{"id":"https://openalex.org/W4410341654","doi":"https://doi.org/10.1109/jiot.2025.3569610","title":"Hybrid CNN-LSTM Model for DDoS Attack Detection in Internet of Things-Based Healthcare Industry 5.0","display_name":"Hybrid CNN-LSTM Model for DDoS Attack Detection in Internet of Things-Based Healthcare Industry 5.0","publication_year":2025,"publication_date":"2025-05-13","ids":{"openalex":"https://openalex.org/W4410341654","doi":"https://doi.org/10.1109/jiot.2025.3569610"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3569610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3569610","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075082987","display_name":"Zabeeh Ullah","orcid":"https://orcid.org/0000-0002-9630-5022"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Zabeehullah","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002815889","display_name":"Fahim Arif","orcid":"https://orcid.org/0000-0002-5361-8600"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fahim Arif","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069306207","display_name":"Qazi Mazhar ul Haq","orcid":"https://orcid.org/0000-0002-1302-7689"},"institutions":[{"id":"https://openalex.org/I99908691","display_name":"Yuan Ze University","ror":"https://ror.org/01fv1ds98","country_code":"TW","type":"education","lineage":["https://openalex.org/I99908691"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Qazi Mazhar Ul Haq","raw_affiliation_strings":["Department of Computer science and Engineering, Yuan Ze University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer science and Engineering, Yuan Ze University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I99908691"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029505921","display_name":"Nauman Ali Khan","orcid":"https://orcid.org/0000-0002-7940-1960"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Nauman Ali Khan","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"Department of Computer Software Engineering National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068099757","display_name":"Ikram Ud Din","orcid":null},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Ikram Ud Din","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan","Department of Information Technology, The University of Haripur, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]},{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089600920","display_name":"Ahmad Almogren","orcid":"https://orcid.org/0000-0002-8253-9709"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmad Almogren","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060146861","display_name":"Mudassar Ali Khan","orcid":"https://orcid.org/0000-0003-1615-4605"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mudassar Ali Khan","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","Department of Information Technology, The University of Haripur, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041408026","display_name":"Omar Alsaleh","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Omar Alsaleh","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5075082987"],"corresponding_institution_ids":["https://openalex.org/I929597975"],"apc_list":null,"apc_paid":null,"fwci":88.603,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.99929845,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"12","issue":"22","first_page":"46075","last_page":"46082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13161","display_name":"Ideological and Political Education","score":0.7335000038146973,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13161","display_name":"Ideological and Political Education","score":0.7335000038146973,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6654999852180481,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13693","display_name":"Smart Systems and Machine Learning","score":0.6355999708175659,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7887132167816162},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6250139474868774},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5553492903709412},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5482138991355896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48496294021606445},{"id":"https://openalex.org/keywords/healthcare-industry","display_name":"Healthcare industry","score":0.45464736223220825},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4518985450267792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4385170340538025},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4205649793148041},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3386629819869995},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2496083676815033}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7887132167816162},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6250139474868774},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5553492903709412},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5482138991355896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48496294021606445},{"id":"https://openalex.org/C2989086416","wikidata":"https://www.wikidata.org/wiki/Q15067276","display_name":"Healthcare industry","level":3,"score":0.45464736223220825},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4518985450267792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4385170340538025},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4205649793148041},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3386629819869995},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2496083676815033},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3569610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3569610","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2567496709","https://openalex.org/W2803856670","https://openalex.org/W3023771043","https://openalex.org/W3034315788","https://openalex.org/W3041006163","https://openalex.org/W3159885303","https://openalex.org/W3166216072","https://openalex.org/W3195274148","https://openalex.org/W3209469313","https://openalex.org/W4210918272","https://openalex.org/W4223479306","https://openalex.org/W4224109614","https://openalex.org/W4280606844","https://openalex.org/W4309635201","https://openalex.org/W4312369036","https://openalex.org/W4323796700","https://openalex.org/W4376481220","https://openalex.org/W4382865033","https://openalex.org/W4383890559","https://openalex.org/W4390204156","https://openalex.org/W4392172699","https://openalex.org/W4392450127","https://openalex.org/W4394862644","https://openalex.org/W4394994431","https://openalex.org/W4396505479"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"The":[0,119],"convergence":[1],"of":[2,5,34,47,52,124,197,207],"the":[3,14,28,45,122,151,163,171,176,183,191,205,208],"Internet":[4],"Things":[6],"(IoT)":[7],"and":[8,31,133,156,185,199],"Software-Defined":[9],"Networking":[10],"(SDN)":[11],"has":[12],"paved":[13],"way":[15],"for":[16,95,109,129,139,216],"a":[17],"new":[18],"technological":[19],"paradigm":[20],"in":[21,75,113,143,175,220],"Healthcare":[22,115,187,221],"Industry":[23,116,222],"5.0.":[24],"This":[25],"integration":[26],"addresses":[27],"complexity,":[29],"heterogeneity,":[30],"dynamic":[32],"nature":[33],"smart":[35],"IoT":[36,157,186],"devices":[37],"within":[38],"healthcare":[39],"systems.":[40,224],"However,":[41],"it":[42],"also":[43],"increases":[44],"risk":[46],"cyberattacks,":[48],"particularly":[49],"Distributed":[50],"Denial":[51],"Service":[53],"(DDoS)":[54],"attacks,":[55,78],"which":[56,169],"pose":[57],"significant":[58],"threats":[59],"to":[60,85,213],"such":[61],"critical":[62],"infrastructure.":[63],"While":[64],"Deep":[65],"Learning":[66],"(DL)-based":[67],"intrusion":[68],"detection":[69,112,195],"methods":[70,215],"have":[71],"demonstrated":[72],"high":[73],"accuracy":[74,196],"detecting":[76,217],"these":[77,100],"their":[79,86,92],"opaque":[80],"decision-making":[81,178],"process":[82],"often":[83],"leads":[84],"characterization":[87],"as":[88],"black-box":[89],"models,":[90],"limiting":[91],"practical":[93],"use":[94],"security":[96],"analysts.":[97],"To":[98],"overcome":[99],"challenges,":[101],"this":[102],"study":[103],"proposes":[104],"an":[105,148],"explainable":[106],"hybrid":[107,210],"model":[108,120,152,211],"DDoS":[110,155],"attack":[111],"SDN-IoT-based":[114],"5.0":[117,223],"environments.":[118],"combines":[121],"strengths":[123],"Convolutional":[125],"Neural":[126],"Networks":[127],"(CNNs)":[128],"spatial":[130],"feature":[131],"extraction":[132],"Long":[134],"Short-Term":[135],"Memory":[136],"(LSTM)":[137],"networks":[138],"capturing":[140],"temporal":[141],"dependencies":[142],"network":[144],"traffic.":[145],"Implemented":[146],"using":[147],"SDN":[149],"controller,":[150],"accurately":[153],"classifies":[154],"attacks":[158,219],"while":[159],"providing":[160],"transparency":[161],"through":[162],"SHapley":[164],"Additive":[165],"exPlanation":[166],"(SHAP)":[167],"method,":[168],"identifies":[170],"most":[172],"influential":[173],"features":[174],"model\u2019s":[177,192],"process.":[179],"Simulation":[180],"results":[181],"on":[182],"CICDDoS2019":[184],"Security":[188],"datasets":[189],"demonstrate":[190],"effectiveness,":[193],"achieving":[194],"99.59%":[198],"98.12%,":[200],"respectively.":[201],"These":[202],"findings":[203],"confirm":[204],"robustness":[206],"proposed":[209],"compared":[212],"state-of-the-art":[214],"potential":[218]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
