Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Jul 2;15(1):22537.
doi: 10.1038/s41598-025-06568-8.

Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation

Affiliations

Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation

V V S H Prasad et al. Sci Rep. .

Abstract

The Internet of Things (IoT) is emerging as a new trend mainly employed in developing numerous vital applications. These applications endure on a federal storage framework primarily concerned with multiple issues. Blockchain technology (BC) is one of the supportive methods for developing IoT-based applications. It is employed to solve the problems encountered in IoT applications. The attack Distributed Denial of Service (DDoS) is one of the leading security attacks in IoT systems. Attackers can effortlessly develop the exposures of IoT gadgets and restrain them as fragments of botnets to commence DDoS threats. The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. This paper proposes the Metaheuristic-Optimized Blockchain Framework for Attack Detection using a Deep Learning Model (MOBCF-ADDLM) method. The main intention of the MOBCF-ADDLM method is to deliver an effective method for detecting DDoS threats in an IoT environment using advanced techniques. The BC technology is initially applied to mitigate DDoS attacks by presenting decentralized security solutions. Furthermore, data preprocessing utilizes the min-max scaling method to convert input data into a beneficial format. Additionally, feature selection (FS) is performed using the Aquila optimizer (AO) technique to recognize the most relevant features from input data. The attack classification process employs the deep belief network (DBN) technique. Finally, the red panda optimizer (RPO) model modifies the hyper-parameter values of the DBN model optimally and results in higher classification performance. A wide range of experiments with the MOBCF-ADDLM approach is performed under the BoT-IoT Binary and Multiclass datasets. The performance validation of the MOBCF-ADDLM approach portrayed a superior accuracy value of 99.22% over existing models.

Keywords: Blockchain; DDoS attack; Deep learning; IoT; Red panda optimizer.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors declare no competing interests. Ethics approval: This article contains no studies with human participants performed by any authors.

Figures

Fig. 1
Fig. 1
IoT networks-based DDoS attack detection.
Fig. 2
Fig. 2
Overall flow of MOBCF-ADDLM approach.
Fig. 3
Fig. 3
BC framework.
Fig. 4
Fig. 4
Steps involved in the AO technique.
Fig. 5
Fig. 5
Framework of DBN.
Fig. 6
Fig. 6
Framework of DBN.
Algorithm 1
Algorithm 1
RPO model.
Fig. 7
Fig. 7
BoT-IoT Binary dataset (a, b) confusion matrix and (c, d) PR and ROC curves.
Fig. 8
Fig. 8
Average of MOBCF-ADDLM model on BoT-IoT Binary dataset.
Fig. 9
Fig. 9
formula image curve of MOBCF-ADDLM model on BoT-IoT Binary dataset
Fig. 10
Fig. 10
Loss graph of MOBCF-ADDLM technique on BoT-IoT Binary dataset.
Fig. 11
Fig. 11
BoT-IoT Multiclass dataset (a, b) confusion matrices and (c, d) PR and ROC curve.
Fig. 12
Fig. 12
Average of MOBCF-ADDLM model on BoT-IoT Multiclass dataset.
Fig. 13
Fig. 13
formula image curve of MOBCF-ADDLM model on BoT-IoT Multiclass dataset
Fig. 14
Fig. 14
Loss graph of MOBCF-ADDLM model on BoT-IoT Multiclass dataset.
Fig. 15
Fig. 15
Comparative results of MOBCF-ADDLM technique with existing approaches.
Fig. 16
Fig. 16
PT outcome of MOBCF-ADDLM methodology with existing models.

Similar articles

References

    1. Ghadi, Y. Y. et al. Integration of federated learning with IoT for smart cities applications, challenges, and solutions. PeerJ Comput. Sci.9, e1657 (2023). - PMC - PubMed
    1. Hamouda, D., Ferrag, M. A., Benhamida, N. & Seridi, H. P. P. S. S. A privacy-preserving secure framework using blockchain-enabled federated deep learning for industrial IoTs. Pervasive Mob. Comput.88, 101738 (2022).
    1. Al-Shammari, N. K., Syed, T. H. & Syed, M. B. An Edge–IoT framework and prototype based on blockchain for smart healthcare applications. Eng. Technol. Appl. Sci. Res.11, 7326–7331 (2021).
    1. Shah, H. et al. Deep learning-based malicious smart contract and intrusion detection system for IoT environment. Mathematics11, 418 (2023).
    1. Ghadi, Y. Y. et al. The role of blockchain to secure internet of medical things. Sci. Rep.14 (1), 18422. (2024). - PMC - PubMed

LinkOut - more resources