{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:10Z","timestamp":1758987610456,"version":"3.44.0"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:00:00Z","timestamp":1748995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:00:00Z","timestamp":1748995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02001-z","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:14:30Z","timestamp":1749014070000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating DDoS attacks on the internet of things using federated learning"],"prefix":"10.1007","volume":"18","author":[{"given":"Ghazaleh","family":"Shirvani","sequence":"first","affiliation":[]},{"given":"Saeid","family":"Ghasemshirazi","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Abdollahi Azgomi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"issue":"1","key":"2001_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JIOT.2016.2619369","volume":"4","author":"H Cai","year":"2017","unstructured":"Cai H, Xu B, Jiang L, Vasilakos AV (2017) IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges. IEEE Internet Things J 4(1):75\u201387. https:\/\/doi.org\/10.1109\/JIOT.2016.2619369","journal-title":"IEEE Internet Things J"},{"key":"2001_CR2","doi-asserted-by":"publisher","unstructured":"S. Sharma, C. Xing, Y. Liu, and Y. Kang, (2019) \u201cSecure and Efficient Federated Transfer Learning,\u201d Proceedings - 2019 IEEE International Conference on Big Data, Big Data, 2569\u20132576. https:\/\/doi.org\/10.1109\/BigData47090.2019.9006280.","DOI":"10.1109\/BigData47090.2019.9006280"},{"key":"2001_CR3","doi-asserted-by":"publisher","unstructured":"S. S. Priya, M. Sivaram, D. Yuvaraj, and A. Jayanthiladevi, (2020) \u201cMachine Learning based DDOS Detection,\u201d 2020 International Conference on Emerging Smart Computing and Informatics, ESCI. 234\u2013237. https:\/\/doi.org\/10.1109\/ESCI48226.2020.9167642","DOI":"10.1109\/ESCI48226.2020.9167642"},{"issue":"1","key":"2001_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.36548\/JISMAC.2022.1.003","volume":"4","author":"R Amrish","year":"2022","unstructured":"Amrish R, Bavapriyan K, Gopinaath V, Jawahar A, Kumar CV (2022) DDoS detection using machine learning techniques. J ISMAC 4(1):24\u201332. https:\/\/doi.org\/10.36548\/JISMAC.2022.1.003","journal-title":"J ISMAC"},{"key":"2001_CR5","doi-asserted-by":"publisher","unstructured":"S. Daneshgadeh, N. Baykal, and S. Ertekin (2017) \u201cDDoS Attack Modeling and Detection Using SMO,\u201d 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). 432\u2013436. https:\/\/doi.org\/10.1109\/ICMLA.2017.0-123","DOI":"10.1109\/ICMLA.2017.0-123"},{"key":"2001_CR6","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/ACCESS.2019.2963077","volume":"8","author":"S Dong","year":"2020","unstructured":"Dong S, Sarem M (2020) DDoS Attack Detection Method Based on Improved KNN with the Degree of DDoS Attack in Software-Defined Networks. IEEE Access 8:5039\u20135048. https:\/\/doi.org\/10.1109\/ACCESS.2019.2963077","journal-title":"IEEE Access"},{"key":"2001_CR7","doi-asserted-by":"publisher","unstructured":"X. Qin, T. Xu, and C. Wang (2016) \u201cDDoS attack detection using flow entropy and clustering technique\u201d. Proceed - 2015 11th Int Conf Comput Intell Secur, CIS 2015. 412\u2013415, https:\/\/doi.org\/10.1109\/CIS.2015.105","DOI":"10.1109\/CIS.2015.105"},{"issue":"10","key":"2001_CR8","doi-asserted-by":"publisher","first-page":"3193","DOI":"10.1007\/S10489-018-1141-2\/METRICS","volume":"48","author":"M Idhammad","year":"2018","unstructured":"Idhammad M, Afdel K, Belouch M (2018) Semi-supervised machine learning approach for DDoS detection. Appl Intell 48(10):3193\u20133208. https:\/\/doi.org\/10.1007\/S10489-018-1141-2\/METRICS","journal-title":"Appl Intell"},{"key":"2001_CR9","doi-asserted-by":"publisher","unstructured":"J. Zhang, P. Yu, L. Qi, S. Liu, H. Zhang, and J. Zhang (2021) \u201cFLDDoS: DDoS Attack Detection Model based on Federated Learning\u201d. Proceed - 2021 IEEE 20th Int Conf Trust, Secur Privacy Comput Commun, TrustCom. 635\u2013642. https:\/\/doi.org\/10.1109\/TRUSTCOM53373.2021.00095.","DOI":"10.1109\/TRUSTCOM53373.2021.00095"},{"key":"2001_CR10","doi-asserted-by":"publisher","unstructured":"A. Srivastava, B. B. Gupta, A. Tyagi, A. Sharma, and A. Mishra, (2011) \u201cA recent survey on DDoS attacks and defense mechanisms\u201d. Commun Comput Inform Sci. 203, 570\u2013580. https:\/\/doi.org\/10.1007\/978-3-642-24037-9_57\/COVER","DOI":"10.1007\/978-3-642-24037-9_57\/COVER"},{"key":"2001_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/SPW.2018.00013","volume":"2018","author":"R Doshi","year":"2018","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. Proceed - 2018 IEEE Sympos Secur Privacy Workshops SPW 2018:29\u201335. https:\/\/doi.org\/10.1109\/SPW.2018.00013","journal-title":"Proceed - 2018 IEEE Sympos Secur Privacy Workshops SPW"},{"key":"2001_CR12","unstructured":"S. Pokhrel, R. Abbas, and B. Aryal, \u201cIoT Security: Botnet detection in IoT using Machine learning,\u201d Apr. 2021, Accessed: Jul. 29, 2023. [Online]. Available: https:\/\/arxiv.org\/abs\/2104.02231v1"},{"key":"2001_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/J.IOT.2018.08.009","volume":"1\u20132","author":"D Mocrii","year":"2018","unstructured":"Mocrii D, Chen Y, Musilek P (2018) IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Int Things 1\u20132:81\u201398. https:\/\/doi.org\/10.1016\/J.IOT.2018.08.009","journal-title":"Int Things"},{"key":"2001_CR14","doi-asserted-by":"publisher","unstructured":"M. Sharma and A. K. Bindal, \u201cSecurity Issues in IoT: A Review,\u201d PDGC 2022 - 2022 7th International Conference on Parallel, Distributed and Grid Computing, pp. 119\u2013124, 2022, https:\/\/doi.org\/10.1109\/PDGC56933.2022.10053255.","DOI":"10.1109\/PDGC56933.2022.10053255"},{"key":"2001_CR15","doi-asserted-by":"publisher","unstructured":"G. Shirvani, S. Ghasemshirazi, and B. Beigzadeh, \u201cIoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices,\u201d 2021 11th Smart Grid Conference, SGC 2021, 2021, https:\/\/doi.org\/10.1109\/SGC54087.2021.9664190.","DOI":"10.1109\/SGC54087.2021.9664190"},{"key":"2001_CR16","doi-asserted-by":"publisher","unstructured":"S. Manjunath, A. A. P. Singh, N. C. Gowda, Y. T, and V. H. N, \u201cMachine Learning Techniques to Detect DDoS Attacks in IoT\u2019s, SDN\u2019s: A Comprehensive Overview,\u201d International Journal of Human Computations & Intelligence, vol. 2, no. 4, pp. 203\u2013211, Jun. 2023, https:\/\/doi.org\/10.5281\/ZENODO.8027034.","DOI":"10.5281\/ZENODO.8027034"},{"issue":"7","key":"2001_CR17","first-page":"345","volume":"43","author":"B Purnama","year":"2019","unstructured":"Purnama B, Stiawan D, Budiarto R (2019) Preprocessing and Framework for Unsupervised Anomaly Detection in IoT: Work on Progress. Proceed 2018 Int Conf Electric Eng Comput Sci 43(7):345\u2013350","journal-title":"Proceed 2018 Int Conf Electric Eng Comput Sci"},{"key":"2001_CR18","doi-asserted-by":"publisher","unstructured":"J. Miguel-Alonso, \u201cSecuring IoT networks through SDN technologies,\u201d Jul. 2023, https:\/\/doi.org\/10.20944\/PREPRINTS202307.1781.V1.","DOI":"10.20944\/PREPRINTS202307.1781.V1"},{"key":"2001_CR19","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-981-15-6353-9_46\/COVER","volume":"1199","author":"J Mohanty","year":"2021","unstructured":"Mohanty J, Mishra S, Patra S, Pati B, Panigrahi CR (2021) IoT Security, Challenges, and Solutions: A Review. Adv Intell Syst Comput 1199:493\u2013504. https:\/\/doi.org\/10.1007\/978-981-15-6353-9_46\/COVER","journal-title":"Adv Intell Syst Comput"},{"issue":"6","key":"2001_CR20","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1007\/S11227-021-04250-0\/METRICS","volume":"78","author":"M Nasir","year":"2022","unstructured":"Nasir M, Javed AR, Tariq MA, Asim M, Baker T (2022) Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J Supercomput 78(6):8852\u20138866. https:\/\/doi.org\/10.1007\/S11227-021-04250-0\/METRICS","journal-title":"J Supercomput"},{"key":"2001_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MGRS.2017.2762307","volume":"5","author":"X Zhu","year":"2017","unstructured":"Zhu X, Tuia D, Mou L, Xia G, Zhang L, Xu F, Fraundorfer F (2017) Deep learning in remote sensing: a comprehensive review and list of resources. IEEE Geosci Remote Sens Mag 5:8\u201336. https:\/\/doi.org\/10.1109\/MGRS.2017.2762307","journal-title":"IEEE Geosci Remote Sens Mag"},{"issue":"9","key":"2001_CR22","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2174\/0118722121242429230922070752","volume":"18","author":"R Singh","year":"2024","unstructured":"Singh R, Srivastava N, Kumar A (2024) Network Anomaly Detection using Autoencoder on Various Datasets: A Comprehensive Review. Recent Patents Eng 18(9):63\u201377. https:\/\/doi.org\/10.2174\/0118722121242429230922070752","journal-title":"Recent Patents Eng"},{"issue":"2","key":"2001_CR23","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","volume":"115","author":"PM Chanal","year":"2020","unstructured":"Chanal PM, Kakkasageri MS (2020) Security and Privacy in IoT: A Survey. Wirel Pers Commun 115(2):1667\u20131693. https:\/\/doi.org\/10.1007\/s11277-020-07649-9","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"2001_CR24","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/S13369-017-2414-5\/METRICS","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany NZ, Shamsi JA, Salah K (2017) DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions. Arab J Sci Eng 42(2):425\u2013441. https:\/\/doi.org\/10.1007\/S13369-017-2414-5\/METRICS","journal-title":"Arab J Sci Eng"},{"key":"2001_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/J.INFFUS.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA et al (2024) Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inform Fusion 101:102002. https:\/\/doi.org\/10.1016\/J.INFFUS.2023.102002","journal-title":"Inform Fusion"},{"issue":"2","key":"2001_CR26","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/TSG.2016.2570546","volume":"9","author":"AF Taha","year":"2018","unstructured":"Taha AF, Qi J, Wang J, Panchal JH (2018) Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans Smart Grid 9(2):886\u2013899. https:\/\/doi.org\/10.1109\/TSG.2016.2570546","journal-title":"IEEE Trans Smart Grid"},{"key":"2001_CR27","doi-asserted-by":"publisher","unstructured":"M. Dimolianis, D. K. Kalogeras, N. Kostopoulos, and V. Maglaris, \u201cDDoS Attack Detection via Privacy-aware Federated Learning and Collaborative Mitigation in Multi-domain Cyber Infrastructures,\u201d Proceedings of the 2022 IEEE Conference on Cloud Networking 2022, CloudNet 2022, 118\u2013125, 2022, https:\/\/doi.org\/10.1109\/CLOUDNET55617.2022.9978815.","DOI":"10.1109\/CLOUDNET55617.2022.9978815"},{"key":"2001_CR28","unstructured":"A. U. Karimy and P. C. Reddy, \u201cSecuring the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges,\u201d 2023. Accessed: Jul. 29, 2023. [Online]. Available: https:\/\/philpapers.org\/rec\/ULLSTI-2"},{"key":"2001_CR29","doi-asserted-by":"publisher","unstructured":"M. Najafimehr, S. Zarifzadeh, and S. Mostafavi, \u201cDDoS attacks and machine-learning-based detection methods: A survey and taxonomy,\u201d Engineering Reports. e12697, 2023, https:\/\/doi.org\/10.1002\/ENG2.12697.","DOI":"10.1002\/ENG2.12697"},{"key":"2001_CR30","doi-asserted-by":"publisher","first-page":"100227","DOI":"10.1016\/J.IOT.2020.100227","volume":"11","author":"BK Mohanta","year":"2020","unstructured":"Mohanta BK, Jena D, Satapathy U, Patnaik S (2020) Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Int Things 11:100227. https:\/\/doi.org\/10.1016\/J.IOT.2020.100227","journal-title":"Int Things"},{"issue":"3","key":"2001_CR31","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TII.2020.2984315","volume":"17","author":"T Wu","year":"2021","unstructured":"Wu T et al (2021) Extreme Learning Machine-Based State Reconstruction for Automatic Attack Filtering in Cyber Physical Power System. IEEE Trans Industr Inform 17(3):1892\u20131904. https:\/\/doi.org\/10.1109\/TII.2020.2984315","journal-title":"IEEE Trans Industr Inform"},{"issue":"4","key":"2001_CR32","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/S10115-022-01664-X","volume":"64","author":"J Liu","year":"2022","unstructured":"Liu J et al (2022) From distributed machine learning to federated learning: a survey. Knowledge Inform Syst 64(4):885\u2013917. https:\/\/doi.org\/10.1007\/S10115-022-01664-X","journal-title":"Knowledge Inform Syst"},{"key":"2001_CR33","doi-asserted-by":"publisher","unstructured":"Q. Yang, Y. Liu, T. Chen, and Y. Tong (2019) \u201cFederated machine learning: Concept and applications,\u201d ACM Trans Intell Syst Technol, 10(2): . https:\/\/doi.org\/10.1145\/3298981","DOI":"10.1145\/3298981"},{"issue":"10","key":"2001_CR34","doi-asserted-by":"publisher","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2023","unstructured":"Khan IA, Pi D, Abbas MZ, Zia U, Hussain Y, Soliman H (2023) Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems. IEEE Int Things J 10(10):8467\u20138476. https:\/\/doi.org\/10.1109\/JIOT.2022.3200048","journal-title":"IEEE Int Things J"},{"issue":"3","key":"2001_CR35","doi-asserted-by":"publisher","first-page":"3300","DOI":"10.1109\/TII.2021.3108811","volume":"19","author":"IA Khan","year":"2023","unstructured":"Khan IA, Moustafa N, Pi D, Hussain Y, Khan NA (2023) DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. IEEE Trans Industr Inform 19(3):3300\u20133309. https:\/\/doi.org\/10.1109\/TII.2021.3108811","journal-title":"IEEE Trans Industr Inform"},{"key":"2001_CR36","doi-asserted-by":"publisher","unstructured":"Shirvani G, Ghasemshirazi S, Beigzadeh B (2024) Federated learning: attacks, defenses, opportunities, and challenges.\u00a0In: Proceeding of the 11th International Symposium on Telecommunications (IST). IEEE. https:\/\/doi.org\/10.1109\/IST64061.2024.10843494","DOI":"10.1109\/IST64061.2024.10843494"},{"issue":"5","key":"2001_CR37","doi-asserted-by":"publisher","first-page":"3930","DOI":"10.1109\/JIOT.2021.3100755","volume":"9","author":"SI Popoola","year":"2022","unstructured":"Popoola SI, Ande R, Adebisi B, Gui G, Hammoudeh M, Jogunola O (2022) Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices. IEEE Internet Things J 9(5):3930\u20133944. https:\/\/doi.org\/10.1109\/JIOT.2021.3100755","journal-title":"IEEE Internet Things J"},{"key":"2001_CR38","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","volume":"8","author":"N Martins","year":"2020","unstructured":"Martins N, Cruz JM, Cruz T, Henriques Abreu P (2020) Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review. IEEE Access 8:35403\u201335419. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974752","journal-title":"IEEE Access"},{"issue":"10","key":"2001_CR39","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1049\/IET-IPR.2019.1523","volume":"14","author":"O Kechagias-Stamatis","year":"2020","unstructured":"Kechagias-Stamatis O, Aouf N, Richardson MA (2020) Performance evaluation of single and cross-dimensional feature detection and description. IET Image Process 14(10):2035\u20132051. https:\/\/doi.org\/10.1049\/IET-IPR.2019.1523","journal-title":"IET Image Process"},{"key":"2001_CR40","doi-asserted-by":"publisher","unstructured":"H. Saadat, A. Aboumadi, A. Mohamed, A. Erbad, and M. Guizani, \u201cHierarchical Federated Learning for Collaborative IDS in IoT Applications,\u201d 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021, Jun. 2021, https:\/\/doi.org\/10.1109\/MECO52532.2021.9460304.","DOI":"10.1109\/MECO52532.2021.9460304"},{"key":"2001_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/J.JPDC.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha O, Ferrag MA, Shu L, Maglaras L, Choo KKR, Nafaa M (2022) FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things. J Parallel Distrib Comput 165:17\u201331. https:\/\/doi.org\/10.1016\/J.JPDC.2022.03.003","journal-title":"J Parallel Distrib Comput"},{"key":"2001_CR42","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Friha O, Maglaras L, Janicke H, Shu L (2021) Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis. IEEE Access 9:138509\u2013138542. https:\/\/doi.org\/10.1109\/ACCESS.2021.3118642","journal-title":"IEEE Access"},{"issue":"4","key":"2001_CR43","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/TNSE.2023.3237367","volume":"10","author":"ZA El Houda","year":"2023","unstructured":"El Houda ZA, Hafid AS, Khoukhi L (2023) MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain. IEEE Trans Netw Sci Eng 10(4):1985\u20132001. https:\/\/doi.org\/10.1109\/TNSE.2023.3237367","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"12","key":"2001_CR44","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/APP10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT Privacy and Security: Challenges and Solutions. Appl Sci 10(12):4102. https:\/\/doi.org\/10.3390\/APP10124102","journal-title":"Appl Sci"},{"key":"2001_CR45","doi-asserted-by":"publisher","unstructured":"M. J. Idrissi et al (2023) \u201cFed-ANIDS: Federated learning for anomaly-based network intrusion detection systems,\u201d Expert Syst Appl, 121000, https:\/\/doi.org\/10.1016\/J.ESWA.2023.121000.","DOI":"10.1016\/J.ESWA.2023.121000"},{"key":"2001_CR46","doi-asserted-by":"publisher","unstructured":"H. Wang, Z. Kaplan, D. Niu, and B. Li (2020) \u201cOptimizing Federated Learning on Non-IID Data with Reinforcement Learning,\u201d Proceedings - IEEE INFOCOM, 1698\u20131707. https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155494.","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"2001_CR47","doi-asserted-by":"publisher","first-page":"103088","DOI":"10.1016\/J.SYSARC.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things. J Syst Architect 148:103088. https:\/\/doi.org\/10.1016\/J.SYSARC.2024.103088","journal-title":"J Syst Architect"},{"key":"2001_CR48","doi-asserted-by":"publisher","unstructured":"N. Mitchell, J. Ball\u00e9, Z. Charles, and J. Kone\u010dn\u00fd, \u201cOptimizing the Communication-Accuracy Trade-off in Federated Learning with Rate-Distortion Theory,\u201d Jan. 2022, https:\/\/doi.org\/10.48550\/arxiv.2201.02664.","DOI":"10.48550\/arxiv.2201.02664"},{"key":"2001_CR49","doi-asserted-by":"publisher","unstructured":"A. Girma, M. Garuba, J. Li, and C. Liu, \u201cAnalysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment,\u201d Proceedings - 12th International Conference on Information Technology: New Generations, ITNG 2015, 212\u2013217, May 2015, https:\/\/doi.org\/10.1109\/ITNG.2015.40.","DOI":"10.1109\/ITNG.2015.40"},{"key":"2001_CR50","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-981-15-8469-5_5\/COVER","volume":"921","author":"S Pande","year":"2021","unstructured":"Pande S, Khamparia A, Gupta D, Thanh DNH (2021) DDOS Detection Using Machine Learning Technique. Stud Comput Intell 921:59\u201368. https:\/\/doi.org\/10.1007\/978-981-15-8469-5_5\/COVER","journal-title":"Stud Comput Intell"},{"key":"2001_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3359998","author":"ZA El Houda","year":"2024","unstructured":"El Houda ZA, Moudoud H, Brik B (2024) Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2024.3359998","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"2001_CR52","doi-asserted-by":"publisher","first-page":"8356","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Hammoudeh M, Karimipour H, Srivastava G (2022) Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Trans Industr Inform 18(11):8356\u20138366. https:\/\/doi.org\/10.1109\/TII.2022.3168011","journal-title":"IEEE Trans Industr Inform"},{"key":"2001_CR53","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1109\/CVPR.2017.243","volume":"2017","author":"G Huang","year":"2016","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2016) Densely Connected Convolutional Networks. Proceed 30th IEEE Conf Comput Vis Patt Recog 2017:2261\u20132269. https:\/\/doi.org\/10.1109\/CVPR.2017.243","journal-title":"Proceed 30th IEEE Conf Comput Vis Patt Recog"},{"key":"2001_CR54","doi-asserted-by":"publisher","unstructured":"G. A. Jaafar, S. M. Abdullah, and S. Ismail, \u201cReview of Recent Detection Methods for HTTP DDoS Attack,\u201d Journal of Computer Networks and Communications, v2019, 2019, https:\/\/doi.org\/10.1155\/2019\/1283472.","DOI":"10.1155\/2019\/1283472"},{"issue":"18","key":"2001_CR55","doi-asserted-by":"publisher","first-page":"13039","DOI":"10.1007\/S00500-021-06608-1\/FIGURES\/12","volume":"27","author":"M Mittal","year":"2022","unstructured":"Mittal M, Kumar K, Behal S (2022) Deep learning approaches for detecting DDoS attacks: a systematic review. Soft Compute 27(18):13039\u201313075. https:\/\/doi.org\/10.1007\/S00500-021-06608-1\/FIGURES\/12","journal-title":"Soft Compute"},{"issue":"1","key":"2001_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41666-020-00082-4","volume":"5","author":"J Xu","year":"2021","unstructured":"Xu J, Glicksberg BS, Su C, Walker P, Bian J, Wang F (2021) Federated Learning for Healthcare Informatics. J Healthc Inform Res 5(1):1\u201319. https:\/\/doi.org\/10.1007\/s41666-020-00082-4","journal-title":"J Healthc Inform Res"},{"key":"2001_CR57","doi-asserted-by":"publisher","first-page":"106775","DOI":"10.1016\/j.knosys.2021.106775","volume":"216","author":"C Zhang","year":"2021","unstructured":"Zhang C, Xie Y, Bai H, Yu B, Li W, Gao Y (M2021) A survey on federated learning. Knowl Based Syst 216:106775. https:\/\/doi.org\/10.1016\/j.knosys.2021.106775","journal-title":"Knowl Based Syst"},{"key":"2001_CR58","doi-asserted-by":"publisher","unstructured":"H. Chen et al., \u201cActPerFL: Active Personalized Federated Learning,\u201d 1\u20135, Jun. 2022, https:\/\/doi.org\/10.18653\/v1\/2022.fl4nlp-1.1.","DOI":"10.18653\/v1\/2022.fl4nlp-1.1"},{"key":"2001_CR59","doi-asserted-by":"publisher","unstructured":"T. Zhang, C. He, T. Ma, L. Gao, M. Ma, and S. Avestimehr, \u201cFederated Learning for Internet of Things,\u201d SenSys 2021 - Proceedings of the 2021 19th ACM Conference on Embedded Networked Sensor Systems, pp. 413\u2013419, Nov. 2021, https:\/\/doi.org\/10.1145\/3485730.3493444.","DOI":"10.1145\/3485730.3493444"},{"key":"2001_CR60","doi-asserted-by":"publisher","unstructured":"R. Zeng, C. Zeng, X. Wang, B. Li, and X. Chu, \u201cA Comprehensive Survey of Incentive Mechanism for Federated Learning,\u201d Jun. 2021, https:\/\/doi.org\/10.48550\/arxiv.2106.15406.","DOI":"10.48550\/arxiv.2106.15406"},{"key":"2001_CR61","doi-asserted-by":"publisher","first-page":"100549","DOI":"10.1016\/J.JII.2023.100549","volume":"38","author":"C Ni","year":"2024","unstructured":"Ni C, Li SC (2024) Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions. J Ind Inf Integr 38:100549. https:\/\/doi.org\/10.1016\/J.JII.2023.100549","journal-title":"J Ind Inf Integr"},{"issue":"3","key":"2001_CR62","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y et al (2018) N-BaIoT-Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322. https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervasive Comput"},{"key":"2001_CR63","doi-asserted-by":"publisher","unstructured":"B. Paharia and K. Bhushan, \u201cA comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment,\u201d Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 493\u2013524, Jan. 2019, https:\/\/doi.org\/10.1007\/978-3-030-22277-2_20\/FIGURES\/10.","DOI":"10.1007\/978-3-030-22277-2_20\/FIGURES\/10"},{"key":"2001_CR64","doi-asserted-by":"publisher","unstructured":"K. Blockchain et al., \u201cBlockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey,\u201d Sensors 2022, Vol. 22, Page 1094, vol. 22, no. 3, p. 1094, Jan. 2022, https:\/\/doi.org\/10.3390\/S22031094.","DOI":"10.3390\/S22031094"},{"key":"2001_CR65","doi-asserted-by":"publisher","unstructured":"Y. Zhao, M. Li, L. Lai, N. Suda, D. Civin, and V. Chandra, \u201cFederated Learning with Non-IID Data,\u201d Jun. 2018, https:\/\/doi.org\/10.48550\/arXiv.1806.00582.","DOI":"10.48550\/arXiv.1806.00582"},{"issue":"3","key":"2001_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00960ED2V01Y201910AIM043","volume":"13","author":"Q Yang","year":"2020","unstructured":"Yang Q, Liu Y, Cheng Y, Kang Y, Chen T, Yu H (Dec.2020) Federated Learning. Synthesis Lectures on Artif Intell Mach Learn 13(3):1\u2013207. https:\/\/doi.org\/10.2200\/S00960ED2V01Y201910AIM043","journal-title":"Synthesis Lectures on Artif Intell Mach Learn"},{"key":"2001_CR67","doi-asserted-by":"publisher","unstructured":"L. Yang, B. Tan, V. W. Zheng, K. Chen, and Q. Yang, \u201cFederated Recommendation Systems,\u201d Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12500 LNCS, 225\u2013239, 2020, https:\/\/doi.org\/10.1007\/978-3-030-63076-8_16.","DOI":"10.1007\/978-3-030-63076-8_16"},{"key":"2001_CR68","doi-asserted-by":"publisher","unstructured":"L. Lyu, H. Yu, J. Zhao, and Q. Yang, \u201cThreats to Federated Learning,\u201d Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12500 LNCS, pp. 3\u201316, 2020, https:\/\/doi.org\/10.1007\/978-3-030-63076-8_1.","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"2001_CR69","doi-asserted-by":"crossref","unstructured":"H. Wang, M. Yurochkin, Y. Sun, D. Papailiopoulos, and Y. Khazaeni, \u201cFederated Learning with Matched Averaging,\u201d 8th International Conference on Learning Representations, ICLR 2020, Feb. 2020, Accessed: Aug. 31, 2023. [Online]. Available: https:\/\/arxiv.org\/abs\/2002.06440v1","DOI":"10.1109\/ICNP49622.2020.9259386"},{"key":"2001_CR70","unstructured":"H. Wang, M. Yurochkin, Y. Sun, D. Papailiopoulos, and Y. Khazaeni, \u201cFEDERATED LEARNING WITH MATCHED AVERAGING\u201d, Accessed: Aug. 20, 2023. [Online]. Available: https:\/\/github.com\/IBM\/FedMA"},{"key":"2001_CR71","unstructured":"\u201cdetection_of_IoT_botnet_attacks_N_BaIoT Data Set Dataset | Papers With Code.\u201d Accessed: Aug. 30, 2023. [Online]. Available: https:\/\/paperswithcode.com\/dataset\/detection-of-iot-botnet-attacks-n-baiot-data"},{"key":"2001_CR72","doi-asserted-by":"publisher","unstructured":"A. Mudgerikar, P. Sharma, and E. Bertino, \u201cEdge-Based Intrusion Detection for IoT devices,\u201d ACM Transactions on Management Information Systems (TMIS), vol. 11, no. 4, Oct. 2020, https:\/\/doi.org\/10.1145\/3382159.","DOI":"10.1145\/3382159"},{"key":"2001_CR73","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/J.COMCOM.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal S et al (2022) Federated Learning for intrusion detection system: Concepts, challenges and future directions. Comput Commun 195:346\u2013361. https:\/\/doi.org\/10.1016\/J.COMCOM.2022.09.012","journal-title":"Comput Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02001-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02001-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02001-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:44Z","timestamp":1758986504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02001-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,4]]},"references-count":73,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2001"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02001-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,6,4]]},"assertion":[{"value":"2 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"There are no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"198"}}