{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:49Z","timestamp":1765622509284,"version":"3.48.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02151-0","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T08:30:19Z","timestamp":1762158619000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AI-driven intrusion detection and mitigation framework for software-defined IoT networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Jamal","family":"Alotaibi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"issue":"4","key":"2151_CR1","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.3390\/s21041174","volume":"21","author":"YB Zikria","year":"2021","unstructured":"Zikria YB, Ali R, Afzal MK, Kim SW (2021) Next-generation internet of things (iot): opportunities, challenges, and solutions. Sensors 21(4):1174","journal-title":"Sensors"},{"issue":"1","key":"2151_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-025-00152-2","volume":"5","author":"S Hudda","year":"2025","unstructured":"Hudda S, Haribabu K (2025) A review on WSN based resource constrained smart IoT systems. Discover Internet of Things 5(1):56","journal-title":"Discover Internet of Things"},{"issue":"3","key":"2151_CR3","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3390\/electronics11030494","volume":"11","author":"MH Ali","year":"2022","unstructured":"Ali MH, Jaber MM, Abd SK, Rehman A, Awan MJ, Dama\u0161evi\u010dius R, Bahaj SA (2022) Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3):494","journal-title":"Electronics"},{"key":"2151_CR4","doi-asserted-by":"crossref","unstructured":"Farooq MS, Riaz S, Alvi A (2023) Security and privacy issues in software-defined networking (SDN): a systematic literature review. Electronics 12(14):3077","DOI":"10.3390\/electronics12143077"},{"key":"2151_CR5","first-page":"2773","volume":"10","author":"KMN Shaik","year":"2025","unstructured":"Shaik KMN (2025) SDN-based detection and mitigation of botnet traffic in large-scale networks. World J Adv Res Reviews 10:2773\u20132784","journal-title":"World J Adv Res Reviews"},{"issue":"3","key":"2151_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MWC.001.2000428","volume":"28","author":"T Alladi","year":"2021","unstructured":"Alladi T, Kohli V, Chamola V, Yu FR, Guizani M (2021) Artificial intelligence (AI)-empowered intrusion detection architecture for the internet of vehicles. IEEE Wirel Commun 28(3):144\u2013149","journal-title":"IEEE Wirel Commun"},{"key":"2151_CR7","doi-asserted-by":"publisher","unstructured":"Alansary SA, Ayyad SM, Talaat FM, Saafan MM (2025) Emerging AI threats in cybercrime: a review of zero-day attacks via machine, deep, and federated learning. Knowl Inf Syst 1\u201337. https:\/\/doi.org\/10.1007\/s10115-025-02556-6","DOI":"10.1007\/s10115-025-02556-6"},{"issue":"6","key":"2151_CR8","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari A (2023) Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput 26(6):3753\u20133780","journal-title":"Cluster Comput"},{"issue":"1","key":"2151_CR9","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4(1):18","journal-title":"Cybersecurity"},{"key":"2151_CR10","doi-asserted-by":"crossref","unstructured":"Karaca KN, \u00c7etin A (2025) Systematic review of current approaches and innovative solutions for combating zero-day vulnerabilities and zero-day attacks. IEEE Access 13","DOI":"10.1109\/ACCESS.2025.3577941"},{"issue":"11","key":"2151_CR11","doi-asserted-by":"publisher","first-page":"8364","DOI":"10.1109\/JIOT.2022.3161050","volume":"9","author":"J Bian","year":"2022","unstructured":"Bian J, Arafat AA, Xiong H, Li J, Li L, Chen H, Wang J (2022) Dejing Dou, and Zhishan Guo. Machine learning in real-time internet of things (IoT) systems: A survey. IEEE Internet Things J 9(11):8364\u20138386","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2151_CR12","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","volume":"25","author":"N Moustafa","year":"2023","unstructured":"Moustafa N, Koroniotis N, Keshk M, Zomaya AY, Tari Z (2023) Explainable intrusion detection for cyber defences on the internet of things: opportunities and solutions. IEEE Commun Surv Tutor 25(3):1775\u20131807","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"2151_CR13","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","volume":"22","author":"O Abdulganiyu","year":"2023","unstructured":"Abdulganiyu O, Harazeem TA (2023) Tchakoucht, and Yakub Kayode Saheed. A systematic literature review for network intrusion detection system (IDS). Int J Inf Secur 22(5):1125\u20131162","journal-title":"Int J Inf Secur"},{"key":"2151_CR14","first-page":"251","volume":"70","author":"M Belgaum","year":"2022","unstructured":"Belgaum M, Riyaz F, Ali Z, Alansari S, Musa MM, Alam (2022) Mazliham. Artificial intelligence based reliable load balancing framework in software-defined networks. CMC\u2014Comput. Mater Contin 70:251\u2013266","journal-title":"Mater Contin"},{"key":"2151_CR15","doi-asserted-by":"publisher","first-page":"22756","DOI":"10.1109\/ACCESS.2022.3153716","volume":"10","author":"MS Muthanna","year":"2022","unstructured":"Muthanna MS, Ali R, Alkanhel A, Muthanna (2022) Ahsan Rafiq, and Wadhah Ahmed muthanna Abdullah. Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT). IEEe Access 10:22756\u201322768","journal-title":"IEEe Access"},{"issue":"1","key":"2151_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/info14010041","volume":"14","author":"R Chaganti","year":"2023","unstructured":"Chaganti R, Suliman W, Ravi V, Dua A (2023) Deep learning approach for SDN-enabled intrusion detection system in IoT networks. MDPI, Information 14(1):41","journal-title":"Information"},{"key":"2151_CR17","doi-asserted-by":"publisher","first-page":"28934","DOI":"10.1109\/ACCESS.2023.3260256","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr WI, Ameer E, Gouda, Ehab R, Mohamed (2023) FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks. Ieee Access 11:28934\u201328954","journal-title":"Ieee Access"},{"issue":"16","key":"2151_CR18","doi-asserted-by":"publisher","first-page":"3552","DOI":"10.3390\/math11163552","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr WI, Gouda AE, Mohamed ER (2023) P4-HLDMC: a novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi-controller architecture. Mathematics 11(16):3552","journal-title":"Mathematics"},{"key":"2151_CR19","doi-asserted-by":"crossref","unstructured":"Zaidoun AS, Baccouch H, Guermazi A, Lachiri Z (2023) Artificial intelligence for securing SDIoT: challenges and countermeasures. In 2023 20th International Multi-Conference on Systems, Signals & Devices (SSD), pp. 236\u2013242. IEEE","DOI":"10.1109\/SSD58187.2023.10411237"},{"key":"2151_CR20","doi-asserted-by":"publisher","first-page":"103404","DOI":"10.1016\/j.adhoc.2024.103404","volume":"156","author":"A Singh","year":"2024","unstructured":"Singh A, Chouhan PK, Gagangeet Singh A (2024) SecureFlow: knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment. Ad Hoc Netw 156:103404","journal-title":"Ad Hoc Netw"},{"key":"2151_CR21","first-page":"1","volume":"14","author":"W Min","year":"2024","unstructured":"Min W, Almughalles W, Muthanna MSA, Ouamri MA, Muthanna A, Hong S, Abd El-Latif AA (2024) An SDN-orchestrated artificial intelligence-empowered framework to combat intrusions in the next generation cyber-physical systems. Human-Centric Comput Inform Sci 14:1\u201318","journal-title":"Human-Centric Comput Inform Sci"},{"key":"2151_CR22","doi-asserted-by":"crossref","unstructured":"Suresh Babu CH, Hruday BSSS, Krishna JVVS, Sandeep C, Naveen B (2024) Iot threat mitigation: leveraging deep learning for intrusion detection. J Adv Zool 45(3), p801\u2013810","DOI":"10.53555\/jaz.v45i3.4132"},{"issue":"1","key":"2151_CR23","doi-asserted-by":"publisher","first-page":"21789","DOI":"10.1038\/s41598-024-72049-z","volume":"14","author":"A Qaddos","year":"2024","unstructured":"Qaddos A, Yaseen MU, Al-Shamayleh AS, Imran M (2024) Adnan Akhunzada, and Salman Z. Alharthi. A novel intrusion detection framework for optimizing IoT security. Sci Rep 14(1):21789","journal-title":"Sci Rep"},{"key":"2151_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101231","volume":"26","author":"AA Toony","year":"2024","unstructured":"Toony AA, Alqahtani F, Alginahi Y, Said W (2024) Multi-block: a novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure. Internet of Things 26:101231","journal-title":"Internet of Things"},{"key":"2151_CR25","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.053542","author":"Z Mahdi","year":"2024","unstructured":"Mahdi Z, Abdalhussien N, Mahmood N, Zaki R (2024) Detection of real-time distributed denial-of-service (DDoS) attacks on internet of things (IoT) networks using machine learning algorithms. Comput Mater Contin. https:\/\/doi.org\/10.32604\/cmc.2024.053542","journal-title":"Comput Mater Contin"},{"key":"2151_CR26","doi-asserted-by":"publisher","first-page":"123853","DOI":"10.1016\/j.eswa.2024.123853","volume":"250","author":"C Kumar","year":"2024","unstructured":"Kumar C, Md Sarfaraj Alam Ansari (2024) An explainable nature-inspired cyber attack detection system in Software-Defined IoT applications. Expert Syst Appl 250:123853","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2151_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.58496\/MJCS\/2024\/016","volume":"4","author":"RM Zaki","year":"2024","unstructured":"Zaki RM, Inam S (2024) Naser. Hybrid classifier for detecting zero-day attacks on IoT networks. Mesopotamian J Cybersecur 4(3):59\u201374","journal-title":"Mesopotamian J Cybersecur"},{"issue":"2","key":"2151_CR28","doi-asserted-by":"publisher","first-page":"e471","DOI":"10.1002\/spy2.471","volume":"8","author":"ZS Mahdi","year":"2025","unstructured":"Mahdi ZS, Rana M, Zaki, Alzubaidi L (2025) Advanced hybrid techniques for cyberattack detection and defense in IoT networks. Secur Priv 8(2):e471","journal-title":"Secur Priv"},{"key":"2151_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104109","volume":"148","author":"P Kumar","year":"2025","unstructured":"Kumar P, Jolfaei A, Najmul Islam AKM (2025) An enhanced deep-learning empowered threat-hunting framework for software-defined internet of things. Comput Secur 148:104109","journal-title":"Comput Secur"},{"key":"2151_CR30","doi-asserted-by":"publisher","first-page":"106646","DOI":"10.1016\/j.compag.2021.106646","volume":"193","author":"A Amirruddin","year":"2022","unstructured":"Amirruddin A, Diyana FM, Muharam MH, Ismail NP, Tan, Mohd Firdaus I (2022) Synthetic minority Over-sampling technique (SMOTE) and logistic model tree (LMT)-Adaptive boosting algorithms for classifying imbalanced datasets of nutrient and chlorophyll sufficiency levels of oil palm (Elaeis guineensis) using spectroradiometers and unmanned aerial vehicles. Comput Electron Agric 193:106646","journal-title":"Comput Electron Agric"},{"issue":"12","key":"2151_CR31","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.3390\/sym15122185","volume":"15","author":"M Shantal","year":"2023","unstructured":"Shantal M, Othman Z, Bakar AA (2023) A novel approach for data feature weighting using correlation coefficients and min\u2013max normalization. Symmetry 15(12):2185","journal-title":"Symmetry"},{"key":"2151_CR32","volume":"16","author":"IU Ekanayake","year":"2022","unstructured":"Ekanayake IU, Meddage DPP, Rathnayake U (2022) A novel approach to explain the black-box nature of machine learning in compressive strength predictions of concrete using Shapley additive explanations (SHAP). Case Stud Constr Mater 16:e01059","journal-title":"Case Stud Constr Mater"},{"issue":"24","key":"2151_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/rs14246218","volume":"14","author":"CA Ramezan","year":"2022","unstructured":"Ramezan CA (2022) Transferability of recursive feature elimination (RFE)-derived feature sets for support vector machine land cover classification. Remote Sens 14(24):6218","journal-title":"Remote Sens"},{"issue":"1","key":"2151_CR34","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00876-4","volume":"11","author":"B Khemani","year":"2024","unstructured":"Khemani B, Patil S, Kotecha K, Tanwar S (2024) A review of graph neural networks: concepts, architectures, techniques, challenges, datasets, applications, and future directions. J Big Data 11(1):18","journal-title":"J Big Data"},{"key":"2151_CR35","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2022.3171559","volume":"10","author":"Y Lee","year":"2022","unstructured":"Lee Y (2022) Anovit: unsupervised anomaly detection and localization with vision transformer-based encoder-decoder. IEEE Access 10:46717\u201346724","journal-title":"IEEE Access"},{"key":"2151_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.cirpj.2022.11.003","volume":"40","author":"C Li","year":"2023","unstructured":"Li C, Zheng P, Yin Y, Wang B, Wang L (2023) Deep reinforcement learning in smart manufacturing: a review and prospects. CIRP J Manuf Sci Technol 40:75\u2013101","journal-title":"CIRP J Manuf Sci Technol"},{"issue":"7","key":"2151_CR37","doi-asserted-by":"publisher","first-page":"4600","DOI":"10.1109\/TSMC.2021.3098451","volume":"52","author":"Y Gu","year":"2021","unstructured":"Gu Y, Cheng Y, Chen CLP, Wang X (2021) Proximal policy optimization with policy feedback. IEEE Trans Syst Man Cybernetics: Syst 52(7):4600\u20134610","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"issue":"17","key":"2151_CR38","doi-asserted-by":"publisher","first-page":"13822","DOI":"10.1016\/j.jfranklin.2022.08.021","volume":"360","author":"M Franz","year":"2023","unstructured":"Franz M, Wolf L, Periyasamy M, Ufrecht C, Scherer DD (2023) Axel Plinge, Christopher Mutschler, and Wolfgang Mauerer. Uncovering instabilities in variational-quantum deep q-networks. J Franklin Inst 360(17):13822\u201313844","journal-title":"J Franklin Inst"},{"issue":"2","key":"2151_CR39","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s13042-022-01647-y","volume":"14","author":"J Wen","year":"2023","unstructured":"Wen J, Zhang Z, Lan Y, Cui Z, Jianghui Cai, and, Zhang W (2023) A survey on federated learning: challenges and applications. Int J Mach Learn Cybernet 14(2):513\u2013535","journal-title":"Int J Mach Learn Cybernet"},{"key":"2151_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102796","volume":"116","author":"D Wang","year":"2025","unstructured":"Wang D, Guan S (2025) FedFR-ADP: adaptive differential privacy with feedback regulation for robust model performance in federated learning. Inf Fusion 116:102796","journal-title":"Inf Fusion"},{"issue":"1","key":"2151_CR41","doi-asserted-by":"publisher","first-page":"2756","DOI":"10.1038\/s41598-024-52670-8","volume":"14","author":"C Sundar Ganesh","year":"2024","unstructured":"Sundar Ganesh C, Sankaran C, Kumar M, Premkumar, Bizuwork Derebew (2024) Enhancing photovoltaic parameter estimation: integration of non-linear hunting and reinforcement learning strategies with golden Jackal optimizer. Sci Rep 14(1):2756","journal-title":"Sci Rep"},{"key":"2151_CR42","unstructured":"CIC IoT dataset (2023) A real-time dataset and benchmark for large-scale attacks in IoT environment. Available on https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2023.html"},{"key":"2151_CR43","unstructured":"The TON_IoT Datasets Available on https:\/\/research.unsw.edu.au\/projects\/toniot-datasets"},{"key":"2151_CR44","unstructured":"Edge-IIoTset Cyber Security Dataset Available on https:\/\/www.kaggle.com\/datasets\/mohamedamineferrag\/edgeiiotset-cyber-security-dataset-of-iot-iiot"},{"issue":"1","key":"2151_CR45","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s44196-023-00205-w","volume":"16","author":"J Awotunde","year":"2023","unstructured":"Awotunde J, Bamidele FE, Ayo R, Panigrahi A, Garg (2023) Akash Kumar Bhoi, and Paolo Barsocchi. A multi-level random forest model-based intrusion detection using fuzzy inference system for internet of things networks. Int J Comput Intell Syst 16(1):31","journal-title":"Int J Comput Intell Syst"},{"issue":"12","key":"2151_CR46","doi-asserted-by":"publisher","first-page":"15392","DOI":"10.1109\/TITS.2022.3187252","volume":"24","author":"MAA Da Cruz","year":"2022","unstructured":"Da Cruz MAA, Abbade LR, Lorenz P, Mafra SB, Rodrigues JJPC (2022) Detecting compromised IoT devices through XGBoost. IEEE Trans Intell Transp Syst 24(12):15392\u201315399","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2151_CR47","first-page":"3806459","volume":"1","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Theyazn HHA (2021) Botnet attack detection by using CNN-LSTM model for Internet of Things applications. Sec Commun Netw 1:3806459","journal-title":"Sec Commun Netw"},{"issue":"4","key":"2151_CR48","doi-asserted-by":"publisher","DOI":"10.3390\/s22041582","volume":"22","author":"D Javeed","year":"2022","unstructured":"Javeed D, Gao T, Khan MT, Shoukat D (2022) A hybrid intelligent framework to combat sophisticated threats in secure industries. Sensors (Basel) 22(4):1582","journal-title":"Sensors (Basel)"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02151-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02151-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02151-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:42Z","timestamp":1765622262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02151-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2151"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02151-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"9 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"321"}}