{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T05:24:46Z","timestamp":1749878686123,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031518256"},{"type":"electronic","value":"9783031518263"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51826-3_2","type":"book-chapter","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:02:00Z","timestamp":1705471320000},"page":"14-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Optimized Edge-cCCN Based Model for\u00a0the\u00a0Detection of\u00a0DDoS Attack in\u00a0IoT Environment"],"prefix":"10.1007","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Internet of things and wireless sensor network for smart cities. Int. J. Comput. Sci. 14, 50\u201355 (2017). https:\/\/doi.org\/10.20943\/01201705.5055","DOI":"10.20943\/01201705.5055"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Wireless connected smart microsystems. Sens. Mater. 447 (2018). https:\/\/doi.org\/10.18494\/sam.2018.1765","DOI":"10.18494\/sam.2018.1765"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Detection and prevention algorithm of DDoS attack over the IoT networks. Tem J. 899\u2013906 (2020). https:\/\/doi.org\/10.18421\/tem93-09","DOI":"10.18421\/tem93-09"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Abbas, N., Nasser, Y., Shehab, M., Sharafeddine, S.: Attack-specific feature selection for anomaly detection in software-defined networks. In: 2021 3rd IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 142\u2013146. IEEE (2021)","DOI":"10.1109\/MENACOMM50742.2021.9678279"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1049\/iet-sen.2019.0344","volume":"14","author":"N Bak","year":"2020","unstructured":"Bak, N., Chang, B., Choi, K.: SmartVisual: a visualisation tool for SmartThings IoT apps using static analysis. IET Softw. 14, 411\u2013422 (2020). https:\/\/doi.org\/10.1049\/iet-sen.2019.0344","journal-title":"IET Softw."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447625","volume":"54","author":"F Chen","year":"2021","unstructured":"Chen, F., Luo, D., Xiang, T., Truong, H.: IoT cloud security review. ACM Comput. Surv. 54, 1\u201336 (2021). https:\/\/doi.org\/10.1145\/3447625","journal-title":"ACM Comput. Surv."},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Chen, F., Xiao, Z., Xiang, T., Truong, H.: A full lifecycle authentication scheme for large-scale smart IoT applications. IEEE Trans. Depend. Sec. Comput. 1 (2022). https:\/\/doi.org\/10.1109\/tdsc.2022.3178115","DOI":"10.1109\/tdsc.2022.3178115"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1109\/JIOT.2021.3090909","volume":"9","author":"I Cviti\u0107","year":"2021","unstructured":"Cviti\u0107, I., Perakovic, D., Gupta, B.B., Choo, K.K.R.: Boosting-based DDoS detection in Internet of Things systems. IEEE Internet Things J. 9(3), 2109\u20132123 (2021)","journal-title":"IEEE Internet Things J."},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.future.2020.11.027","volume":"117","author":"A Dahiya","year":"2021","unstructured":"Dahiya, A., Gupta, B.B.: A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Futur. Gener. Comput. Syst. 117, 193\u2013204 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE Security and Privacy Workshops (SPW) (2018). https:\/\/doi.org\/10.1109\/spw.2018.00013","DOI":"10.1109\/spw.2018.00013"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Fayyaz, U., Shah, G.: IoT DoS and DDoS attack detection using ResNet. In: 2020 IEEE 23rd International Multitopic Conference (INMIC) (2020). https:\/\/doi.org\/10.1109\/inmic50486.2020.9318216","DOI":"10.1109\/inmic50486.2020.9318216"},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.302895","volume":"18","author":"B Hu","year":"2022","unstructured":"Hu, B., Gaurav, A., Choi, C., Almomani, A.: Evaluation and comparative analysis of semantic web-based strategies for enhancing educational system development. Int. J. Semant. Web Inform. Syst. (IJSWIS) 18(1), 1\u201314 (2022)","journal-title":"Int. J. Semant. Web Inform. Syst. (IJSWIS)"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Khader, R., Eleyan, D.: Survey of DoS\/DDoS attacks in IoT. Sustain. Eng. Innov. ISSN 2712\u20130562 3, 23\u201328 (2021). https:\/\/doi.org\/10.37868\/sei.v3i1.124","DOI":"10.37868\/sei.v3i1.124"},{"issue":"1","key":"2_CR14","first-page":"1","volume":"12","author":"S Khanam","year":"2022","unstructured":"Khanam, S., Tanweer, S., Khalid, S.S.: Future of internet of things: enhancing cloud-based IoT using artificial intelligence. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1\u201323 (2022)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"1","key":"2_CR15","first-page":"1","volume":"12","author":"MA Kiran","year":"2022","unstructured":"Kiran, M.A., Pasupuleti, S.K., Eswari, R.: Efficient pairing-free identity-based Signcryption scheme for cloud-assisted IoT. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1\u201315 (2022)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"1","key":"2_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJICA.2022.121387","volume":"12","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Singh, S.K., Lobiyal, D., Chui, K.T., Santaniello, D., Rafsanjani, M.K.: A novel decentralized group key management scheme for cloud-based vehicular IoT networks. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1\u201334 (2022)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11235-020-00747-w","volume":"77","author":"A Mishra","year":"2021","unstructured":"Mishra, A., Gupta, N., Gupta, B.: Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller. Telecommun. Syst. 77, 47\u201362 (2021)","journal-title":"Telecommun. Syst."},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Nagpal, N.: Analyzing role of big data and IoT in smart cities. Int. J. Adv. Eng. Manage. Sci. 3, 584\u2013586 (2017). https:\/\/doi.org\/10.24001\/ijaems.3.5.29","DOI":"10.24001\/ijaems.3.5.29"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Quist, A.: Digital forensic challenges in internet of things (IoT). Adv. Multidiscip. Sci. Res. J. Publ. 1, 119\u2013124 (2022). https:\/\/doi.org\/10.22624\/aims\/crp-bk3-p20","DOI":"10.22624\/aims\/crp-bk3-p20"},{"issue":"1","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.300824","volume":"18","author":"MG Raj","year":"2022","unstructured":"Raj, M.G., Pani, S.K.: Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int. J. Seman. Web Inform. Syst. (IJSWIS) 18(1), 1\u201325 (2022)","journal-title":"Int. J. Seman. Web Inform. Syst. (IJSWIS)"},{"issue":"1","key":"2_CR21","first-page":"1","volume":"12","author":"TP Sadatacharapandi","year":"2022","unstructured":"Sadatacharapandi, T.P., Padmavathi, S.: Survey on service placement, provisioning, and composition for fog-based IoT systems. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1\u201314 (2022)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"2","key":"2_CR22","first-page":"1","volume":"11","author":"M Sarrab","year":"2021","unstructured":"Sarrab, M., Alshohoumi, F.: Assisted-fog-based framework for IoT-based healthcare data preservation. Int. J. Cloud Appl. Comput. (IJCAC) 11(2), 1\u201316 (2021)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.3390\/s22031094","volume":"22","author":"Z Shah","year":"2022","unstructured":"Shah, Z., Ullah, I., Li, H., Levula, A., Khurshid, K.: Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): a survey. Sensors 22, 1094 (2022). https:\/\/doi.org\/10.3390\/s22031094","journal-title":"Sensors"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"3078","DOI":"10.3390\/s20113078","volume":"20","author":"F Silva","year":"2020","unstructured":"Silva, F., Silva, E., Neto, E., Lemos, M., Neto, A., Esposito, F.: A taxonomy of DDoS attack mitigation approaches featured by SDN technologies in IoT scenarios. Sensors 20, 3078 (2020). https:\/\/doi.org\/10.3390\/s20113078","journal-title":"Sensors"},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.297143","volume":"18","author":"A Singh","year":"2022","unstructured":"Singh, A., Gupta, B.B.: Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions. Int. J. Semant. Web Inform. Syst. (IJSWIS) 18(1), 1\u201343 (2022)","journal-title":"Int. J. Semant. Web Inform. Syst. (IJSWIS)"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.306260","volume":"18","author":"A Tiwari","year":"2022","unstructured":"Tiwari, A., Garg, R.: Adaptive ontology-based IoT resource provisioning in computing systems. Int. J. Semant. Web Inform. Syst. (IJSWIS) 18(1), 1\u201318 (2022)","journal-title":"Int. J. Semant. Web Inform. Syst. (IJSWIS)"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/electronics9030530","volume":"9","author":"I Ullah","year":"2020","unstructured":"Ullah, I., Mahmoud, Q.: A two-level flow-based anomalous activity detection system for IoT networks. Electronics 9, 530 (2020). https:\/\/doi.org\/10.3390\/electronics9030530","journal-title":"Electronics"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TSC.2017.2694426","volume":"13","author":"OA Wahab","year":"2017","unstructured":"Wahab, O.A., Bentahar, J., Otrok, H., Mourad, A.: Optimal load distribution for the detection of VM-based DDoS attacks in the cloud. IEEE Trans. Serv. Comput. 13(1), 114\u2013129 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"24","key":"2_CR29","doi-asserted-by":"publisher","first-page":"16842","DOI":"10.3390\/su142416842","volume":"14","author":"S Wassan","year":"2022","unstructured":"Wassan, S., et al.: Gradient boosting for health IoT federated learning. Sustainability 14(24), 16842 (2022)","journal-title":"Sustainability"},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.patrec.2023.02.026","volume":"168","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q., Guo, Z., Zhu, Y., Vijayakumar, P., Castiglione, A., Gupta, B.B.: A deep learning-based fast fake news detection model for cyber-physical social services. Pattern Recogn. Lett. 168, 31\u201338 (2023)","journal-title":"Pattern Recogn. Lett."}],"container-title":["Lecture Notes in Computer Science","Edge Computing \u2013 EDGE 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51826-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:02:43Z","timestamp":1705471363000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51826-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031518256","9783031518263"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51826-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDGE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Edge Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edge2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/edge","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}