Submitted:
25 March 2025
Posted:
26 March 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- To assess the efficacy of an Intrusion Detection System utilizing cutting-edge Machine Learning methodologies, Federated Learning for decentralized training, and Explainable Artificial Intelligence for enhanced interpretability and transparency.
- To minimize computational overhead by utilizing Federated Learning, which allows decentralized data processing and eliminates the need for central data aggregation.
- To reduce the dangers of single points of failure and centralized data breaches by implementing a distributed, node-based architecture in Federated Learning.
- To ensure the reliability and trustworthiness of IDS predictions by employing Explainable AI, which provides insights into model decisions and fosters greater user trust in automated systems.
2. Literature Review
3. Methodology
3.1. Dataset Compilation
- Distributed Denial of Service (DDoS): Large-scale flooding assaults meant to harm multiple IoT gadgets simultaneously to exhaust computational resources and disrupt network availability.
- Denial of Service (DoS): Single-source attack tactics designed to overwhelm a specific IoT device, making it unresponsive to valid queries.
- Reconnaissance (Recon): Passive and active network scanning techniques are used to obtain information on vulnerable IoT devices, services, and network setups.
- Web-based Attacks: Exploitation of IoT web interfaces using security holes in IoT web interfaces, including SQL infiltration, command insertion, and cross- website scripting to gain unauthorized access.
- Brute Force Attacks: Systematic password-guessing attacks targeting IoT authentication mechanisms to compromise credentials and gain illicit control over devices.
- Spoofing Attacks: Identity forging techniques, such as ARP and IP spoofing, are used to masquerade as legitimate IoT organizations in order to eavesdrop or manipulate communications.
- Mirai-based Attacks: Malware-driven attacks use the Mirai botnet to exploit vulnerabilities in IoT device security, allowing for large-scale infections and subsequent coordinated cyberattacks.
3.2. Data Investigation & Pre-Processing
3.2.1. Data Cleaning
3.2.2. Data Type Correcting
-
Data Standardizing : Standardizing the data is a transformation process that increases the integrity and quality of the data that you can use in future calculations. For this study, we used Z-index standardization 1. This method normalizes the data to have zero mean and unit variance.Here:
- Z denotes the standardised merit,
- X signifies the initial data instance,
- represents the mean value of the data,
- indicates the standard deviation of the results.
- Categorical Encoding : Any machine learning algorithm requires numerical input to perform mathematical operations, so categorical encoding converts categorical data, which contains arbitrary labels or discrete components, into a numerical format. For the encoding technique, we used label encoding in this study. Unlike one hot encoding, label encoding preserves the ordinal nature of categorical variables, allowing for interaction between dummy variables while providing meaningful numeric representation of the synonyms. Treats Categorical Features as a variable to keep the categorical variables interpretability and thus helps in efficient data processing
3.2.3. Class-Conversion
3.2.4. Dataset Splitting
3.3. Proposed Framework
- I
-
FedXAIIDS: The proposed Federated Learning (FL) model for intrusion detection leverages a distributed architecture, incorporating the devices attached to the local end. These gadgets regionally implement the frameworks on their particular dataset. Later the computing device at the server end integrates these trained schemes. For this study, the CICIoT2023 dataset was distributed across four clients to simulate a federated environment. The following stages define the operation of the proposed model:
- (a)
- Initialization : In FL, initialization implies the procedure of establishing the initial universal model prior to the commencement with instruction across various client endpoints. A centralised computer establishes a global architecture and disseminates it to all collaborating peers. Upon acquiring the global framework each client initiates local training utilising their specific data.
- (b)
-
Local Model Training : Locally model development in FL denotes the procedure whereby every collaborating client (e.g., smartphone or tablet edge nodes) autonomously trains a replica of the global framework on its own dataset prior to transmitting updates to the central server. Every client develops a distinct ANN architecture and explains its results utilising SHAP. ANN is modelled after the architecture of the human brain, utilising layers of interconnected neurones. In this work, the ANN framework is fabricated as following:
-
Input Layer : The input layer in an Artificial Neural Network (ANN) with 64 neurons represents the 64 features of the dataset, where each neuron processes a corresponding feature. Using the activation strategy of ReLU 2,, it passes only positive values, ensuring efficient learning and faster convergence. Each feature has calculated weighted inputs, while making negative inputs be 0. Due to its simplicity and non-linearity, ReLU allows for sparse activation and, therefore, scalability, making it suitable for more complicated tasks such as intrusion detection.
- Dropout Layer : Two dropout layer with a fifty percent reduction in rate helps to reduce over fitting by randomly adjusting fifty percent of the units used for input to zero throughout each training iteration.This technique minimises reliance on single neurones, allowing the network to learn more robust properties.
- Hidden Layer : The model has two hidden layers to improve learning and feature abstraction. The first hidden layer is made up of 128 neurones with ReLU activation, which allows the network to record complicated patterns using non-linear transformations. The second hidden layer has 64 neurones and uses ReLU activation to reduce dimensionality while retaining abstraction for better computational efficiency. This layered structure strikes a compromise between learning capacity and processing speed, allowing for deeper pattern identification and more effective generalisation.
- Output Layer : The layer that is designed to provide outcomes, contains six neuronal cells, each corresponding to one of the six categories of interest in the classifying task. The activation function of softmax is employed, transforming the output into the distribution of probabilities among every category. The softmax function guarantees the sum of probabilities is 1 and enables the model to simply make the most likely class prediction and give more probability to whatever output is more relevant, which makes it popular for multi-class classification problems.
- Loss Function : This framework employs a loss function approach that is know as categorical cross-entropy, quantifying the disparity between the one-hot actual label distribution and the projected distribution of probabilities. This method is used where there is multi-class classification, and it punishes when the prediction is neither close to the labels nor close to the class by solving a loss of negative log likelihood of the actual class. Preventing this loss can help tune the model so it is more left-leaning or right-leaning, which improves its accuracy, resulting in predicted probability aligning better to actual labels.
- Optimizer : This model employs an optimizing techniques of Adam with a primary learning ratio of 0.001 to take advantage of momentum and adaptation rates for improved training. Adam adapts the learning rates for each individual parameter, which leads to quicker convergence and resilient performance across different types of issues, making it frequently employed in deep learning models.
-
- (c)
-
Global Aggregator : The centralised computer consolidates modifications to the model from each client to formulate a unified framework utilising Federated Averaging (FedAvg) 3. This method involves the server systematically calculating a weighted average of the clients’ model parameters (weights) according to the magnitude of their local data. FedAvg enhances the global model by integrating varied local insights while maintaining data privacy, establishing it as a fundamental technique in FL [33]. The calculation as follows [33],where:
- represents the new global model parameters,
- K denotes the number of participating clients,
- is the number of local training samples for client k,
- is the total number of training samples across all selected clients,
- represents the locally updated model parameters from client k at round t.
- (d)
- Explainable AI (XAI) Integration : Explainability is critical for understanding complex machine learning models. SHAP is a model-agnostic approach that provides local interpretability by assigning importance values to individual features. In this study, the Python library of SHAP was used to calculate SHAP values for a test trial subset. Kernel SHAP, suitable of explaining deep learning models, was employed to interpret predictions and ensure efficient, representative interpretability of the CICIoT2023 dataset [9].
4. Experimental Result
4.1. Evaluative Metric
- ACCURACY : The metric that indicates how frequently an ML approach correctly projects an outcome is known as Accuracy. The division of the number of correct predictions by the total estimation quantity, is implemented to evaluate the accuracy.
- PRECISION : the metric that represents the efficacy of an ML approach is known as Precision. It reflects the accuracy of the algorithms’ positive predictions. It is the ratio of genuine successes to the total number of positive projections.
- F1-SCORE : the balanced average of accuracy and recall is termed as F1-SCORE. Accuracy and Recall are aggregated into a single statistics in order to enhance the comprehension of the efficacy of the suggested framework.
- LOSS : A function called a loss function is a formula of algebra that quantifies the variance between the envisioned results derived from the computerised model and the actual target values. The loss function evaluates the degree to which the forecasts of the model align with the factual information.
4.2. Prior Experiment
4.3. FedXAIIDS
5. Discussion
6. Conclusion
Abbreviations
| IDS | Intrusion Detection System |
| FL | Federated Learning |
| XAI | eXplainable AI |
| AI | Artificial Intelligence |
| SHAP | SHapley Additive exPLanation |
| ML | Machine Learning |
| DL | Deep Learning |
| ANN | Artificial Nueral Network |
| FedXAIIDS | Federated Explainable IDS |
| CNN | Convolutional Neural Network |
| LSTM | Long Short-Term Memory |
References
- Wang, S.; Asif, M.; Shahzad, M.F.; Ashfaq, M. Data privacy and cybersecurity challenges in the digital transformation of the banking sector. Computers & security 2024, 147, 104051.
- Otoum, Y.; Nayak, A. As-ids: Anomaly and signature based ids for the internet of things. Journal of Network and Systems Management 2021, 29, 23.
- Okoye, C.C.; Nwankwo, E.E.; Usman, F.O.; Mhlongo, N.Z.; Odeyemi, O.; Ike, C.U. Securing financial data storage: A review of cybersecurity challenges and solutions. International Journal of Science and Research Archive 2024, 11, 1968–1983.
- Agrawal, S.; Sarkar, S.; Aouedi, O.; Yenduri, G.; Piamrat, K.; Alazab, M.; Bhattacharya, S.; Maddikunta, P.K.R.; Gadekallu, T.R. Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications 2022, 195, 346–361.
- Karatas, G.; Demir, O.; Sahingoz, O.K. Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE access 2020, 8, 32150–32162.
- Waswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.; Kaiser, L.; Polosukhin, I. Attention is all you need. In Proceedings of the NIPS, 2017.
- Adadi, A.; Berrada, M. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE access 2018, 6, 52138–52160.
- Fatema, K.; Anannya, M.; Dey, S.K.; Su, C.; Mazumder, R. Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection. In Proceedings of the International Conference on Data Security and Privacy Protection. Springer, 2024, pp. 260–275.
- Lundberg, S. A unified approach to interpreting model predictions. arXiv preprint arXiv:1705.07874 2017.
- Dong, T.; Li, S.; Qiu, H.; Lu, J. An interpretable federated learning-based network intrusion detection framework. arXiv preprint arXiv:2201.03134 2022.
- Neto, E.C.P.; Dadkhah, S.; Ferreira, R.; Zohourian, A.; Lu, R.; Ghorbani, A.A. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 2023, 23, 5941.
- Fatema, K.; Dey, S.K.; Bari, R.; Mazumder, R. A Novel Two-Stage Classification Architecture Integrating Machine Learning and Artificial Immune System for Intrusion Detection on Balanced Dataset. In Proceedings of the International Conference on Information and Communication Technology for Intelligent Systems. Springer, 2024, pp. 179–189.
- Nguyen, S.N.; Nguyen, V.Q.; Choi, J.; Kim, K. Design and implementation of intrusion detection system using convolutional neural network for DoS detection. In Proceedings of the Proceedings of the 2nd international conference on machine learning and soft computing, 2018, pp. 34–38.
- de Carvalho Bertoli, G.; Junior, L.A.P.; Saotome, O.; dos Santos, A.L. Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. Computers & Security 2023, 127, 103106.
- Toldinas, J.; Venčkauskas, A.; Damaševičius, R.; Grigaliūnas, Š.; Morkevičius, N.; Baranauskas, E. A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 2021, 10, 1854.
- Markovic, T.; Leon, M.; Buffoni, D.; Punnekkat, S. Random forest based on federated learning for intrusion detection. In Proceedings of the IFIP international conference on artificial intelligence applications and Innovations. Springer, 2022, pp. 132–144.
- Lazzarini, R.; Tianfield, H.; Charissis, V. Federated learning for IoT intrusion detection. Ai 2023, 4, 509–530.
- Torre, D.; Chennamaneni, A.; Jo, J.; Vyas, G.; Sabrsula, B. Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study. ACM Transactions on Software Engineering and Methodology 2025, 34, 1–48.
- Almadhor, A.; Altalbe, A.; Bouazzi, I.; Hejaili, A.A.; Kryvinska, N. Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach. Scientific Reports 2024, 14, 24322.
- Alsaleh, S.; Menai, M.E.B.; Al-Ahmadi, S. A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM. Sensors 2025, 25, 1039.
- Bensaid, R.; Labraoui, N.; Ari, A.A.A.; Saidi, H.; Emati, J.H.M.; Maglaras, L. SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare. PeerJ Computer Science 2024, 10, e2414.
- Sun, S.; Sharma, P.; Nwodo, K.; Stavrou, A.; Wang, H. FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. In Proceedings of the International Conference on Information Security. Springer, 2024, pp. 286–306.
- Al-Imran, M.; Ripon, S.H. Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models. International Journal of Computational Intelligence Systems 2021, 14, 200.
- Arslan, R.S. FastTrafficAnalyzer: An efficient method for intrusion detection systems to analyze network traffic. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi 2021, 12, 565–572.
- Tonni, Z.A.; Mazumder, R. A Novel Feature Selection Technique for Intrusion Detection System Using RF-RFE and Bio-inspired Optimization. In Proceedings of the 2023 57th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2023, pp. 1–6.
- Haque, N.I.; Khalil, A.A.; Rahman, M.A.; Amini, M.H.; Ahamed, S.I. Biocad: Bio-inspired optimization for classification and anomaly detection in digital healthcare systems. In Proceedings of the 2021 IEEE International Conference on Digital Health (ICDH). IEEE, 2021, pp. 48–58.
- Aldhaheri, S.; Alghazzawi, D.; Cheng, L.; Alzahrani, B.; Al-Barakati, A. DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Applied Sciences 2020, 10, 1909.
- Rashid, M.M.; Khan, S.U.; Eusufzai, F.; Redwan, M.A.; Sabuj, S.R.; Elsharief, M. A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network 2023, 3, 158–179.
- Liu, W.; Xu, X.; Wu, L.; Qi, L.; Jolfaei, A.; Ding, W.; Khosravi, M.R. Intrusion detection for maritime transportation systems with batch federated aggregation. IEEE Transactions on Intelligent Transportation Systems 2022, 24, 2503–2514.
- Yaras, S.; Dener, M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics 2024, 13, 1053.
- Becerra-Suarez, F.L.; Tuesta-Monteza, V.A.; Mejia-Cabrera, H.I.; Arcila-Diaz, J. Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks. In Proceedings of the Informatics. MDPI, 2024, Vol. 11, p. 32.
- Khan, M.M.; Alkhathami, M. Anomaly detection in IoT-based healthcare: machine learning for enhanced security. Scientific Reports 2024, 14, 5872.
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the Artificial intelligence and statistics. PMLR, 2017, pp. 1273–1282.
- Adamova, A.; Zhukabayeva, T.; Mukanova, Z.; Oralbekova, Z. Enhancing internet of things security against structured query language injection and brute force attacks through federated learning. International Journal of Electrical & Computer Engineering (2088-8708) 2025, 15.
- Saadouni, R.; Gherbi, C.; Aliouat, Z.; Harbi, Y.; Khacha, A.; Mabed, H. Securing smart agriculture networks using bio-inspired feature selection and transfer learning for effective image-based intrusion detection. Internet of Things 2025, 29, 101422.
- Chen, H.; Wang, Z.; Yang, S.; Luo, X.; He, D.; Chan, S. Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments. Alexandria Engineering Journal 2025, 111, 78–91.
- Shirley, J.J.; Priya, M. An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion. IEEE Access 2025.
- Ji, R.; Selwal, A.; Kumar, N.; Padha, D. Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber-Physical Systems. Security and Privacy 2025, 8, e497.
- Sakraoui, S.; Ahmim, A.; Derdour, M.; Ahmim, M.; Namane, S.; Dhaou, I.B. FBMP-IDS: FL-based blockchain-powered lightweight MPC-secured IDS for 6G networks. IEEE Access 2024.
- Gulzar, Q.; Mustafa, K. Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection. International Journal of Machine Learning and Cybernetics 2025, pp. 1–19.
- Wang, J.; Yang, K.; Li, M. NIDS-FGPA: A federated learning network intrusion detection algorithm based on secure aggregation of gradient similarity models. PloS one 2024, 19, e0308639.










| Authors | FL technique used (Yes/No) | Framework |
|---|---|---|
| Sinh-Ngoc et al. [13] | No | Employed CNN architecture for the categorization. |
| Kanimozhi et al. [7]. | No | The applied classifiers for detecting network assaults include NB, K-Nearest Neighbor, RF, Adaboost with Decision Tree, SVM, and ANN. These classifiers specifically target the detection of Botnet network assaults. |
| Bertoli et al. [14] | Yes | Constructed a multilayered autonomous FL architecture that integrates an autoencoder with an energy flow classifier, enabling enhanced feature extraction and classification performance while maintaining privacy in a distributed learning environment. |
| Toldinas et al. [15] | No | The initial processing technique that combines a predetermined number of network flow feature records. Three independent ML methodologies: , Federated transfer learning, Traditional transfer learning, and Federated learning were used on NIDS employing deep learning for image classification. |
| Markovic et al. [16] | Yes | Implemented a Federated Learning (FL) model that utilizes the shared model incorporating RF, enabling learning across multiple consumers collaboratively while safeguarding the privacy of informations. |
| Lazzarini et al. [17]. | Yes | Developed a IDS incorporating FL, a shallow ANN as the regional framework and FedAvg as the aggregation method. |
| Ref | Year | Federated Learning applied | Method | Dataset | Performance Metrics (Accuracy) |
| A. Adamova et al. | 2025 | Yes | The methodology employs Federated Learning (FL) to enhance IoT security by predicting violations as well as instantaneous evaluation of their cruciality, evaluated on SQL injection and brute force attacks. | CICIOT2023 | 100% accuracy in predicting SQL injection attacks and 98.25% accuracy for brute force attacks [34]. |
| R. Saadouni et al. | 2025 | No | It incorporates transfer learning with the beforehand-trained infrastructure of VGG16 for capturing features, along with an optimizer known as Binary Greylag Goose Optimization (BGGO) for feature selection, and a Random Forest classifier for attack detection [35]. | CICIOT2023 | 99.41% accuracy for multiclass classification and 99.83% for binary classification |
| H. Chen et al. | 2025 | No | The proposed architecture boosts intrusion recognition in IoT environments utilizing synaptic structures transformation from 1D to 3D. Additionally, imbalance categorization issue is mitigated implement a unique strategy for calculating loss. The experiment was executed on CICIDS2017, and CICIoT2023. | CIC_IDS_2017, CICIOT2023 | demonstrated a 88.48% on CICIDS2017 and a 97.69% on CICIoT2023. [36]. |
| J. J. Shirley et al. | 2025 | No | The proposed methodology integrates an Autoencoder (AE) for feature extraction and dimensionality reduction with a Feedforward Neural Network (FNN) for intrusion classification in IoT networks. A bi-layer balancing scheme boosts identification of minority attacks categories, while the AE-FNN fusion improves accuracy and adaptability to dynamic threats [37]. | CICIOT2023 | 99.55% accuracy in binary classification and 90.91% in multiclass classification. |
| R. Ji et al. | 2025 | No | The proposed methodology introduces a hybrid intrusion detection approach for Cyber-Physical Systems (CPSs), integrating AdaBoost and RF atechniques to leverage the advantages of not only bagging but also boosting techniques [38]. | CICIOT2023 | accurateness of 98.27%, with recall, precision, and F1-score all at 0.98, a false detection rate of 0.0006, along with a testing time of 0.1563 seconds |
| Sabrina et al. | 2025 | Yes | The methodology proposes a secure gradients exchange algorithm for distributed intrusion identification in 6G environments, using FL, safeguarded multi-party processing, as well as blockchain to ensure privacy. The model, combining CNN1D and multi-head attention. | CICIOT2023 | accuracy of 79.92%, 77.41% identification percentage, and 2.55% of false detection rate [39]. |
| Qawsar et al. | 2025 | Yes | The methodology introduces a hybrid learning infrastructure for identifying violations in IIoT environments, integrating CNN, LSTM, GRU, and Capsule Networks (CN) [40]. | CICIoT 2023 and UNSW_NB15 | accuracy of 99.82% on CICIoT 2023 and 95.55% on UNSW_NB15 |
| Damián et al. | 2025 | No | The methodology presents a Federated Learning-based IDS using a 1D CNN for detecting violations in IoT infrastructures, incorporating privacy techniques like Differential Privacy, Diffie–Hellman Key Exchange, and Homomorphic Encryption [18]. | TONIoT, IoT23, BoTIoT, CICIoT2023, CICIoMT2024, RTIoT2022, and Edge-IIoT | The model achieved an estimated accurateness of 97.31%, across the various datasets . |
| Ahmad et al. | 2024 | Yes | This study proposes using Federated Deep Neural Networks (FDNNs) and Explainable AI (XAI) to diagnose and mitigate DDoS assaults in IoT environments, ensuring privacy through federated learning. By integrating XGBoost with SHAP for feature selection [19]. | DDoS-ICMP_Flood , DDoS-UDP_Flood , DDoS-TCP_Flood , DDoS-PSHACK_Flood , DDoS-SYN_Flood , DDoS-RSTFINFlood , DDoS-SynonymousIP_Flood , DoS-UDP_Flood , DoS-TCP_Flood , and DoS-SYN_Flood. | the model achieved 99.78% accuracy |
| JiaMing et al. | 2025 | Yes | NIDS-FGPA combines federated learning with Paillier encryption for secure training and uses GSA to optimize updates and reduce overhead. A 2D-CNN-BiGRU model handles incomplete data. | Edge-IIoTset and CICIoT2023 | Edge-IIoTset and CICIoT2023 datasets exhibit accurateness of 94.5% and 99.2%, correspondingly [41]. |
| FedXAIIDS | 2025 | Yes | Federated XAI IDS(FedXAIIDS) uses Federated Learning (FL) and SHAP for a privacy-preserving, explainable IDS. An ANN is distributed across four federated clients, aggregated with FedAvg on CICIoT2023. | CICIOT2023 | SHAP enhances interpretability, and the model achieved 88.4% training and 88.2% testing accuracy, balancing security, privacy, and trustworthiness. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
