{"id":"https://openalex.org/W7125642035","doi":"https://doi.org/10.1007/s43926-025-00268-5","title":"Enhanced detection and mitigation of HELLO flood attacks in IoT networks using modified deep neural networks and optimization algorithms","display_name":"Enhanced detection and mitigation of HELLO flood attacks in IoT networks using modified deep neural networks and optimization algorithms","publication_year":2026,"publication_date":"2026-01-23","ids":{"openalex":"https://openalex.org/W7125642035","doi":"https://doi.org/10.1007/s43926-025-00268-5"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00268-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00268-5","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-025-00268-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123811778","display_name":"Pawan Kumar Verma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pawan Kumar Verma","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123797413","display_name":"Mohit Kumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohit Kumar","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123808243","display_name":"Abhishek Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abhishek Gupta","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013639415","display_name":"Ashwini Kumar Saini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ashwini Kumar Saini","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038646068","display_name":"Ajeet Kumar Sharma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ajeet Kumar Sharma","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5035132866","display_name":"Nitin Rakesh","orcid":"https://orcid.org/0000-0002-1343-5244"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nitin Rakesh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123811778"],"corresponding_institution_ids":[],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12244468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.32499998807907104,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.32499998807907104,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10930","display_name":"Flood Risk Assessment and Management","score":0.05380000174045563,"subfield":{"id":"https://openalex.org/subfields/2306","display_name":"Global and Planetary Change"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.052299998700618744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8111000061035156},{"id":"https://openalex.org/keywords/flood-myth","display_name":"Flood myth","score":0.5727999806404114},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5188000202178955},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4839000105857849},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.482699990272522},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.47369998693466187},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4625000059604645},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.43149998784065247}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8111000061035156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7497000098228455},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5867000222206116},{"id":"https://openalex.org/C74256435","wikidata":"https://www.wikidata.org/wiki/Q134052","display_name":"Flood myth","level":2,"score":0.5727999806404114},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5188000202178955},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4839000105857849},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.482699990272522},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.47369998693466187},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4625000059604645},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.43149998784065247},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41290000081062317},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.38929998874664307},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35690000653266907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3416000008583069},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3382999897003174},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3206000030040741},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28279998898506165},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.27709999680519104},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2551000118255615}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00268-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00268-5","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:23cef67cf972471fb89719bc4ca8bdb9","is_oa":true,"landing_page_url":"https://doaj.org/article/23cef67cf972471fb89719bc4ca8bdb9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00268-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00268-5","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.7496506571769714}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1978369226","https://openalex.org/W2099580329","https://openalex.org/W2104554994","https://openalex.org/W2127042109","https://openalex.org/W2313308074","https://openalex.org/W2325432808","https://openalex.org/W2407898405","https://openalex.org/W2910024167","https://openalex.org/W2965509951","https://openalex.org/W2968774960","https://openalex.org/W3004161400","https://openalex.org/W3006799906","https://openalex.org/W3012636270","https://openalex.org/W3021228046","https://openalex.org/W3022058959","https://openalex.org/W3024606024","https://openalex.org/W3032638893","https://openalex.org/W3035037193","https://openalex.org/W3104921029","https://openalex.org/W3120587491","https://openalex.org/W3132232808","https://openalex.org/W3137951584","https://openalex.org/W3154529651","https://openalex.org/W3165574415","https://openalex.org/W3194930326","https://openalex.org/W3206246976","https://openalex.org/W4285198078","https://openalex.org/W4311628429","https://openalex.org/W4387373041","https://openalex.org/W4388991409","https://openalex.org/W4392364798","https://openalex.org/W4392391406","https://openalex.org/W4398174228","https://openalex.org/W4399964826","https://openalex.org/W4402742274","https://openalex.org/W4408841715"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Internet":[1],"of":[2,11,34,39,50,65,134],"Things":[3],"(IoT)":[4],"is":[5,80,89,140,165,200,203],"intermittently":[6],"targeted":[7],"by":[8,218],"Distributed":[9],"Denial":[10],"Service":[12],"(DDoS)":[13],"attacks,":[14],"which":[15,148],"occupy":[16],"computational":[17],"resources":[18],"and":[19,52,74,124,155,192,222,229,240],"bandwidth":[20],"for":[21,142,167,242],"preventing":[22],"potential":[23],"users":[24],"from":[25],"accessing":[26],"services.":[27],"The":[28,58,174],"attack":[29,122,145,198,238],"strategy":[30],"involves":[31],"massively":[32],"flooding":[33],"packets.":[35],"As":[36],"the":[37,44,48,81,95,105,128,132,149,179,197,211,215],"use":[38],"IoT":[40,59],"foundations":[41],"spreads":[42],"around":[43],"globe,":[45],"so":[46],"are":[47,60],"number":[49],"attacks":[51,67],"threats":[53],"that":[54,210],"these":[55,79],"systems":[56],"face.":[57],"susceptibility":[61],"to":[62,69,100,225],"a":[63,91,118,171],"range":[64],"network":[66,96],"due":[68],"their":[70],"low":[71],"processing":[72],"capacity":[73],"wireless":[75],"connection.":[76],"One":[77],"among":[78],"HELLO":[82,98,120,143,236],"Flood":[83,121,144],"attack,":[84],"where":[85],"an":[86],"attacker":[87],"who":[88],"not":[90],"legitimate":[92],"node":[93,103,199],"in":[94,104,147,235],"floods":[97],"requests":[99],"every":[101],"genuine":[102],"network,":[106],"compromising":[107],"Wireless":[108],"Sensor":[109],"Network":[110,138],"security.":[111],"In":[112],"this":[113],"work":[114],"we":[115],"have":[116],"designed":[117],"novel":[119],"detection":[123,239],"prevention":[125,241],"model":[126],"using":[127],"artificial":[129],"intelligence.":[130],"Here,":[131],"development":[133],"Modified":[135],"Deep":[136],"Neural":[137],"(MDNN)":[139],"introduced":[141],"detection,":[146],"hybrid":[150],"Coyote":[151],"Optimization":[152,158],"Algorithm":[153,163],"(COA)":[154],"Elephant":[156],"Herding":[157,162],"(EHO)":[159],"called":[160],"CoYote-Elephant":[161],"(CY-EHA)":[164],"used":[166],"weight":[168],"optimization":[169],"as":[170],"training":[172],"algorithm.":[173],"modified":[175],"DNN":[176],"works":[177],"with":[178],"input":[180],"parameters":[181],"like":[182],"\u201cRSS,":[183],"route":[184],"discovery":[185],"time,":[186],"inter-route":[187],"discovery,":[188],"distance,":[189],"data":[190],"rate,":[191],"packet":[193],"arrival":[194],"rate\u201d.":[195],"Once":[196],"identified,":[201],"it":[202],"removed":[204],"utilizing":[205],"CY-EHA.":[206],"Experimental":[207],"analysis":[208],"showed":[209],"proposed":[212],"CY-EHA-MDNN":[213],"reduced":[214],"cost":[216],"function":[217],"15.22%,":[219],"33.90%,":[220],"1.68%,":[221],"30%":[223],"compared":[224],"EHO-MDNN,":[226],"COA-MDNN,":[227],"GWO-MDNN,":[228],"PSO-MDNN,":[230],"respectively,":[231],"demonstrating":[232],"superior":[233],"performance":[234],"flood":[237],"IoT.":[243]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-26T00:00:00"}
