{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:22:34Z","timestamp":1778167354578,"version":"3.51.4"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030519704","type":"print"},{"value":"9783030519711","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51971-1_15","type":"book-chapter","created":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T17:03:00Z","timestamp":1596906180000},"page":"183-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment"],"prefix":"10.1007","author":[{"given":"Abdulrahman","family":"Aminu Ghali","sequence":"first","affiliation":[]},{"given":"Rohiza","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Hitham Seddiq Alhassan","family":"Alhussian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Pirmagomedov, R., Koucheryavy, Y.: IoT Technologies for Augmented Human: a Survey. Internet of Things, p. 100120 (2019)","DOI":"10.1016\/j.iot.2019.100120"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2018.8291108","volume":"56","author":"DE Boubiche","year":"2018","unstructured":"Boubiche, D.E., Pathan, A.S.K., Lloret, J., Zhou, H., Hong, S., Amin, S.O., Feki, M.A.: Advanced industrial wireless sensor networks and intelligent IoT. IEEE Commun. Mag. 56(2), 14\u201315 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Serpanos, D., Wolf, M.: Industrial internet of things. In: Internet-of-Things (IoT) Systems, pp. 37\u201354. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-69715-4_5"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.procs.2019.11.087","volume":"160","author":"O Debauche","year":"2019","unstructured":"Debauche, O., Mahmoudi, S., Manneback, P., Assila, A.: Fog IoT for health: a new architecture for patients and elderly monitoring. Procedia Comput. Sci. 160, 289\u2013297 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 96, 410\u2013424 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR6","unstructured":"Perakovi\u0107, D., Peri\u0161a, M., Cviti\u0107, I.: Analysis of the IoT impact on volume of DDoS attacks. In: XXXIII Simpozijum o novim tehnologijama u po\u0161tanskom i telekomunikacionom saobra\u0107aju\u2013PosTel, 2015, pp. 295\u2013304 (2015)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.03.020","volume":"137","author":"S Sicari","year":"2018","unstructured":"Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: REATO: REActing TO denial of service attacks in the internet of things. Comput. Netw. 137, 37\u201348 (2018)","journal-title":"Comput. Netw."},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.01.006","volume":"130","author":"G Liu","year":"2019","unstructured":"Liu, G., Quan, W., Cheng, N., Zhang, H., Yu, S.: Efficient DDoS attacks mitigation for stateful forwarding in internet of things. J. Netw. Comput. Appl. 130, 1\u201313 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Roohi, A., Adeel, M., Shah, M.A.: DDoS in IoT: a roadmap towards security & countermeasures. In: 2019 25th International Conference on Automation and Computing (ICAC), pp. 1\u20136. IEEE, September 2019","DOI":"10.23919\/IConAC.2019.8895034"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Kajwadkar, S., Jain, V.K.: A novel algorithm for DoS and DDoS attack detection in internet of things. In: 2018 Conference on Information and Communication Technology (CICT), pp. 1\u20134. IEEE, October 2018","DOI":"10.1109\/INFOCOMTECH.2018.8722397"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"106866","DOI":"10.1016\/j.comnet.2019.106866","volume":"162","author":"R Boussada","year":"2019","unstructured":"Boussada, R., Hamdane, B., Elhdhili, M.E., Saidane, L.A.: Privacy-preserving aware data transmission for IoT-based e-health. Comput. Netw. 162, 106866 (2019)","journal-title":"Comput. Netw."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.procs.2015.04.198","volume":"48","author":"A Patil","year":"2015","unstructured":"Patil, A., Gaikwad, R.: Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Comput. Sci. 48, 387\u2013393 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl, G., Kesidis, G., Brooks, R.R., Rai, S.: Denial-of-service attack-detection techniques. IEEE Internet Comput. 10(1), 82\u201389 (2006)","journal-title":"IEEE Internet Comput."},{"key":"15_CR14","unstructured":"Lachance, L., et al.: The Impact of Denial of Service Attacks in the IoT (2016). https:\/\/www.globalsign.com\/en\/blog\/denial-of-service-in-the-iot\/"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. In: 10th USENIX Security Symposium, Washington DC (2001)","DOI":"10.21236\/ADA400003"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Park, H., Li, P., Gao, D., Lee, H., Deng, R.H.: Distinguishing between FE and DDoS using randomness check. In: International Conference on Information Security, pp. 131\u2013145. Springer, Heidelberg, September 2008","DOI":"10.1007\/978-3-540-85886-7_9"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.future.2019.08.007","volume":"102","author":"ZA Baig","year":"2020","unstructured":"Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198\u2013209 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.comnet.2017.03.018","volume":"121","author":"HH Jazi","year":"2017","unstructured":"Jazi, H.H., Gonzalez, H., Stakhanova, N., Ghorbani, A.A.: Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Netw. 121, 25\u201336 (2017)","journal-title":"Comput. Netw."},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"2","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and internet of things security. Computer 2, 76\u201379 (2017)","journal-title":"Computer"},{"key":"15_CR21","unstructured":"Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: 2013 IEEE International Conference on Space Science and Communication (IconSpace), pp. 361\u2013365. IEEE, July 2013"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172\u2013175. IEEE, August 2016","DOI":"10.1109\/EISIC.2016.044"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341. IEEE, December 2015","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, p. 100129 (2019)","DOI":"10.1016\/j.iot.2019.100129"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.future.2019.02.009","volume":"97","author":"MA Da Cruz","year":"2019","unstructured":"Da Cruz, M.A., Rodrigues, J.J., Lorenz, P., Solic, P., Al-Muhtadi, J., Albuquerque, V.H.C.: A proposal for bridging application layer protocols to HTTP on IoT solutions. Future Gener. Comput. Syst. 97, 145\u2013152 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1\u20136. IEEE, January 2015","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"15_CR27","unstructured":"Ojeda Adan, M.F.: Designing an Internet of Things Attack Simulator (2019)"},{"key":"15_CR28","unstructured":"Keary, T.: Dos vs DDoS Attacks. Blog (2018). https:\/\/www.comparitech.com\/net-admin\/dos-vs-ddos-attacks-differences-prevention\/?fbclid=IwAR3QQtEzPjiK8aHdn1TmXgJGcKIvEwXXWKNZixmukQ0ztUvi0sJkgeZJLB8#Broad_Types_of_DOS_and_DDOS_Attacks"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Chen, Q., Chen, H., Cai, Y., Zhang, Y., Huang, X.: Denial of service attack on IoT system. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME), pp. 755\u2013758. IEEE, October 2018","DOI":"10.1109\/ITME.2018.00171"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Mullen, G., Meany, L.: Assessment of buffer overflow based attacks on an IoT operating system. In: 2019 Global IoT Summit (GIoTS), pp. 1\u20136. IEEE, June 2019","DOI":"10.1109\/GIOTS.2019.8766434"},{"key":"15_CR31","unstructured":"Bao, C., Guan, X., Sheng, Q., Zheng, K., Huang, X.: A tool for denial of service attack testing in IoT. Presented at the 1st Conference on Emerging Topics in Interactive Systems (2016)"},{"issue":"7","key":"15_CR32","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"15_CR33","unstructured":"Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS\u2014the internet of distributed denial of service attacks. In: IoTBDS, pp. 47\u201358 (2017)"},{"key":"15_CR34","unstructured":"Tripathi, N., Mehtre, B.M.: DoS and DDoS attacks: impact, analysis and countermeasures. In: National Conference on Advances in Computing, Networking and Security, Nanded, India (2013). https:\/\/docs.google.com\/viewer"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Hirakawa, T., Ogura, K., Bista, B.B., Takata, T.: A defense method against distributed slow HTTP DoS attack. In: 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 152\u2013158. IEEE, September 2016","DOI":"10.1109\/NBiS.2016.58"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Huraj, L., Simon, M., Hor\u00e1k, T.: IoT measuring of UDP-based distributed reflective DoS attack. In: 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), pp. 000209\u2013000214. IEEE, September 2018","DOI":"10.1109\/SISY.2018.8524703"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Pajila, P.B., Julie, E.G.: Detection of DDoS attack using SDN in IoT: a survey. In: Intelligent Communication Technologies and Virtual Mobile Networks, pp. 438\u2013452. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-28364-3_44"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Kolias, C., Stavrou, A.: The mirai botnet and the IoT zombie armies. In: MILCOM 2017\u20132017 IEEE Military Communications Conference (MILCOM), pp. 267\u2013272. IEEE (2017)","DOI":"10.1109\/MILCOM.2017.8170867"}],"container-title":["Advances in Intelligent Systems and Computing","Artificial Intelligence and Bioinspired Computational Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51971-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T19:13:21Z","timestamp":1618254801000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51971-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030519704","9783030519711"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51971-1_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computer Science On-line Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csolc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csoc.openpublish.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}