{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:14:14Z","timestamp":1743081254294,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223533"},{"type":"electronic","value":"9783030223540"}],"license":[{"start":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T00:00:00Z","timestamp":1561075200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22354-0_37","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T07:02:51Z","timestamp":1561014171000},"page":"417-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Machine Learning Architecture Towards Detecting Denial of Service Attack in IoT"],"prefix":"10.1007","author":[{"given":"Yahya","family":"Al-Hadhrami","sequence":"first","affiliation":[]},{"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341, December 2015","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663\u2013667, December 2013","DOI":"10.1109\/CIS.2013.145"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Gunduz, S., Arslan, B., Demirci, M.: A review of machine learning solutions to denial-of-services attacks in wireless sensor networks. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 150\u2013155, December 2015","DOI":"10.1109\/ICMLA.2015.202"},{"issue":"1","key":"37_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 4(1), 65\u201388 (2015)","journal-title":"J. Cyber Secur."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018)","DOI":"10.1016\/j.future.2017.07.060"},{"issue":"4","key":"37_CR6","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"37_CR7","unstructured":"Rivera, J., van der Meulen, R.: Gartner says the internet of things will transform the data center (2014). Accessed 5 Aug 2014"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with cooja. In: Proceedings of 2006 31st IEEE Conference on Local Computer Networks, pp. 641\u2013648. IEEE (2006)","DOI":"10.1109\/LCN.2006.322172"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Kaplantzis, S., Shilton, A., Mani, N., Sekercioglu, Y.A.: Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In: 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, ISSNIP 2007, pp. 335\u2013340. IEEE (2007)","DOI":"10.1109\/ISSNIP.2007.4496866"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Feham, M.: Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint \n                    arXiv:1108.2656\n                    \n                   (2011)","DOI":"10.1109\/ISCC.2012.6249409"},{"issue":"3","key":"37_CR11","first-page":"338","volume":"5","author":"S Kurosawa","year":"2007","unstructured":"Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Netw. Secur. 5(3), 338\u2013346 (2007)","journal-title":"IJ Netw. Secur."},{"issue":"8","key":"37_CR12","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600\u2013607. IEEE (2013)","DOI":"10.1109\/WiMOB.2013.6673419"},{"issue":"2","key":"37_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/info7020025","volume":"7","author":"A Le","year":"2016","unstructured":"Le, A., Loo, J., Chai, K.K., Aiash, M.: A specification-based ids for detecting attacks on RPL-based network topology. Information 7(2), 25 (2016)","journal-title":"Information"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: IM, pp. 606\u2013611 (2015)","DOI":"10.1109\/INM.2015.7140344"},{"issue":"8","key":"37_CR16","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Sonar, K., Upadhyay, H.: An approach to secure internet of things against DDoS. In: Proceedings of International Conference on ICT for Sustainable Development, pp. 367\u2013376. Springer (2016)","DOI":"10.1007\/978-981-10-0135-2_36"},{"key":"37_CR18","unstructured":"Oikonomou, G.: Sensniff: live traffic capture and sniffer for iEEE 802.15.4 networks (2017). \n                    https:\/\/github.com\/g-oikonomou\/sensniff"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22354-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T21:38:14Z","timestamp":1561757894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22354-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,21]]},"ISBN":["9783030223533","9783030223540"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22354-0_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,6,21]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}