(H-DIR)2: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers
- PMID: 40808005
- PMCID: PMC12349297
- DOI: 10.3390/s25154841
(H-DIR)2: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers
Abstract
Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H-DIR)2, a hybrid entropy-based framework designed to detect and mitigate anomalies in large-scale heterogeneous networks. The framework combines Shannon entropy analysis with Associated Random Neural Networks (ARNNs) and integrates semantic reasoning through RDF/SPARQL, all embedded within a distributed Apache Spark 3.5.0 pipeline. We validate (H-DIR)2 across three critical attack scenarios-SYN Flood (TCP), DAO-DIO (RPL), and NTP amplification (UDP)-using real-world datasets. The system achieves a mean detection latency of 247 ms and an AUC of 0.978 for SYN floods. For DAO-DIO manipulations, it increases the packet delivery ratio from 81.2% to 96.4% (p < 0.01), and for NTP amplification, it reduces the peak load by 88%. The framework achieves vertical scalability across millions of endpoints and horizontal scalability on datasets exceeding 10 TB. All code, datasets, and Docker images are provided to ensure full reproducibility. By coupling adaptive neural inference with semantic explainability, (H-DIR)2 offers a transparent and scalable solution for cloud-IoT cybersecurity, establishing a robust baseline for future developments in edge-aware and zero-day threat detection.
Keywords: RDF/SPARQL explainability; associated random neural network (ARNN); cloud–IoT security; entropy-based anomaly detection; hybrid distributed information retrieval; semantic adaptive cyber defense; sub-second detection latency.
Conflict of interest statement
The authors declare no conflict of interest.
Figures











Similar articles
-
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4. Sci Rep. 2025. PMID: 40593899 Free PMC article.
-
Hybrid deep learning-enabled framework for enhancing security, data integrity, and operational performance in Healthcare Internet of Things (H-IoT) environments.Sci Rep. 2025 Aug 23;15(1):31039. doi: 10.1038/s41598-025-15292-2. Sci Rep. 2025. PMID: 40849566 Free PMC article.
-
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method.Sensors (Basel). 2025 Jun 30;25(13):4098. doi: 10.3390/s25134098. Sensors (Basel). 2025. PMID: 40648351 Free PMC article.
-
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119. Sensors (Basel). 2021. PMID: 34372354 Free PMC article.
-
Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review.Comput Intell Neurosci. 2022 May 19;2022:9766844. doi: 10.1155/2022/9766844. eCollection 2022. Comput Intell Neurosci. 2022. Retraction in: Comput Intell Neurosci. 2023 Dec 13;2023:9867976. doi: 10.1155/2023/9867976. PMID: 35634070 Free PMC article. Retracted.
References
-
- Mirsky Y., Doitshman T., Elovici Y., Shabtai A. Kitsune: An ensemble of autoencoders for online network intrusion detection. arXiv. 2018 doi: 10.48550/arXiv.1802.09089.1802.09089 - DOI
-
- Sicari S., Rizzardi A., Coen-Porisini A. 5G in the Internet of Things Era: An Overview on Security and Privacy Challenges. Comput. Netw. 2020;179:107345. doi: 10.1016/j.comnet.2020.107345. - DOI
-
- García-Teodoro P., Díaz-Verdejo J., Maciá-Fernández G., Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2009;28:18–28. doi: 10.1016/j.cose.2008.08.003. - DOI
-
- Feily M., Shahrestani A., Ramadass S. A survey of botnet and botnet detection; Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems, and Technologies; Athens, Greece. 18–23 June 2009; pp. 268–273.
-
- Kurtz N., Song J. Cross-entropy-based adaptive importance sampling using Gaussian mixture. Struct. Saf. 2013;42:35–44. doi: 10.1016/j.strusafe.2013.01.006. - DOI
Grants and funding
LinkOut - more resources
Full Text Sources
Miscellaneous