{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:54:32Z","timestamp":1770749672092,"version":"3.50.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04417-z","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:04:02Z","timestamp":1759233842000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Deep Learning and Blockchain Framework for Real-Time IoT DDoS Resilience"],"prefix":"10.1007","volume":"6","author":[{"given":"Manjit Kumar","family":"Nayak","sequence":"first","affiliation":[]},{"given":"Kousik","family":"Dehury","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Gountia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"issue":"5","key":"4417_CR1","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.3390\/s25051346","volume":"25","author":"NU Ain","year":"2025","unstructured":"Ain NU, Sardaraz M, Tahir M, Abo Elsoud MW, Alourani A. Securing IoT networks against ddos attacks: a hybrid deep learning approach. Sensors. 2025;25(5):1346.","journal-title":"Sensors"},{"issue":"2","key":"4417_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):33. https:\/\/doi.org\/10.1007\/s10922-023-09722-7.","journal-title":"J Netw Syst Manage"},{"issue":"1","key":"4417_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s12083-024-01857-x","volume":"18","author":"G Suneetha","year":"2024","unstructured":"Suneetha G, Haripriya D. An enhanced deep learning integrated blockchain framework for securing industrial IoT. Peer-to-Peer Network Appl. 2024;18(1):28. https:\/\/doi.org\/10.1007\/s12083-024-01857-x.","journal-title":"Peer-to-Peer Network Appl"},{"key":"4417_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/technologies12100203","volume":"10","author":"A Deshmukh","year":"2024","unstructured":"Deshmukh A, Ravulakollu K. An efficient CNN-based intrusion detection system for IoT: Use case towards cybersecurity. Technologies. 2024;10:12. https:\/\/doi.org\/10.3390\/technologies12100203.","journal-title":"Technologies"},{"key":"4417_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/jsan11030032","volume":"3","author":"KO Adefemi Alimi","year":"2022","unstructured":"Adefemi Alimi KO, Ouahada K, Abu-Mahfouz AM, Rimer S, Alimi OA. Refined ISTM based intrusion detection for denial-of-service attack in internet of things. J Sensor Actuat Netw. 2022;3:11. https:\/\/doi.org\/10.3390\/jsan11030032.","journal-title":"J Sensor Actuat Netw"},{"issue":"7","key":"4417_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2024.102777","volume":"15","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Qureshi SS, Qureshi SU, Ullah F, et al. A deep learning-based novel hybrid CNN-ISTM architecture for efficient detection of threats in the IoT ecosystem. Ain Shams Eng J. 2024;15(7):102777. https:\/\/doi.org\/10.1016\/j.asej.2024.102777.","journal-title":"Ain Shams Eng J"},{"key":"4417_CR7","doi-asserted-by":"publisher","first-page":"82443","DOI":"10.1109\/ACCESS.2024.3404778","volume":"12","author":"L Sana","year":"2024","unstructured":"Sana L, Nazir MM, Yang J, Hussain L, Chen Y-L, Ku CS, et al. Securing the IoT cyber environment: Enhancing intrusion anomaly detection with vision transformers. IEEE Access. 2024;12:82443\u201368. https:\/\/doi.org\/10.1109\/ACCESS.2024.3404778.","journal-title":"IEEE Access"},{"issue":"2","key":"4417_CR8","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1007\/s11227-023-05517-4","volume":"80","author":"C Zhonghua","year":"2024","unstructured":"Zhonghua C, Goyal SB, Rajawat AS. Smart contracts attribute-based access control model for security and privacy of IoT system using blockchain and edge computing. J Supercomput. 2024;80(2):1396\u2013425. https:\/\/doi.org\/10.1007\/s11227-023-05517-4.","journal-title":"J Supercomput"},{"key":"4417_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.future.2024.06.048","volume":"161","author":"C Li","year":"2024","unstructured":"Li C, Pan H, Qian H, Li Y, Si X, Li K, et al. Hierarchical sharding blockchain storage solution for edge computing. Fut Gen Comput Syst. 2024;161:162\u201373. https:\/\/doi.org\/10.1016\/j.future.2024.06.048.","journal-title":"Fut Gen Comput Syst"},{"issue":"1","key":"4417_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10207-023-00719-6","volume":"23","author":"PM Chanal","year":"2024","unstructured":"Chanal PM, Kakkasageri MS. Blockchain-based data integrity framework for internet of things. Int J Inf Secur. 2024;23(1):519\u201332. https:\/\/doi.org\/10.1007\/s10207-023-00719-6.","journal-title":"Int J Inf Secur"},{"key":"4417_CR11","doi-asserted-by":"publisher","unstructured":"Golder SS, Mondal S, Das S, Bose R, Sutradhar S, Mondal H. Hybrid blockchain framework for secure and scalable internet of things (IoT) networks (hb-iot): A novel approach. In: 2024 International conference on artificial intelligence and quantum computation-based sensor application (ICAIQSA), pp. 1\u20137 (2024). https:\/\/doi.org\/10.1109\/ICAIQSA64000.2024.10882319","DOI":"10.1109\/ICAIQSA64000.2024.10882319"},{"issue":"2","key":"4417_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s12083-024-01855-z","volume":"18","author":"D Rani","year":"2024","unstructured":"Rani D, Gill NS, Gulia P, Yahya M, Ahanger TA, Hassan MM, et al. A secure digital evidence preservation system for an IoT-enabled smart environment using ipfs, blockchain, and smart contracts. Peer-to-Peer Netw Appl. 2024;18(2):5. https:\/\/doi.org\/10.1007\/s12083-024-01855-z.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4417_CR13","doi-asserted-by":"crossref","unstructured":"Arun AR, Souza AR, Sairam S, Vani V, Karthik N. Iot botnet detection using a hybrid of CNN-ISTM with blockchain. In: 2024 International conference on computing and intelligent reality technologies (ICCIRT), 2024;293\u201397","DOI":"10.1109\/ICCIRT59484.2024.10921767"},{"issue":"5","key":"4417_CR14","doi-asserted-by":"publisher","first-page":"7817","DOI":"10.1109\/JIOT.2023.3316669","volume":"11","author":"A Aljuhani","year":"2024","unstructured":"Aljuhani A, Kumar P, Alanazi R, Albalawi T, Taouali O, Islam AKMN, et al. A deep-learning-integrated blockchain framework for securing industrial IoT. IEEE Int Things J. 2024;11(5):7817\u201327. https:\/\/doi.org\/10.1109\/JIOT.2023.3316669.","journal-title":"IEEE Int Things J"},{"issue":"2","key":"4417_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, et al. Collaborative threat intelligence: enhancing IoT security through blockchain and machine learning integration. J King Saud Univ Comput Inform Sci. 2024;36(2):101939. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101939.","journal-title":"J King Saud Univ Comput Inform Sci"},{"issue":"6","key":"4417_CR16","first-page":"772","volume":"51","author":"A Goel","year":"2024","unstructured":"Goel A, Neduncheliyan S. Security enhancement of decentralized healthcare system by transformer blockchain mechanism. Eng Appl Sci Res. 2024;51(6):772\u201383.","journal-title":"Eng Appl Sci Res"},{"key":"4417_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/info16050406","volume":"5","author":"AM Almasabi","year":"2025","unstructured":"Almasabi AM, Alkhodre AB, Khemakhem M, Eassa F, Abi Sen AA, Harbaoui A. Internet of things-based anomaly detection hybrid framework simulation integration of deep learning and blockchain. Information. 2025;5:16. https:\/\/doi.org\/10.3390\/info16050406.","journal-title":"Information"},{"issue":"3","key":"4417_CR18","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s12083-025-01935-8","volume":"18","author":"J Alotaibi","year":"2025","unstructured":"Alotaibi J. A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities. Peer-to-Peer Netw Appl. 2025;18(3):123. https:\/\/doi.org\/10.1007\/s12083-025-01935-8.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4417_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa N. A new distributed architecture for evaluating AI-based security systems at the edge: Network ton_iot datasets. Sustain Cit Soc. 2021;72:102994. https:\/\/doi.org\/10.1016\/j.scs.2021.102994.","journal-title":"Sustain Cit Soc"},{"issue":"1","key":"4417_CR20","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","volume":"9","author":"TM Booij","year":"2022","unstructured":"Booij TM, Chiscop I, Meeuwissen E, Moustafa N, Hartog FTHD. Ton_iot: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Int Things J. 2022;9(1):485\u201396. https:\/\/doi.org\/10.1109\/JIOT.2021.3085194.","journal-title":"IEEE Int Things J"},{"key":"4417_CR21","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. Ton_iot telemetry dataset: A new generation dataset of iot and iiot for data-driven intrusion detection systems. IEEE Access. 2020;8:165130\u201350. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862.","journal-title":"IEEE Access"},{"key":"4417_CR22","doi-asserted-by":"publisher","unstructured":"Moustafa N, Keshky M, Debiez E, Janicke H. Federated ton_iot windows datasets for evaluating ai-based security applications. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), 2020;848\u201355 . https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00114","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"4417_CR23","doi-asserted-by":"publisher","unstructured":"Moustafa N, Ahmed M, Ahmed S. Data analytics-enabled intrusion detection: Evaluations of ton_iot linux datasets. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), 2020;727\u201335 . https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00100","DOI":"10.1109\/TrustCom50675.2020.00100"},{"key":"4417_CR24","doi-asserted-by":"publisher","unstructured":"Moustafa, N. New generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets. In: Proceedings of the eResearch Australasia conference. UNSW, Sydney, Brisbane, Australia (2019). https:\/\/doi.org\/10.26190\/5d7ac9bfe8487","DOI":"10.26190\/5d7ac9bfe8487"},{"key":"4417_CR25","doi-asserted-by":"crossref","unstructured":"Moustafa N. A systemic iot\u2013fog\u2013cloud architecture for big-data analytics and cyber security systems: A review of fog computing. Sec Edge Comput. 2021;41\u201350","DOI":"10.1201\/9781003028635-4"},{"key":"4417_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103041","volume":"72","author":"J Ashraf","year":"2021","unstructured":"Ashraf J, Keshk M, Moustafa N, Abdel-Basset M, Khurshid H, Bakhshi AD, et al. Iotbot-ids: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities. Sustain Cit Soc. 2021;72:103041. https:\/\/doi.org\/10.1016\/j.scs.2021.103041.","journal-title":"Sustain Cit Soc"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04417-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04417-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04417-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:04:05Z","timestamp":1759233845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04417-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":26,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4417"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04417-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"30 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Humans or Animals"}}],"article-number":"863"}}