{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:09Z","timestamp":1776926349774,"version":"3.51.2"},"reference-count":33,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065260","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T07:51:41Z","timestamp":1752652301000},"page":"5831-5858","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT"],"prefix":"10.32604","volume":"84","author":[{"given":"Prasanalakshmi","family":"Balaji","sequence":"first","affiliation":[]},{"given":"Sangita","family":"Babu","sequence":"additional","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhaoxi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Syarifah Bahiyah","family":"Rahayu","sequence":"additional","affiliation":[]},{"given":"Mariyam Aysha","family":"Bivi","sequence":"additional","affiliation":[]},{"given":"Mahaveerakannan","family":"Renganathan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/s43926-025-00104-w","article-title":"Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation","volume":"5","author":"Ali","year":"2025","journal-title":"Discov Internet Things"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.ins.2021.02.038","article-title":"The detection of low-rate DoS attacks using the SADBSCAN algorithm","volume":"565","author":"Tang","year":"2021","journal-title":"Inf Sci"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"102871","DOI":"10.1016\/j.jnca.2020.102871","article-title":"Distributed real-time SlowDoS attacks detection over encrypted traffic using artificial intelligence","volume":"173","author":"Garcia","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref4","first-page":"371","article-title":"Low-rate DDoS attack Detection using deep learning for SDN-enabled IoT networks","volume":"13","author":"Alashhab","year":"2022","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.3390\/app13031431","article-title":"Low rate DDoS detection using weighted federated learning in SDN control plane in IoT network","volume":"13","author":"Ali","year":"2023","journal-title":"Appl Sci"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.3390\/electronics10172105","article-title":"On the detection of low-rate denial of service attacks at transport and application layers","volume":"10","author":"Vedula","year":"2021","journal-title":"Electronics"},{"key":"ref7","series-title":"Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics); 2021 Dec 6\u20138","article-title":"Low rate DoS attack detection in IoT-SDN using deep learning","author":"Ilango"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.3390\/s25051346","article-title":"Securing IoT networks against DDoS attacks: a hybrid deep learning approach","volume":"25","author":"Ain","year":"2025","journal-title":"Sensors"},{"key":"ref9","unstructured":"Almaraz Rivera JG. The identification of DoS and DDoS attacks to IoT devices in software defined networks by using machine learning and deep learning models 2022 [Internet]. [cited 2025 Mar 10]. Available from: https:\/\/hdl.handle.net\/11285\/650696."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/978-981-33-6977-1_44","article-title":"A deep learning-based framework for distributed denial-of-service attacks detection in cloud environment","volume":"1","author":"Kachavimath","year":"2021","journal-title":"Lect Notes Electr Eng"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"107955","DOI":"10.1016\/j.compeleceng.2022.107955","article-title":"A feature similarity machine learning model for DDoS attack detection in modern network environments for Industry 4.0","volume":"100","author":"Sambangi","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"13098","DOI":"10.1038\/s41598-024-84879-y","article-title":"Distributed denial-of-service (DDoS) attack detection using supervised machine learning algorithms","volume":"15","author":"Abiramasundari","year":"2025","journal-title":"Sci Rep"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"107792","DOI":"10.1016\/j.comnet.2020.107792","article-title":"Detection of reduction-of-quality DDoS attacks using fuzzy logic and machine learning algorithms","volume":"186","author":"de Miranda Rios","year":"2021","journal-title":"Comput Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"100936","DOI":"10.1016\/j.iot.2023.100936","article-title":"Enhancing IoT network security through deep learning-powered intrusion detection system","volume":"24","author":"Bakhsh","year":"2023","journal-title":"Internet Things"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.32604\/csse.2023.030183","article-title":"DoS attack detection based on deep factorization machine in SDN","volume":"45","author":"Wang","year":"2023","journal-title":"Comput Syst Sci Eng"},{"key":"ref16","first-page":"3655","article-title":"Machine learning enabled novel real-time IoT targeted DoS\/DDoS cyber attack detection system","volume":"80","author":"Alabdulatif","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"100976","DOI":"10.1016\/j.iot.2023.100976","article-title":"Flow and unified information-based DDoS attack detection system for multi-topology IoT networks","volume":"24","author":"Saiyed","year":"2023","journal-title":"Internet Things"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/MWC.011.2200320","article-title":"Network abnormal traffic detection framework based on deep reinforcement learning","volume":"31","author":"Dong","year":"2024","journal-title":"IEEE Wirel Commun"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"105059","DOI":"10.1016\/j.engappai.2022.105059","article-title":"A feedforward-convolutional neural network to detect low-rate DoS in IoT","volume":"114","author":"Ilango","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","article-title":"A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning","volume":"8","author":"Perez-Diaz","year":"2020","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"18448","DOI":"10.1109\/ACCESS.2023.3247512","article-title":"An asynchronous federated learning arbitration model for low-rate DDoS attack detection","volume":"11","author":"Liu","year":"2023","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"100316","DOI":"10.1016\/j.array.2023.100316","article-title":"Capturing low-rate DDoS attack based on MQTT protocol in software defined-IoT environment","volume":"19","author":"Al-Fayoumi","year":"2023","journal-title":"Array"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"100828","DOI":"10.1016\/j.measen.2023.100828","article-title":"LRDADF: an AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments","volume":"28","author":"Pasha","year":"2023","journal-title":"Meas Sens"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1186\/s13677-022-00308-3","article-title":"Low-rate denial of service attack detection method based on time-frequency characteristics","volume":"11","author":"Fu","year":"2022","journal-title":"J Cloud Comput"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s13673-020-0210-9","article-title":"Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis","volume":"10","author":"Tang","year":"2020","journal-title":"Hum Centric Comput Inf Sci"},{"key":"ref26","first-page":"495","article-title":"Detecting and mitigating low-rate DoS and DDoS attacks: multimodal fusion of time-frequency analysis and deep learning model","volume":"31","author":"Yuvaraja","year":"2024","journal-title":"Teh Vjesn"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"6815","DOI":"10.1038\/s41598-025-90959-4","article-title":"Enhancing resilience of distributed DC microgrids against cyber attacks using a transformer-based Kalman filter estimator","volume":"15","author":"Rostami","year":"2025","journal-title":"Sci Rep"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"6347","DOI":"10.1109\/TII.2020.2966326","article-title":"One-dimensional residual convolutional autoencoder based feature learning for gearbox fault diagnosis","volume":"16","author":"Yu","year":"2020","journal-title":"IEEE Trans Ind Inform"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3778","DOI":"10.12694\/scpe.v25i5.3004","article-title":"Recurrent neural network based incremental model for intrusion detection system in IoT","volume":"25","author":"Sharma","year":"2024","journal-title":"Scalable Comput Pract Exp"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"84417","DOI":"10.1109\/ACCESS.2022.3197745","article-title":"Fennec fox optimization: a new nature-inspired optimization algorithm","volume":"10","author":"Trojovska","year":"2022","journal-title":"IEEE Access"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"5887","DOI":"10.1002\/int.22535","article-title":"Artificial gorilla troops optimizer: a new nature-inspired metaheuristic algorithm for global optimization problems","volume":"36","author":"Abdollahzadeh","year":"2021","journal-title":"Int J Intell Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s12065-019-00212-x","article-title":"Emperor penguins colony: a new metaheuristic algorithm for optimization","volume":"12","author":"Harifi","year":"2019","journal-title":"Evol Intell"},{"key":"ref33","first-page":"50","author":"Serani","year":"2017","journal-title":"Lecture notes in computer science"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65260\/TSP_CMC_65260.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:35Z","timestamp":1776923135000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065260","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}