{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:53:23Z","timestamp":1776466403085,"version":"3.51.2"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00156-y","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T08:34:14Z","timestamp":1751358854000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection"],"prefix":"10.1007","volume":"5","author":[{"given":"Mohammad","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Taran Singh","family":"Bharati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"156_CR1","doi-asserted-by":"publisher","first-page":"154864","DOI":"10.1109\/ACCESS.2021.3128701","volume":"9","author":"AA Elsaeidy","year":"2021","unstructured":"Elsaeidy AA, Jamalipour A, Munasinghe KS. A hybrid deep learning approach for replay and DDoS attack detection in a smart city. IEEE Access. 2021;9:154864\u201375. https:\/\/doi.org\/10.1109\/ACCESS.2021.3128701.","journal-title":"IEEE Access"},{"key":"156_CR2","doi-asserted-by":"publisher","first-page":"6430","DOI":"10.1109\/ACCESS.2021.3140015","volume":"10","author":"N Abdalgawad","year":"2022","unstructured":"Abdalgawad N, Sajun A, Kaddoura Y, Zualkernan IA, Aloul F. Generative deep learning to detect cyberattacks for the IoT-23 dataset. IEEE Access. 2022;10:6430\u201341. https:\/\/doi.org\/10.1109\/ACCESS.2021.3140015.","journal-title":"IEEE Access"},{"key":"156_CR3","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1080\/02522667.2020.1799515","volume":"41","author":"K Singh","year":"2020","unstructured":"Singh K, Singh N. An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection. J Inf Optim Sci. 2020;41:1715\u201339. https:\/\/doi.org\/10.1080\/02522667.2020.1799515.","journal-title":"J Inf Optim Sci"},{"key":"156_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics9010144","volume":"9","author":"YN Soe","year":"2020","unstructured":"Soe YN, Feng Y, Santosa PI, Hartanto R, Sakurai K. Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electron. 2020;9:1. https:\/\/doi.org\/10.3390\/electronics9010144.","journal-title":"Electron."},{"key":"156_CR5","doi-asserted-by":"publisher","first-page":"6591","DOI":"10.1109\/JIOT.2021.3055937","volume":"8","author":"KLK Sudheera","year":"2021","unstructured":"Sudheera KLK, Divakaran DM, Singh RP, Gurusamy M. ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks. IEEE Internet Things J. 2021;8:6591\u2013607. https:\/\/doi.org\/10.1109\/JIOT.2021.3055937.","journal-title":"IEEE Internet Things J"},{"key":"156_CR6","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.3390\/electronics11091502","volume":"11","author":"U Inayat","year":"2022","unstructured":"Inayat U, Zia MF, Mahmood S, Khalid HM, Benbouzid M. Learning-based methods for cyber attacks detection in IoT systems: a survey on methods, analysis, and future prospects. Electronics. 2022;11:1502.","journal-title":"Electronics"},{"key":"156_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/ijerph17249347","volume":"17","author":"MM Rashid","year":"2020","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Gordon S. Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int J Environ Res Public Health. 2020;17:1\u201321. https:\/\/doi.org\/10.3390\/ijerph17249347.","journal-title":"Int J Environ Res Public Health"},{"key":"156_CR8","doi-asserted-by":"crossref","unstructured":"Inayat, U., Ayesha, R., Mahmood, S.: Improving Intrusion Detection System using Feature Extraction. In: 2024 Horizons of Information Technology and Engineering (HITE). pp. 1\u20136 (2024).","DOI":"10.1109\/HITE63532.2024.10777077"},{"key":"156_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-022-09697-x","volume":"31","author":"S Mahadik","year":"2023","unstructured":"Mahadik S, Pawar PM, Muthalagu R. Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). J Netw Syst Manag. 2023;31:1. https:\/\/doi.org\/10.1007\/s10922-022-09697-x.","journal-title":"J Netw Syst Manag."},{"key":"156_CR10","doi-asserted-by":"publisher","unstructured":"Hasan, M., Milon Islam, M., Ishrak Islam Zarif, M., Hashem, M.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. (2019). https:\/\/doi.org\/10.1016\/j.iot.2019.10.","DOI":"10.1016\/j.iot.2019.10"},{"key":"156_CR11","doi-asserted-by":"crossref","unstructured":"Ma, L., Chai, Y., Cui, L., Ma, D., Fu, Y., Xiao, A.: A deep learning-based DDoS detection framework for Internet of Things. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC). pp. 1\u20136 (2020).","DOI":"10.1109\/ICC40277.2020.9148944"},{"key":"156_CR12","doi-asserted-by":"publisher","first-page":"9531","DOI":"10.1109\/JIOT.2020.3007130","volume":"8","author":"Z Lv","year":"2021","unstructured":"Lv Z, Qiao L, Li J, Song H. Deep-Learning-Enabled Security Issues in the Internet of Things. IEEE Internet Things J. 2021;8:9531\u20138. https:\/\/doi.org\/10.1109\/JIOT.2020.3007130.","journal-title":"IEEE Internet Things J"},{"key":"156_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.kjs.2024.100222","volume":"51","author":"HY Alshaeaa","year":"2024","unstructured":"Alshaeaa HY, Ghadhban ZM. Developing a hybrid feature selection method to detect botnet attacks in IoT devices. Kuwait J Sci. 2024;51: 100222. https:\/\/doi.org\/10.1016\/j.kjs.2024.100222.","journal-title":"Kuwait J Sci"},{"key":"156_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2022.101685","volume":"52","author":"T Gaber","year":"2022","unstructured":"Gaber T, El-Ghamry A, Hassanien AE. Injection attack detection using machine learning for smart IoT applications. Phys Commun. 2022;52:1. https:\/\/doi.org\/10.1016\/j.phycom.2022.101685.","journal-title":"Phys Commun."},{"key":"156_CR15","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","volume":"11","author":"IA Kandhro","year":"2023","unstructured":"Kandhro IA, Alanazi SM, Ali F, Kehar A, Fatima K, Uddin M, Karuppayah S. Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access. 2023;11:9136\u201348. https:\/\/doi.org\/10.1109\/ACCESS.2023.3238664.","journal-title":"IEEE Access"},{"key":"156_CR16","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2021","unstructured":"Qiu H, Dong T, Zhang T, Lu J, Memmi G, Qiu M. Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 2021;8:10327\u201335. https:\/\/doi.org\/10.1109\/JIOT.2020.3048038.","journal-title":"IEEE Internet Things J"},{"key":"156_CR17","doi-asserted-by":"publisher","first-page":"13712","DOI":"10.1109\/JIOT.2021.3067667","volume":"8","author":"AN Jahromi","year":"2021","unstructured":"Jahromi AN, Karimipour H, Dehghantanha A, Choo KKR. Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet Things J. 2021;8:13712\u201322. https:\/\/doi.org\/10.1109\/JIOT.2021.3067667.","journal-title":"IEEE Internet Things J"},{"key":"156_CR18","doi-asserted-by":"publisher","first-page":"8462","DOI":"10.1109\/JIOT.2020.2991693","volume":"7","author":"MMN Aboelwafa","year":"2020","unstructured":"Aboelwafa MMN, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M. A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J. 2020;7:8462\u201371. https:\/\/doi.org\/10.1109\/JIOT.2020.2991693.","journal-title":"IEEE Internet Things J"},{"key":"156_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20164583","volume":"20","author":"V Dutta","year":"2020","unstructured":"Dutta V, Chora\u015b M, Pawlicki M, Kozik R. A deep learning ensemble for network anomaly and cyber-attack detection. Sensors (Switzerland). 2020;20:1\u201320. https:\/\/doi.org\/10.3390\/s20164583.","journal-title":"Sensors (Switzerland)"},{"key":"156_CR20","doi-asserted-by":"crossref","unstructured":"Zia, M.F., Inayat, U., Noor, W., Pangracious, V., Benbouzid, M.: Locational detection of false data injection attack in smart grid based on multilabel machine learning classification methods. In: 2023 IEEE IAS Global Conference on Renewable Energy and Hydrogen Technologies (GlobConHT). pp. 1\u20135 (2023).","DOI":"10.1109\/GlobConHT56829.2023.10087717"},{"key":"156_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04477-5","volume":"5","author":"M Cui","year":"2024","unstructured":"Cui M, Chen J, Qiu X, Lv W, Qin H, Zhang X. Multi-class intrusion detection system in SDN based on hybrid BiLSTM model. Cluster Comput. 2024;5:1. https:\/\/doi.org\/10.1007\/s10586-024-04477-5.","journal-title":"Cluster Comput."},{"key":"156_CR22","doi-asserted-by":"crossref","unstructured":"Elsayed, S., Mohamed, K., Madkour, M.A.: A Comparative Study of Using Deep Learning Algorithms in Network Intrusion Detection. IEEE Access. (2024).","DOI":"10.1109\/ACCESS.2024.3389096"},{"key":"156_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04392-9","volume":"9","author":"P Kumari","year":"2024","unstructured":"Kumari P, Jain AK. Timely detection of DDoS attacks in IoT with dimensionality reduction. Cluster Comput. 2024;9:1. https:\/\/doi.org\/10.1007\/s10586-024-04392-9.","journal-title":"Cluster Comput."},{"key":"156_CR24","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.ijcce.2024.07.005","volume":"5","author":"WF Urmi","year":"2024","unstructured":"Urmi WF, Uddin MN, Uddin MA, Talukder MA, Hasan MR, Paul S, Chanda M, Ayoade J, Khraisat A, Hossen R, Imran F. A stacked ensemble approach to detect cyber attacks based on feature selection techniques. Int J Cogn Comput Eng. 2024;5:316\u201331. https:\/\/doi.org\/10.1016\/j.ijcce.2024.07.005.","journal-title":"Int J Cogn Comput Eng"},{"key":"156_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-024-00685-x","volume":"13","author":"M Sajid","year":"2024","unstructured":"Sajid M, Malik KR, Almogren A, Malik TS, Khan AH, Tanveer J, Rehman AU. Enhancing intrusion detection: a hybrid machine and deep learning approach. J Cloud Comput. 2024;13:1. https:\/\/doi.org\/10.1186\/s13677-024-00685-x.","journal-title":"J Cloud Comput."},{"key":"156_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11277-023-10769-7","volume":"133","author":"SS Mahadik","year":"2023","unstructured":"Mahadik SS, Pawar PM, Muthalagu R, Prasad NR, Mantri D. Intelligent LSTM (iLSTM)-Security Model for HetIoT. Wirel Pers Commun. 2023;133:323\u201350. https:\/\/doi.org\/10.1007\/s11277-023-10769-7.","journal-title":"Wirel Pers Commun"},{"key":"156_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7717\/peerj-cs.1872","volume":"10","author":"A Khalid","year":"2024","unstructured":"Khalid A, Mustafa G, Rana MRR, Alshahrani SM, Alymani M. RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids. PeerJ Comput Sci. 2024;10:1\u201318. https:\/\/doi.org\/10.7717\/peerj-cs.1872.","journal-title":"PeerJ Comput Sci"},{"key":"156_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.70039","volume":"36","author":"A Mazid","year":"2025","unstructured":"Mazid A, Kirmani S, Manaullah A, Yadav M. FL-IDPP: a federated learning based intrusion detection approach with privacy preservation. Trans Emerg Telecommun Technol. 2025;36:1\u201316. https:\/\/doi.org\/10.1002\/ett.70039.","journal-title":"Trans Emerg Telecommun Technol."},{"key":"156_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2024.2408256","volume":"00","author":"A Mazid","year":"2024","unstructured":"Mazid A, Kirmani S, Abid M. Enhanced intrusion detection framework for securing IoT network using principal component analysis and CNN. Inf Secur J. 2024;00:1\u201321. https:\/\/doi.org\/10.1080\/19393555.2024.2408256.","journal-title":"Inf Secur J"},{"key":"156_CR30","doi-asserted-by":"publisher","first-page":"7721","DOI":"10.1007\/s00500-022-06750-4","volume":"26","author":"MY Alzahrani","year":"2022","unstructured":"Alzahrani MY, Bamhdi AM. Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft Comput. 2022;26:7721\u201335. https:\/\/doi.org\/10.1007\/s00500-022-06750-4.","journal-title":"Soft Comput"},{"key":"156_CR31","doi-asserted-by":"crossref","unstructured":"Ali, M., Shahroz, M., Mushtaq, M.F., Alfarhood, S., Safran, M., Ashraf, I.: Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment. IEEE Access. (2024).","DOI":"10.1109\/ACCESS.2024.3376400"},{"key":"156_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3466721","volume":"2","author":"M Chowdhury","year":"2021","unstructured":"Chowdhury M, Ray B, Chowdhury S, Rajasegarar S. A novel insider attack and machine learning based detection for the internet of things. ACM Trans Internet Things. 2021;2:1\u201323. https:\/\/doi.org\/10.1145\/3466721.","journal-title":"ACM Trans Internet Things"},{"key":"156_CR33","doi-asserted-by":"publisher","first-page":"183678","DOI":"10.1109\/ACCESS.2020.3029191","volume":"8","author":"S Cakir","year":"2020","unstructured":"Cakir S, Toklu S, Yalcin N. Rpl attack detection and prevention in the internet of things networks using a gru based deep learning. IEEE Access. 2020;8:183678\u201389. https:\/\/doi.org\/10.1109\/ACCESS.2020.3029191.","journal-title":"IEEE Access"},{"key":"156_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asej.2024.102777","volume":"15","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Qureshi SS, Qureshi SU, Ullah F, Wajahat A, Pathan MS. A deep learning-based novel hybrid CNN-LSTM architecture for efficient detection of threats in the IoT ecosystem. Ain Shams Eng J. 2024;15:1. https:\/\/doi.org\/10.1016\/j.asej.2024.102777.","journal-title":"Ain Shams Eng J"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00156-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00156-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00156-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T08:34:18Z","timestamp":1751358858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00156-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["156"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00156-y","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"30 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"73"}}