{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:59:59Z","timestamp":1769831999404,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030233563","type":"print"},{"value":"9783030233570","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23357-0_3","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T13:07:11Z","timestamp":1560776831000},"page":"28-42","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Method to Secure IoT Devices Against Botnet Attacks"],"prefix":"10.1007","author":[{"given":"Trusit","family":"Shah","sequence":"first","affiliation":[]},{"given":"Subbarayan","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170\u2013177. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44810-1_22"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Stebila, D., Clark, A., Liu, H.: Defending web services against denial of service attacks using client puzzles. In: 2011 IEEE 9th International Conference on Web Services 2011, pp. 25\u201332. IEEE Computer Society (2011)","DOI":"10.1109\/ICWS.2011.22"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Michalas, A., Komninos, N., Prasad, N.R., Oleshchuk, V.A.: New client puzzle approach for dos resistance in ad hoc networks. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 568\u2013573. IEEE, December 2010","DOI":"10.1109\/ICITIS.2010.5689528"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-10366-7_30","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"L Chen","year":"2009","unstructured":"Chen, L., Morrissey, P., Smart, N.P., Warinschi, B.: Security notions and generic constructions for client puzzles. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 505\u2013523. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_30"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-33383-5_3","volume-title":"Information Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Warinschi, B.: Revisiting difficulty notions for client puzzles and DoS resilience. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 39\u201354. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33383-5_3"},{"key":"3_CR6","unstructured":"Jing, Y.K., Ming, J.T.C., Niyato, D.: Rate limiting client puzzle schemes for denial-of-service mitigation. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1848\u20131853 (2013)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Walid, A., Mostafa, A., Salama, M.: MalNoD: malicous node discovery in internet-of-things through fingerprints. In: 2017 European Conference on Electrical Engineering and Computer Science (EECS). IEEE (2017)","DOI":"10.1109\/EECS.2017.58"},{"key":"3_CR8","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: USENIX Security Symposium (2017)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.106","volume":"3","author":"M Bailey","year":"2005","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Watson, D.: The blaster worm: then and now. IEEE Secur. Priv. 3, 26\u201331 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Claffy, K.: Code-red: a case study on the spread and victims of an internet worm. In: 2nd ACM Internet Measurement Workshop (2002)","DOI":"10.1145\/637241.637244"},{"key":"3_CR11","first-page":"7","volume":"6","author":"JR Binkley","year":"2006","unstructured":"Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. SRUTI 6, 7 (2006)","journal-title":"SRUTI"},{"key":"3_CR12","unstructured":"Mirkovic, J., Dietrich, S., et al.: Internet denial of service: attack and defense mechanisms. University of Pittsburgh (2005)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Jiang, L., et al.: Analysis and comparison of the network security protocol with DoS\/DDoS attack resistance performance. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS). IEEE (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.148"},{"key":"3_CR14","unstructured":"Abliz, M., Znati, T.F.: Defeating DDoS using productive puzzles. In: 2015 International Conference on Information Systems Security and Privacy (ICISSP), pp. 114\u2013123. IEEE, February 2015"},{"key":"3_CR15","unstructured":"Gu, G., et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection, p. 139 (2008)"},{"key":"3_CR16","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: detecting malware infection through ids-driven dialog correlation. In: Proceedings of the 16th USENIX Security Symposium (Security 2007) (2007)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Saad, S., et al.: Detecting P2P botnets through network behavior analysis and machine learning. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST). IEEE (2011)","DOI":"10.1109\/PST.2011.5971980"},{"key":"3_CR18","unstructured":"Ranjan, S., Robinson, J., Chen, F.: Machine learning based botnet detection using real-time connectivity graph based traffic features. U.S. Patent No. 8,762,298, 24 June 2014"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Masud, M.M., Al-khateeb, T., Khan, L., Thuraisingham, B., Hamlen, K.W.: Flow-based identification of Botnet traffic by mining multiple. In: Proceedings of International Conference on Distributed Framework & Application (2008)","DOI":"10.1109\/ICDFMA.2008.4784437"},{"key":"3_CR20","unstructured":"Perakovi\u0107, D., et al.: Analysis of the IoT impact on volume of DDoS attacks. In: XXXIII Simpozijum o novim tehnologijama u po\u0161tanskom i telekomunikacionom saobra\u0107aju \u2013 PosTel 2015, Beograd, 1. i 2. December 2015"},{"issue":"7","key":"3_CR21","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"3_CR22","unstructured":"Sifalakis, M., Schmid, S., Hutchison, D.: Network address hopping: a mechanism to enhance data protection for packet communications. In: IEEE International Conference on Communications, ICC 2005, pp. 1518\u20131523 (2005)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things \u2013 ICIOT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23357-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:07:44Z","timestamp":1710270464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23357-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030233563","9783030233570"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23357-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciot2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciot.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}