{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:29:11Z","timestamp":1765268951716,"version":"build-2065373602"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s13042-024-02147-x","type":"journal-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T06:02:03Z","timestamp":1715580123000},"page":"6997-7018","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model"],"prefix":"10.1007","volume":"16","author":[{"given":"M.","family":"Revathi","sequence":"first","affiliation":[]},{"given":"S. Kiruthika","family":"Devi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"2147_CR1","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A Survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182\u20138201","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2147_CR2","doi-asserted-by":"publisher","first-page":"816","DOI":"10.3390\/s20030816","volume":"20","author":"J Galeano-Brajones","year":"2020","unstructured":"Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Vald\u00e9s JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors (Basel) 20(3):816","journal-title":"Sensors (Basel)"},{"key":"2147_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100279","volume":"37","author":"J Singh","year":"2020","unstructured":"Singh J, Behal S (2020) Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev 37:100279","journal-title":"Comput Sci Rev"},{"key":"2147_CR4","doi-asserted-by":"publisher","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","volume":"7","author":"D Papamartzivanos","year":"2019","unstructured":"Papamartzivanos D, Gomez Marmol F, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546\u201313560","journal-title":"IEEE Access"},{"key":"2147_CR5","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.comnet.2018.07.025","volume":"144","author":"T Aldwairi","year":"2018","unstructured":"Aldwairi T, Perera D, Novotny MA (2018) An evaluation of the performance of restricted Boltzmann machines as a model for anomaly network intrusion detection. Comput Netw 144:111\u2013119","journal-title":"Comput Netw"},{"issue":"6","key":"2147_CR6","first-page":"76","volume":"135","author":"A Elsaeidy","year":"2018","unstructured":"Elsaeidy A, Munasinghe KS, Sharma D, Jamalipour A (2018) Intrusion detection in smart cities using restricted Boltzmann machines. J Netw Comput Appl 135(6):76\u201383","journal-title":"J Netw Comput Appl"},{"key":"2147_CR7","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener Comput Syst 100:779\u2013796","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2147_CR8","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","volume":"19","author":"DB Rawat","year":"2017","unstructured":"Rawat DB, Reddy SR (2017) Software-defined networking architecture, security and energy efficiency: a survey. IEEE Commun Surv Tuts 19(1):325\u2013346","journal-title":"IEEE Commun Surv Tuts"},{"key":"2147_CR9","doi-asserted-by":"crossref","unstructured":"Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the Internet of things. In: 2016 IEEE Symposium on Computers and Communication, pp 1109\u20131111","DOI":"10.1109\/ISCC.2016.7543884"},{"key":"2147_CR10","doi-asserted-by":"crossref","unstructured":"Nobakht M, Sivaraman V, Borelli R (2016) A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: International Conference on Availability, Reliability and Security, pp 147\u2013156","DOI":"10.1109\/ARES.2016.64"},{"key":"2147_CR11","doi-asserted-by":"crossref","unstructured":"Bull P, Austin R, Sharma M, Watson R (2016) Flow-based security for IoT devices using an SDN gateway. In: IEEE International Conference on Future Internet of Things and Cloud, pp 157\u2013163","DOI":"10.1109\/FiCloud.2016.30"},{"key":"2147_CR12","doi-asserted-by":"crossref","unstructured":"Tortonesi M, Michaelis J, Morelli A, Suri N, Baker MA (2016) SPF: an SDN-based middleware solution to mitigate the IoT information explosion. In: Proceedings of the IEEE Symposium on Computers and Communication, Messina, Italy, 27\u201330 June 2016, pp 435\u2013442","DOI":"10.1109\/ISCC.2016.7543778"},{"key":"2147_CR13","doi-asserted-by":"crossref","unstructured":"\u00d6z\u00e7elik M, Chalabianloo N, G\u00fcr G (2017) Software-defined edge defense against IoT-based DDoS. In: Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21\u201323 August 2017, pp 308\u2013313","DOI":"10.1109\/CIT.2017.61"},{"key":"2147_CR14","doi-asserted-by":"crossref","unstructured":"Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France, 1\u20132 July 2019, pp 1\u20139","DOI":"10.1145\/3341325.3342037"},{"key":"2147_CR15","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","volume":"7","author":"N Ravi","year":"2020","unstructured":"Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7:3559\u20133570","journal-title":"IEEE Internet Things J"},{"key":"2147_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2018.03.008","volume":"122","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Singh S, Park JH (2018) OpCloudSec: open cloud software-defined wireless network security for the Internet of Things. Comput Commun 122:1\u20138","journal-title":"Comput Commun"},{"key":"2147_CR17","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) \u2019 Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761\u2013768","journal-title":"Future Gener Comput Syst"},{"key":"2147_CR18","first-page":"377","volume":"47","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman S, Alazab M, Vinayakumar R (2019) \u2019A hybrid deep learning image-based analysis for effective malware detection. J Inj Secur Appl 47:377\u2013389","journal-title":"J Inj Secur Appl"},{"key":"2147_CR19","first-page":"159","volume-title":"Empirical research for software security","author":"W Aigner","year":"2017","unstructured":"Aigner W et al (2017) Visual analytics: foundations and experiences in malware analysis. Empirical research for software security. CRC Press, pp 159\u2013192"},{"key":"2147_CR20","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373\u201330385","journal-title":"IEEE Access"},{"key":"2147_CR21","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. https:\/\/doi.org\/10.14236\/ewic\/icscsr19.16","DOI":"10.14236\/ewic\/icscsr19.16"},{"key":"2147_CR22","doi-asserted-by":"crossref","unstructured":"Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp 256\u2013265","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"2147_CR23","doi-asserted-by":"publisher","first-page":"114607","DOI":"10.1109\/ACCESS.2019.2935142","volume":"7","author":"O Alkadi","year":"2019","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo K-KR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607\u2013114618","journal-title":"IEEE Access"},{"key":"2147_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"P Rajesh-Kanna","year":"2022","unstructured":"Rajesh-Kanna P, Santhi P (2022) Hybrid Intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194:116545. https:\/\/doi.org\/10.1016\/j.eswa.2022.116545","journal-title":"Expert Syst Appl"},{"key":"2147_CR25","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.3390\/s22041340","volume":"22","author":"S Ullah","year":"2022","unstructured":"Ullah S, Khan MA, Ahmad J, Jamal SS, Huma Z, Hassan MT, Pitropakis N, Arshad N, Buchanan WJ (2022) HDL-IDS: a hybrid deep learning architecture for intrusion detection in the internet of vehicles. Sensors 22:1340. https:\/\/doi.org\/10.3390\/s22041340","journal-title":"Sensors"},{"issue":"7","key":"2147_CR26","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58(7):121\u2013134","journal-title":"Pattern Recogn"},{"issue":"61","key":"2147_CR27","first-page":"27","volume":"96","author":"H Shao","year":"2016","unstructured":"Shao H, Jiang H, Li X, Liang T (2016) Rolling bearing fault detection using continuous deep belief network with locally linear embedding. Comput Ind 96(61):27\u201339","journal-title":"Comput Ind"},{"key":"2147_CR28","doi-asserted-by":"publisher","first-page":"51691","DOI":"10.1109\/ACCESS.2019.2908998","volume":"7","author":"BA Khalaf","year":"2019","unstructured":"Khalaf BA, Mostafa SA, Mustapha A, Mohammed MA, Abduallah WM (2019) Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7:51691\u201351713","journal-title":"IEEE Access"},{"key":"2147_CR29","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1063\/1.1699114","volume":"21","author":"N Metropolis","year":"1953","unstructured":"Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equations of state calculations by fast computing machines. J Chem Phys 21:1087\u20131091","journal-title":"J Chem Phys"},{"key":"2147_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4145-2","volume-title":"Monte Carlo statistical methods","author":"CP Robert","year":"2004","unstructured":"Robert CP, Casella G (2004) Monte Carlo statistical methods. Springer"},{"key":"2147_CR31","first-page":"3945","volume":"69","author":"Z Kamil","year":"2021","unstructured":"Kamil Z, Robiah Y, Mostafa S, Bahaman N, Musa O, Al-rimy B (2021) Deep IoT-IDS: hybrid deep learning for enhancing IoT network intrusion detection. Comput Mater Contin 69:3945\u20133966","journal-title":"Comput Mater Contin"},{"key":"2147_CR32","unstructured":"Ruder S (2016) An overview of gradient descent optimization algorithms. Sebastian Ruder"},{"key":"2147_CR33","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ali A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the He Fourth International Conference on Information Systems Security and Privacy (ICISSP), Madeira, Portugal, January 2018","DOI":"10.5220\/0006639801080116"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02147-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02147-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02147-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T16:57:21Z","timestamp":1760547441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02147-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2147"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02147-x","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"30 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}