• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于缓解DDoS攻击的、具有元启发式优化降维和多头注意力机制的安全联邦学习。

Secure federated learning with metaheuristic optimized dimensionality reduction and multi-head attention for DDoS attack mitigation.

作者信息

Alanazi Adwan A, Althbiti Ashrf, Ghorashi Sara Abdelwahab, Birkea Fathea M O, Soto-Diaz Roosvel, Escorcia-Gutierrez José

机构信息

Department of Computer Science and Information, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia.

Department of Information Technology, College of Computers and Information Technology, Taif University, 21944, Taif, Saudi Arabia.

出版信息

Sci Rep. 2025 Sep 26;15(1):33291. doi: 10.1038/s41598-025-15052-2.

DOI:10.1038/s41598-025-15052-2
PMID:41006431
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12475425/
Abstract

With the fast development of Internet of Things (IoT) devices, it is urgently needed to understand the real-time cybersecurity risks posed to them actively. In the ever-growing field of IoT environments, Distributed Denial of Service (DDoS) threats pose an essential challenge, cooperating with the reliability of these methods. These attacks are usually utilized in real-time to write down e-commerce platforms, government websites, and banking systems. To deal with the DDoS attacks, there's an increased interest in decentralized learning methods, especially federated learning (FL), a newly acquired enhanced examination from the cyberattack cooperatively trained deep learning (DL) methods with dispersed cyber threats summaries. The recommendation of FL resolves the data privacy problem successfully. FL intends to form a global approach by allowing multi-participants with local information to train a similar method in a distributed way, with outcomes without replacing sample data. This paper presents a Metaheuristic-Driven Dimensionality Reduction for Robust Attack Defense Using Deep Learning Models (MDRRAD-DLM) in real-world IoT applications. The aim is to propose effective detection and mitigation strategies for DDoS attacks. The data preprocessing phase initially applies Z-score normalization to transform the input data into a standardized format. Furthermore, the parrot optimization (PO) technique is employed for the feature selection process to select the significant and relevant features from input data. Moreover, the temporal convolutional network and bi-directional gated recurrent unit with multi-head attention (TCN-MHA-Bi-GRU) technique is implemented for the attack classification process. Finally, the elk herd optimizer (EHO) technique fine-tunes the parameter selection of the TCN-MHA-Bi-GRU technique. The efficiency of the MDRRAD-DLM approach is examined under NSLKDD and CIC-IDS2017 datasets. The experimental validation of the MDRRAD-DLM approach portrayed a superior accuracy value of 99.14% and 99.41% over the dual datasets.

摘要

随着物联网(IoT)设备的快速发展,迫切需要积极了解其面临的实时网络安全风险。在物联网环境不断发展的领域中,分布式拒绝服务(DDoS)威胁构成了一项重大挑战,这与这些方法的可靠性相关。这些攻击通常被实时用于瘫痪电子商务平台、政府网站和银行系统。为了应对DDoS攻击,人们对去中心化学习方法的兴趣日益增加,特别是联邦学习(FL),它是一种新出现的、经过改进的检测方法,通过协同训练的深度学习(DL)方法应对分散的网络威胁总结。FL的建议成功解决了数据隐私问题。FL旨在通过允许具有本地信息的多方参与者以分布式方式训练类似方法来形成一种全局方法,其结果无需替换样本数据。本文提出了一种用于现实世界物联网应用中基于深度学习模型的鲁棒攻击防御的元启发式驱动降维方法(MDRRAD-DLM)。其目的是提出有效的DDoS攻击检测和缓解策略。数据预处理阶段首先应用Z分数归一化将输入数据转换为标准化格式。此外,采用鹦鹉优化(PO)技术进行特征选择过程,从输入数据中选择重要且相关的特征。此外,将具有多头注意力的时间卷积网络和双向门控循环单元(TCN-MHA-Bi-GRU)技术用于攻击分类过程。最后,采用麋鹿群优化器(EHO)技术对TCN-MHA-Bi-GRU技术的参数选择进行微调。在NSLKDD和CIC-IDS2017数据集下检验了MDRRAD-DLM方法的效率。MDRRAD-DLM方法的实验验证表明,在这两个数据集上其准确率分别高达99.14%和99.41%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/6058469349b9/41598_2025_15052_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/25d48ca70825/41598_2025_15052_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/582d53997774/41598_2025_15052_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7ec44729616b/41598_2025_15052_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7643d5f78c86/41598_2025_15052_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/977c1e96228b/41598_2025_15052_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/eacbc901eb10/41598_2025_15052_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/4ba51774e9e9/41598_2025_15052_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7a84f5ed46d6/41598_2025_15052_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/6b649052fa73/41598_2025_15052_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/14fc663914eb/41598_2025_15052_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/9fd552e9e5ce/41598_2025_15052_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/47470223f6a5/41598_2025_15052_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/a365ffbd1ce6/41598_2025_15052_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/a8959c0046b1/41598_2025_15052_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/99f9af984ab0/41598_2025_15052_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/d5947515b989/41598_2025_15052_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/397f24807d37/41598_2025_15052_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/6058469349b9/41598_2025_15052_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/25d48ca70825/41598_2025_15052_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/582d53997774/41598_2025_15052_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7ec44729616b/41598_2025_15052_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7643d5f78c86/41598_2025_15052_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/977c1e96228b/41598_2025_15052_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/eacbc901eb10/41598_2025_15052_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/4ba51774e9e9/41598_2025_15052_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/7a84f5ed46d6/41598_2025_15052_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/6b649052fa73/41598_2025_15052_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/14fc663914eb/41598_2025_15052_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/9fd552e9e5ce/41598_2025_15052_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/47470223f6a5/41598_2025_15052_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/a365ffbd1ce6/41598_2025_15052_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/a8959c0046b1/41598_2025_15052_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/99f9af984ab0/41598_2025_15052_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/d5947515b989/41598_2025_15052_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/397f24807d37/41598_2025_15052_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a987/12475425/6058469349b9/41598_2025_15052_Fig17_HTML.jpg

相似文献

1
Secure federated learning with metaheuristic optimized dimensionality reduction and multi-head attention for DDoS attack mitigation.用于缓解DDoS攻击的、具有元启发式优化降维和多头注意力机制的安全联邦学习。
Sci Rep. 2025 Sep 26;15(1):33291. doi: 10.1038/s41598-025-15052-2.
2
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation.基于深度学习和进化计算的区块链增强物联网分布式拒绝服务检测
Sci Rep. 2025 Jul 2;15(1):22537. doi: 10.1038/s41598-025-06568-8.
3
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments.基于狐狸优化器的特征选择模型的深度学习在物联网环境中保障网络攻击检测的有效性。
Sci Rep. 2025 Aug 6;15(1):28674. doi: 10.1038/s41598-025-13134-9.
4
Identifying significant features in adversarial attack detection framework using federated learning empowered medical IoT network security.利用联邦学习赋能的医疗物联网网络安全在对抗攻击检测框架中识别显著特征。
Sci Rep. 2025 Aug 26;15(1):31485. doi: 10.1038/s41598-025-14913-0.
5
DDoS classification of network traffic in software defined networking SDN using a hybrid convolutional and gated recurrent neural network.使用混合卷积门控循环神经网络对软件定义网络(SDN)中的网络流量进行分布式拒绝服务(DDoS)分类。
Sci Rep. 2025 Aug 9;15(1):29122. doi: 10.1038/s41598-025-13754-1.
6
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
7
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
8
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers.一种使用深度学习和Transformer的物联网网络中针对DDoS攻击的多类入侵检测系统。
Sensors (Basel). 2025 Aug 6;25(15):4845. doi: 10.3390/s25154845.
9
Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments.基于元启发式算法的特征选择与集成表示学习模型相结合,用于物联网环境中隐私感知的网络攻击检测。
Sci Rep. 2025 Jul 2;15(1):22887. doi: 10.1038/s41598-025-05545-5.
10
An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.一种用于识别和缓解软件定义物联网中分布式拒绝服务攻击的优化深度策略。
Network. 2025 Aug;36(3):1047-1078. doi: 10.1080/0954898X.2024.2356852. Epub 2024 Jun 17.

本文引用的文献

1
Enhancing intrusion detection in wireless sensor networks using a Tabu search based optimized random forest.使用基于禁忌搜索的优化随机森林增强无线传感器网络中的入侵检测
Sci Rep. 2025 May 28;15(1):18634. doi: 10.1038/s41598-025-03498-3.
2
Distributed denial-of-service (DDoS) on the smart grids based on VGG19 deep neural network and Harris Hawks optimization algorithm.基于VGG19深度神经网络和哈里斯鹰优化算法的智能电网分布式拒绝服务(DDoS)攻击
Sci Rep. 2025 May 25;15(1):18243. doi: 10.1038/s41598-025-03354-4.
3
A Multi-Strategy Parrot Optimization Algorithm and Its Application.
一种多策略鹦鹉优化算法及其应用
Biomimetics (Basel). 2025 Mar 2;10(3):153. doi: 10.3390/biomimetics10030153.
4
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities.用于物联网辅助的可持续智慧城市中隐私保护网络威胁检测的具有联邦学习框架的先进人工智能
Sci Rep. 2025 Feb 6;15(1):4470. doi: 10.1038/s41598-025-88843-2.
5
Hybrid quantum enhanced federated learning for cyber attack detection.用于网络攻击检测的混合量子增强联邦学习
Sci Rep. 2024 Dec 30;14(1):32038. doi: 10.1038/s41598-024-83682-z.
6
Federated learning for network attack detection using attention-based graph neural networks.基于注意力机制的图神经网络在网络攻击检测中的联邦学习
Sci Rep. 2024 Aug 17;14(1):19088. doi: 10.1038/s41598-024-70032-2.