Skip to content
artificial-intelligence-driven-approach-for-securing-backup-data-and-enhancing-cyber-resilience-in-sustainable-smart-infrastructure-–-scientific-reports

Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure – Scientific Reports

  • Article
  • Open access
  • Published:
  • Basant Kumar1,2,
  • Shashi Kant Gupta1,3,
  • Rashmi Dwivedi4,5,
  • Deema Mohammed Alsekai6,
  • Diaa Salama AbdElminaam7,8 &
  • Ozlem Kilickaya9 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

Abstract

A crucial factor for smart cities, which are more vulnerable to cyber threats, is Cyber Resilience (CR). Nevertheless, the conventional frameworks didn’t concentrate on assuring the Backup Data (BD) integrity before restoration, showing less resilience. Therefore, this article implements an AI-powered BD integrity verification approach for CR in smart infrastructure using Murmur Polytopes Hash (MPH). Initially, the nodes are initialized in the smart city, followed by node clustering, data security, and storage (cloud server and Interplanetary File System (IPFS) (backup)). Now, the hash code is generated and updated in the Merkle tree. Besides, to perform data collection, pre-processing, clustering, correlation heatmap generation, feature extraction, and attack classification, the proposed ransomware attack detection module is designed. If the data is attacked, then the BD verification is done using MPH. Then, the BD is restored. If the data is normal, then the data is downloaded from the cloud server. Thus, the proposed work had a high security level and accuracy of 98.45% and 98.65%, respectively, showing better resilience.

Data availability

The datasets generated and/or analysed during the current study are available in the Dataset: https://www.kaggle.com/datasets/amdj3dax/ransomware-detection-data-set

References

  1. Konstantinou, C. Toward a secure and resilient all-renewable energy grid for smart cities. IEEE Consum. Electron. Mag. 11(1), 1–7. https://doi.org/10.1109/MCE.2021.3055492 (2021).

    Google Scholar 

  2. Saheed, Y. K. & Arowolo, M. O. Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 9, 161546–161554. https://doi.org/10.1109/ACCESS.2021.3128837 (2021).

    Google Scholar 

  3. Rana, M. U., Shah, M. A., Alnaeem, M. A. & Maple, C. Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses. IEEE Access 13, 1–18. https://doi.org/10.1109/ACCESS.2024.3477631 (2024).

    Google Scholar 

  4. Malik, M. I., Ibrahim, A., Hannay, P. & Sikos, L. F. Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions. Computers 12(4), 1–26. https://doi.org/10.3390/computers12040079 (2023).

    Google Scholar 

  5. Bhandari, G. P., Lyth, A., Shalaginov, A. & Gronli, T. M. Artificial intelligence enabled middleware for distributed cyberattacks detection in IoT-based smart environments. In Proceedings-2022 IEEE International Conference on Big Data, Big Data 2022, 3023–3032, https://doi.org/10.1109/BigData55660.2022.10020531 (2022).

  6. Madhavan, K., Yazdinejad, A., Zarrinkalam, F. & Dehghantanha, A. Security vulnerabilities: A metric-driven security analysis of gaps in current AI standards. arXiv preprint arXiv:2502.08610, https://doi.org/10.48550/arXiv.2502.08610 (2025).

  7. Dehghantanha, A., Yazdinejad, A. & Parizi, R. M. Autonomous cybersecurity: Evolving challenges, emerging opportunities, and future research trajectories. In Proceedings of the Workshop on Autonomous Cybersecurity, 1–10. https://doi.org/10.1145/3689933.3690832 (2023).

  8. Ahmed, Y., Beyioku, K. & Yousefi, M. Securing smart cities through machine learning: A honeypot-driven approach to attack detection in Internet of Things ecosystems. IET Smart Cities. 6(3), 180–198. https://doi.org/10.1049/smc2.12084 (2024).

    Google Scholar 

  9. Khattak, Z. H. Cybersecurity vulnerability and resilience of cooperative driving automation for energy efficiency and flow stability in smart cities. Sustain. Cities Soc. 106, 1–19. https://doi.org/10.1016/j.scs.2024.105368 (2024).

    Google Scholar 

  10. Lyu, Q., Liu, S. & Shang, Z. Securing urban landscape: Cybersecurity mechanisms for resilient smart cities. IEEE Access 13, 10966–10977. https://doi.org/10.1109/ACCESS.2024.3522078 (2025).

    Google Scholar 

  11. Dhingra, B., Jain, V., Sharma, D. K., Gupta, K. D. & Kukreja, D. RLET: A lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. Int. J. Inf. Secur. 23(1), 1–17. https://doi.org/10.1007/s10207-023-00739-2 (2024).

    Google Scholar 

  12. Usman, Y., Ihejirika, C. J., Offor, S. N., Robert, A. & Chataut, R. Green cybersecurity: Leveraging AI, ML, and LLMs to optimize energy, threat detection, and sustainability frameworks. IEEE Access https://doi.org/10.1109/ACCESS.2025.3602451 (2025).

    Google Scholar 

  13. Ali, S. M., Razzaque, A., Yousaf, M. & Ali, S. S. A novel AI-based integrated cybersecurity risk assessment framework and resilience of national critical infrastructure. IEEE Access. 13, 12427–12446. https://doi.org/10.1109/ACCESS.2024.3524884 (2025).

    Google Scholar 

  14. Alazab, M. et al. Enhanced threat intelligence framework for advanced cybersecurity resilience, Egypt. Inform. J. 27(1–26), 2024. https://doi.org/10.1016/j.eij.2024.100521 (2024).

    Google Scholar 

  15. Islam, S., Basheer, N., Papastergiou, S., Ciampi, M. & Silvestri, S. Intelligent dynamic cybersecurity risk management framework with explainability and interpretability of AI models for enhancing security and resilience of digital infrastructure. J. Reliab. Intell. Environ. 11(3), 1–25. https://doi.org/10.1007/s40860-025-00253-3 (2025).

    Google Scholar 

  16. Zhang, X., Wang, J. & Zhu, S. Dual generative adversarial networks based unknown encryption ransomware attack detection. IEEE Access 10, 900–913. https://doi.org/10.1109/ACCESS.2021.3128024 (2022).

    Google Scholar 

  17. Singh, A. et al. Enhancing ransomware attack detection using transfer learning and deep learning ensemble models on cloud-encrypted data. Electronics (Switzerland) 12(18), 1–31. https://doi.org/10.3390/electronics12183899 (2023).

    Google Scholar 

  18. Nandanwar, H. & Katarya, R. A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In International Conference on Next-Generation Communication and Computing, 207–219, https://doi.org/10.1007/978-981-96-3725-6_18 (2025).

  19. Yazdinejad, A., Mohammadabadi, Z. D., Dehghantanha, A. & Srivastava, G. An explainable and privacy-preserving federated learning model for threat detection in cyber-physical-social systems. IEEE Trans. Comput. Soc. Syst. https://doi.org/10.1109/TCSS.2025.3606798 (2025).

    Google Scholar 

  20. Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G. & Parizi, R. M. A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inf. Forensics Secur. 19, 6693–6708. https://doi.org/10.1109/TIFS.2024.3420126 (2024).

    Google Scholar 

  21. Urooj, U. et al. Addressing behavioral drift in ransomware early detection through weighted generative adversarial networks. IEEE Access 12, 3910–3925. https://doi.org/10.1109/ACCESS.2023.3348451 (2024).

    Google Scholar 

  22. Al-Hawawreh, M., Sitnikova, E. & Aboutorab, N. Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial IoT. IEEE Access. 9, 148738–148755. https://doi.org/10.1109/ACCESS.2021.3124634 (2021).

    Google Scholar 

  23. Routray, S., Prusti, D. & Rath, S. K. Ransomware attack detection by applying machine learning techniques. Lect. Notes Electr. Eng. 1, 1–12. https://doi.org/10.1007/978-981-99-0085-5_62 (2023).

    Google Scholar 

  24. Zahoora, U. et al. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Sci. Rep. 12(1), 1–15. https://doi.org/10.1038/s41598-022-19443-7 (2022).

    Google Scholar 

  25. Gurukala, N. K. Y. & Verma, D. K. Feature selection using particle swarm optimization and ensemble-based machine learning models for ransomware detection. SN Comput. Sci. 5(8), 1–21. https://doi.org/10.1007/s42979-024-03454-4 (2024).

    Google Scholar 

  26. Nandanwar, H. & Katarya, R. Optimized intrusion detection and secure data management in IoT networks using GAO-Xgboost and ECC-integrated blockchain framework. Knowl. Inf. Syst. https://doi.org/10.1007/s10115-025-02513-3 (2025).

    Google Scholar 

  27. Nandanwar, H. & Katarya, R. A hybrid blockchain-based framework for securing intrusion detection systems in internet of things. Clust. Comput. 28(7), 471. https://doi.org/10.1007/s10586-025-05135-0 (2025).

    Google Scholar 

  28. Nandanwar, H. & Katarya, R. Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems. Comput. Electr. Eng. 123, 110161. https://doi.org/10.1016/j.compeleceng.2025.110161 (2025).

    Google Scholar 

  29. Nandanwar, H. & Katarya, R. TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment. Int. J. Inf. Secur. 23(2), 1251–1277. https://doi.org/10.1007/s10207-023-00787-8 (2023).

    Google Scholar 

  30. Nandanwar, H. & Katarya, R. Deep learning enabled intrusion detection system for Industrial IOT environment. Expert Syst. Appl. 249, 123808 (2024).

    Google Scholar 

Download references

Acknowledgements

The authors would like to acknowledge the support of Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2026R435), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Funding

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2026R435), Princess Nourahbint Abdulrahman University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

  1. Lincoln University College, 47301, Petaling Jaya, Selangor, Malaysia

    Basant Kumar & Shashi Kant Gupta

  2. Modern College of Business and Science, Muscat, Oman

    Basant Kumar

  3. Centre for Research Impact & Outcome, Chitkara University Institute of Engineering and Technology., Chitkara University Institute of Engineering and Technology, Rajpura, Punjab, 140401, India

    Shashi Kant Gupta

  4. Muscat University, Muscat, Oman

    Rashmi Dwivedi

  5. Alliance University, Bangalore, India

    Rashmi Dwivedi

  6. Department of Information Technology,College of Computer and Information Sciences , Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia

    Deema Mohammed Alsekai

  7. Faculty of Computing and IT, Sohar University, Sohar, Oman

    Diaa Salama AbdElminaam

  8. Jadara Research Center, Jadara University, Irbid, 21110, Jordan

    Diaa Salama AbdElminaam

  9. University of the People, Pasadena, USA

    Ozlem Kilickaya

Authors

  1. Basant Kumar
  2. Shashi Kant Gupta
  3. Rashmi Dwivedi
  4. Deema Mohammed Alsekai
  5. Diaa Salama AbdElminaam
  6. Ozlem Kilickaya

Contributions

Formal Analysis-Basant Kumar, Shashi Kant Gupta and Ozlem Kilickaya; Resources, Design and coding—Rashmi Dwivedi; Wrting-Original Draft- Diaa Salama AbdElminaam; Writing-Deema Mohammed Alsekait; Review and Editing- Basant Kumar.

Corresponding authors

Correspondence to Deema Mohammed Alsekai, Diaa Salama AbdElminaam or Ozlem Kilickaya.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, B., Gupta, S.K., Dwivedi, R. et al. Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37802-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1038/s41598-026-37802-6

Keywords

colind88

Back To Top