29,119,156,186,201,252],"threats":[30],"exist":[31],"in":[32,249,257],"IoT":[33,239,261],"environments,":[34],"these":[35,57],"systems":[36],"do":[37],"not":[38],"perform":[39],"well":[40],"have":[42],"elevated":[43],"false":[44,206],"positive":[45],"rates\u2014consequently":[46],"decreasing":[47],"detection":[48,128,161,178,199],"accuracy.":[49],"In":[50],"this":[51,85],"study,":[52],"we":[53],"try":[54],"overcome":[56],"restrictions":[58],"by":[59,93,130],"employing":[60],"fuzzy":[61,95,123,219],"logic":[62,124,220],"machine":[64,138,226],"learning":[65,139,227],"develop":[67],"an":[68,222],"Enhanced":[69],"Rule-Based":[70],"Model":[71],"(ERBM)":[72],"classify":[74,104],"the":[75,106,120,160,184,194,209,213,229,250],"packets":[76],"better":[77],"identify":[79],"intrusions.":[80],"The":[81],"ERBM":[82,187,195,230],"developed":[83],"for":[84,135,215],"approach":[86,237],"improves":[87],"data":[88,132],"preprocessing":[89],"feature":[91],"selections":[92],"utilizing":[94],"logic,":[96],"where":[97],"three":[98],"membership":[99],"functions":[100],"created":[102],"all":[105],"features":[109],"low,":[111],"medium,":[112],"or":[113],"high":[114],"remain":[116],"situationally":[117],"aware":[118],"environment.":[121],"Such":[122],"sets":[125],"produce":[126],"adaptive":[127],"rules":[129],"reducing":[131],"uncertainty.":[133],"Also,":[134],"further":[136],"classification,":[137],"classifiers":[140],"such":[141],"Decision":[143],"Tree":[144],"(DT),":[145],"Random":[146],"Forest":[147],"(RF),":[148],"Neural":[150],"Networks":[151],"(NN)":[152],"learn":[153],"complex":[154],"ways":[155],"attacks":[157],"make":[159],"process":[162],"more":[163],"precise.":[164],"A":[165],"thorough":[166],"performance":[167],"evaluation":[168],"using":[169],"different":[170],"metrics,":[171],"including":[172],"accuracy,":[173],"precision,":[174],"recall,":[175],"F1":[176],"Score,":[177],"rate,":[179,182],"false-positive":[181],"verifies":[183],"supremacy":[185],"over":[188],"classical":[189],"IDS.":[190],"Under":[191],"extensive":[192],"experiments,":[193],"enables":[196],"remarkable":[198],"rate":[200],"99%":[202],"with":[203,218],"considerably":[204],"fewer":[205],"positives":[207],"than":[208],"conventional":[210],"models.":[211],"Integrating":[212],"uncertain":[216],"reasoning":[217],"adaptable":[223],"component":[224],"via":[225],"solutions,":[228],"system":[231],"provides":[232],"unique,":[234],"scalable,":[235],"data-driven":[236],"intrusion":[240],"detection.":[241],"This":[242],"research":[243],"presents":[244],"major":[246],"enhancement":[247],"initiative":[248],"context":[251],"IDS,":[254],"introducing":[255],"improvements":[256],"accuracy":[258],"evolving":[260]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
