{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:06Z","timestamp":1751516526160,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030786410"},{"type":"electronic","value":"9783030786427"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78642-7_62","type":"book-chapter","created":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T00:38:31Z","timestamp":1625272711000},"page":"465-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attacks and Anomaly Detection in IoT Network Using Machine Learning"],"prefix":"10.1007","author":[{"given":"Amani","family":"Alzahrani","sequence":"first","affiliation":[]},{"given":"Tahani","family":"Baabdullah","sequence":"additional","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"62_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2019.2947723","volume":"7","author":"T Nandy","year":"2019","unstructured":"Nandy, T., et al.: Review on security of internet of things authentication mechanism. IEEE Access. 7, 1\u201336 (2019)","journal-title":"IEEE Access."},{"issue":"4","key":"62_CR2","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"AM Nia","year":"2017","unstructured":"Nia, A.M., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"62_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.compind.2016.02.004","volume":"81","author":"RF Babiceanu","year":"2016","unstructured":"Babiceanu, R.F., Seker, R.: Big data and virtualization for manufacturing cyber-physical systems: a survey of the current status and future outlook. Comput. Ind. 81, 128\u2013137 (2016)","journal-title":"Comput. Ind."},{"issue":"5","key":"62_CR4","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.3390\/s19051141","volume":"19","author":"M El-Hajj","year":"2019","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of internet of things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)","journal-title":"Sensors"},{"issue":"3","key":"62_CR5","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22(3), 1646\u20131685 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"62_CR6","unstructured":"Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT Security Techniques Based on Machine Learning, arXiv preprint arXiv:1801.06275 (2018)"},{"issue":"2","key":"62_CR7","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"62_CR8","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"62_CR9","doi-asserted-by":"crossref","unstructured":"Goeschel, K.: Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis. In: SoutheastCon, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SECON.2016.7506774"},{"issue":"4","key":"62_CR10","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Subaschandrabose, N., Ye, Z.: Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20132. IEEE (2017)","DOI":"10.1109\/PCCC.2017.8280489"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Pi, D.: A novel kernel SVM algorithm with game theory for network intrusion detection. KSII Trans. Internet Inf. Syst. 11(8) (2017)","DOI":"10.3837\/tiis.2017.08.016"},{"issue":"2","key":"62_CR13","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"62_CR14","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60, 708\u2013713 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"62_CR15","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.eswa.2016.07.036","volume":"64","author":"M Swarnkar","year":"2016","unstructured":"Swarnkar, M., Hubballi, N.: OCPAD: one class Naive Bayes classifier for payload based anomaly detection. Expert Syst. Appl. 64, 330\u2013339 (2016)","journal-title":"Expert Syst. Appl."},{"key":"62_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chaos.2018.03.010","volume":"110","author":"L Li","year":"2018","unstructured":"Li, L., Zhang, H., Peng, H., Yang, Y.: Nearest neighbors based density peaks approach to intrusion detection. Chaos Solitons Fractals 110, 33\u201340 (2018)","journal-title":"Chaos Solitons Fractals"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Syarif, A.R., Gata, W.: Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. In: 2017 11th International Conference on Information & Communication Technology and System (ICTS), pp. 181\u2013186. IEEE (2017)","DOI":"10.1109\/ICTS.2017.8265667"},{"issue":"2","key":"62_CR18","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2016","unstructured":"Pajouh, H.H., Javidan, R., Khayami, R., Ali, D., Choo, K.-K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7(2), 314\u2013323 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"62_CR19","doi-asserted-by":"crossref","unstructured":"Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 635\u2013638. IEEE (2017)","DOI":"10.1109\/CSE-EUC.2017.118"},{"key":"62_CR20","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine Learning DDoS Detection for Consumer Internet of Things Devices, arXiv preprint arXiv:1804.04159 (2018)","DOI":"10.1109\/SPW.2018.00013"},{"key":"62_CR21","unstructured":"Meidan, Y., et al.: Detection of Unauthorized IoT Devices Using Machine Learning Techniques, arXiv preprint arXiv:1709.04647 (2017)"},{"key":"62_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, S., Li, W., Zia, T., Zomaya, A.Y.: A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things. In: Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence & Computing, 3rd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 836\u2013843. IEEE (2017)","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.141"},{"key":"62_CR23","unstructured":"Kaggle. https:\/\/www.kaggle.com\/speedwall10\/iot-device-network-logs. Accessed 21 Nov 2019"}],"container-title":["Communications in Computer and Information Science","HCI International 2021 - Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78642-7_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:32:44Z","timestamp":1751495564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78642-7_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030786410","9783030786427"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78642-7_62","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}