• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

在物联网环境中,利用草原犬优化算法与差分进化算法的混合方法,借助区块链进行网络安全检测。

Leveraging blockchain for cybersecurity detection using hybridization of prairie dog optimization with differential evolution on internet of things environment.

作者信息

Alruwaili Fahad F

机构信息

Department of Computer and Network Engineering, College of Computing and Information Technology, Shaqra University, Sharqa, Saudi Arabia.

出版信息

Sci Rep. 2025 Aug 28;15(1):31673. doi: 10.1038/s41598-025-10410-6.

DOI:10.1038/s41598-025-10410-6
PMID:40866366
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12391490/
Abstract

The Internet of Things (IoT) is emerging as a functional occurrence in developing numerous critical applications. These applications rely on centralized storage, raising concerns about confidentiality, security, and single points of failure. Conventional IoT security methods are inadequate to address the growing nature of attacks and threats. Blockchain technology has been employed by many investigators in intrusion detection systems for enhanced detection and monitoring, inhibition of mischievous attacks or activities, and tamper-proof dealings and storage in IoT networks and devices. At present, using artificial intelligence knowledge, mainly deep learning and machine learning approaches, endures the basics to deliver a dynamically improved and up-to-date security method for next-generation IoT systems. This study proposes a Leveraging Blockchain for Cybersecurity Detection Using Golden Jackal Optimization (LBCCD-GJO) method in IoT. The presented LBCCD-GJO method initially applies data pre-processing using min-max normalization to convert input data into a beneficial format. Moreover, the feature selection process is implemented by utilizing the golden jackal optimization (GJO) model. Furthermore, the proposed LBCCD-GJO model employs the gated recurrent unit (GRU) technique for the classification process of cyberattacks. Finally, the hyperparameter selection of the GRU technique is performed by implementing the hybrid of prairie dog optimization with a differential evolution (PDO-DE) technique. An extensive set of simulations was performed to exhibit the promising outcomes of the LBCCD-GJO methodology under the TON_IoT_Train_Test_Network dataset. The experimental validation of the LBCCD-GJO methodology is 99.67% compared to the previous techniques.

摘要

物联网(IoT)正在成为开发众多关键应用程序中的一种功能性现象。这些应用程序依赖集中存储,引发了对保密性、安全性和单点故障的担忧。传统的物联网安全方法不足以应对日益增长的攻击和威胁。许多研究人员已将区块链技术应用于入侵检测系统,以加强检测和监控、抑制恶意攻击或活动,以及在物联网网络和设备中进行防篡改交易和存储。目前,利用人工智能知识,主要是深度学习和机器学习方法,仍然是为下一代物联网系统提供动态改进和最新安全方法的基础。本研究提出了一种在物联网中使用金豺优化(GJO)进行网络安全检测的区块链利用方法(LBCCD-GJO)。所提出的LBCCD-GJO方法首先使用最小-最大归一化进行数据预处理,将输入数据转换为有益的格式。此外,通过利用金豺优化(GJO)模型来实现特征选择过程。此外,所提出的LBCCD-GJO模型采用门控循环单元(GRU)技术进行网络攻击的分类过程。最后,通过实施草原犬优化与差分进化(PDO-DE)技术的混合来进行GRU技术的超参数选择。在TON_IoT_Train_Test_Network数据集下进行了大量模拟,以展示LBCCD-GJO方法的良好结果。与先前技术相比,LBCCD-GJO方法的实验验证率为99.67%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/9722ec63802a/41598_2025_10410_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/ca055e4bf36a/41598_2025_10410_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/bbc32e0bdd5b/41598_2025_10410_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c48376afad7d/41598_2025_10410_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/2553fb603f51/41598_2025_10410_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/b26c69b46aa6/41598_2025_10410_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c915589326f2/41598_2025_10410_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c8908c908253/41598_2025_10410_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/532d36acbcbe/41598_2025_10410_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/1a35abfcab18/41598_2025_10410_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/9ff6c92266ec/41598_2025_10410_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/9722ec63802a/41598_2025_10410_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/ca055e4bf36a/41598_2025_10410_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/bbc32e0bdd5b/41598_2025_10410_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c48376afad7d/41598_2025_10410_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/2553fb603f51/41598_2025_10410_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/b26c69b46aa6/41598_2025_10410_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c915589326f2/41598_2025_10410_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/c8908c908253/41598_2025_10410_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/532d36acbcbe/41598_2025_10410_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/1a35abfcab18/41598_2025_10410_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/9ff6c92266ec/41598_2025_10410_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7935/12391490/9722ec63802a/41598_2025_10410_Fig11_HTML.jpg

相似文献

1
Leveraging blockchain for cybersecurity detection using hybridization of prairie dog optimization with differential evolution on internet of things environment.在物联网环境中,利用草原犬优化算法与差分进化算法的混合方法,借助区块链进行网络安全检测。
Sci Rep. 2025 Aug 28;15(1):31673. doi: 10.1038/s41598-025-10410-6.
2
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation.基于深度学习和进化计算的区块链增强物联网分布式拒绝服务检测
Sci Rep. 2025 Jul 2;15(1):22537. doi: 10.1038/s41598-025-06568-8.
3
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments.基于狐狸优化器的特征选择模型的深度学习在物联网环境中保障网络攻击检测的有效性。
Sci Rep. 2025 Aug 6;15(1):28674. doi: 10.1038/s41598-025-13134-9.
4
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
5
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
6
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework.利用自注意力驱动门控循环单元和鳄鱼优化算法,通过联邦学习框架进行网络攻击检测。
Sci Rep. 2025 Jul 3;15(1):23805. doi: 10.1038/s41598-025-99452-4.
7
Identifying significant features in adversarial attack detection framework using federated learning empowered medical IoT network security.利用联邦学习赋能的医疗物联网网络安全在对抗攻击检测框架中识别显著特征。
Sci Rep. 2025 Aug 26;15(1):31485. doi: 10.1038/s41598-025-14913-0.
8
Blockchain framework with IoT device using federated learning for sustainable healthcare systems.用于可持续医疗系统的、结合物联网设备并采用联邦学习的区块链框架。
Sci Rep. 2025 Jul 23;15(1):26736. doi: 10.1038/s41598-025-06539-z.
9
An ensemble of deep representation learning with metaheuristic optimisation algorithm for critical health monitoring using internet of medical things.一种结合元启发式优化算法的深度表征学习集成方法,用于通过医疗物联网进行关键健康监测。
Sci Rep. 2025 Aug 10;15(1):29241. doi: 10.1038/s41598-025-15005-9.
10
Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments.基于元启发式算法的特征选择与集成表示学习模型相结合,用于物联网环境中隐私感知的网络攻击检测。
Sci Rep. 2025 Jul 2;15(1):22887. doi: 10.1038/s41598-025-05545-5.

本文引用的文献

1
Enhanced Prairie Dog Optimization with Differential Evolution for solving engineering design problems and network intrusion detection system.结合差分进化的增强草原犬鼠优化算法用于解决工程设计问题和网络入侵检测系统
Heliyon. 2024 Aug 23;10(17):e36663. doi: 10.1016/j.heliyon.2024.e36663. eCollection 2024 Sep 15.
2
A comparative analysis of using ensemble trees for botnet detection and classification in IoT.物联网中使用集成树进行僵尸网络检测和分类的比较分析。
Sci Rep. 2023 Dec 7;13(1):21632. doi: 10.1038/s41598-023-48681-6.
3
Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform.
基于物联网的区块链平台的医疗保健和健身数据管理。
J Healthc Eng. 2021 Jul 9;2021:9978863. doi: 10.1155/2021/9978863. eCollection 2021.