{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:13Z","timestamp":1742913013379,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031609930"},{"type":"electronic","value":"9783031609947"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-60994-7_4","type":"book-chapter","created":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:04:39Z","timestamp":1716764679000},"page":"37-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning for\u00a0Preventing Botnet Attacks on\u00a0IoT"],"prefix":"10.1007","author":[{"given":"J. N.","family":"Al-Jaghoub","sequence":"first","affiliation":[]},{"given":"N. M.","family":"Jibreel","sequence":"additional","affiliation":[]},{"given":"F.","family":"Maleki","sequence":"additional","affiliation":[]},{"given":"J. A. J.","family":"Aljohar","sequence":"additional","affiliation":[]},{"given":"F. N.","family":"Fakhoury","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0243-9020","authenticated-orcid":false,"given":"G. B.","family":"Satrya","sequence":"additional","affiliation":[]},{"given":"R.","family":"Zgheib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,26]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1007\/s10586-021-03231-5","volume":"26","author":"A Alhowaide","year":"2021","unstructured":"Alhowaide, A., Alsmadi, I., Tang, J.: Towards the design of real-time autonomous IoT NIDS. Cluster Comput. 26, 2489\u20132502 (2021)","journal-title":"Cluster Comput."},{"key":"4_CR2","unstructured":"Brownlee, J.: Optimization for Machine Learning. Machine Learning Mastery (2021)"},{"issue":"8","key":"4_CR3","first-page":"531","volume":"9","author":"J Costa","year":"2020","unstructured":"Costa, J., Dessai, N., Gaonkar, S., Aswale, S., Shetgaonkar, P.: IoT-botnet detection using long short-term memory recurrent neural network. Int. J. Eng. Res 9(8), 531\u2013536 (2020)","journal-title":"Int. J. Eng. Res"},{"issue":"5","key":"4_CR4","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Networks 44(5), 643\u2013666 (2004). https:\/\/doi.org\/10.1016\/j.comnet.2003.10.003","journal-title":"Comput. Networks"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-18305-3_1","volume-title":"Machine Learning in Radiation Oncology","author":"I El Naqa","year":"2015","unstructured":"El Naqa, I., Murphy, M.J.: What is machine learning? In: El Naqa, I., Li, R., Murphy, M.J. (eds.) Machine Learning in Radiation Oncology, pp. 3\u201311. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18305-3_1"},{"issue":"4","key":"4_CR6","first-page":"380","volume":"5","author":"AA Hezam","year":"2021","unstructured":"Hezam, A.A., Mostafa, S.A., Baharum, Z., Alanda, A., Salikon, M.Z.: Combining deep learning models for enhancing the detection of botnet attacks in multiple sensors internet of things networks. JOIV Int. J. Inform. Vis. 5(4), 380\u2013387 (2021)","journal-title":"JOIV Int. J. Inform. Vis."},{"issue":"1","key":"4_CR7","first-page":"110","volume":"10","author":"I Idrissi","year":"2021","unstructured":"Idrissi, I., Boukabous, M., Azizi, M., Moussaoui, O., El Fadili, H.: Toward a deep learning-based intrusion detection system for IoT against botnet attacks. IAES Int. J. Artif. Intell. 10(1), 110 (2021)","journal-title":"IAES Int. J. Artif. Intell."},{"issue":"19","key":"4_CR8","doi-asserted-by":"publisher","first-page":"7009","DOI":"10.3390\/app10197009","volume":"10","author":"J Kim","year":"2020","unstructured":"Kim, J., Shim, M., Hong, S., Shin, Y., Choi, E.: Intelligent detection of IoT botnets using machine learning and deep learning. Appl. Sci. 10(19), 7009 (2020)","journal-title":"Appl. Sci."},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Lange, T., Kettani, H.: On security threats of botnets to cyber systems. In: 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 176\u2013183 (2019). https:\/\/doi.org\/10.1109\/SPIN.2019.8711780","DOI":"10.1109\/SPIN.2019.8711780"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BAIOT: network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Nayak, G., Mishra, A., Samal, U., Mishra, B.K.: Depth analysis on DoS & DDoS attacks. In: Wireless Communication Security, Chap. 9, pp. 159\u2013182 (2022)","DOI":"10.1002\/9781119777465.ch9"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"012045","DOI":"10.1088\/1742-6596\/1228\/1\/012045","volume":"1228","author":"PR Kumar","year":"2019","unstructured":"Kumar, P.R., Manash, E.B.K.: Deep learning: a branch of machine learning. J. Phys. Conf. Ser. 1228, 012045 (2019)","journal-title":"J. Phys. Conf. Ser."},{"issue":"9","key":"4_CR13","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1109\/JSEN.2019.2891911","volume":"19","author":"J Portilla","year":"2019","unstructured":"Portilla, J., Mujica, G., Lee, J.S., Riesgo, T.: The extreme edge at the bottom of the internet of things: a review. IEEE Sens. J. 19(9), 3179\u20133190 (2019)","journal-title":"IEEE Sens. J."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"102324","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"MA Rahman","year":"2020","unstructured":"Rahman, M.A., Asyhari, A.T., Leong, L., Satrya, G., Tao, M.H., Zolkipli, M.: Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain. Cities Soc. 61, 102324 (2020). https:\/\/doi.org\/10.1016\/j.scs.2020.102324","journal-title":"Sustain. Cities Soc."},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Rahmantyo, D.T., Erfianto, B., Satrya, G.B.: Deep residual CNN for preventing botnet attacks on the internet of things. In: 2021 4th International Conference of Computer and Informatics Engineering (IC2IE), pp. 462\u2013466 (2021). https:\/\/doi.org\/10.1109\/IC2IE53219.2021.9649314","DOI":"10.1109\/IC2IE53219.2021.9649314"},{"key":"4_CR16","unstructured":"Sapre, S., Ahmadi, P., Islam, K.R.: A robust comparison of the KDDCup99 and NSL-KDD IOT network intrusion detection datasets through various machine learning algorithms. CoRR abs\/1912.13204 (2019). http:\/\/arxiv.org\/abs\/1912.13204"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"8432","DOI":"10.1109\/JIOT.2022.3188583","volume":"10","author":"R Yumlembam","year":"2022","unstructured":"Yumlembam, R., Issac, B., Jacob, S.M., Yang, L.: IoT-based android malware detection using graph neural network with adversarial defense. IEEE Internet Things J. 10, 8432\u20138444 (2022)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-60994-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T23:09:12Z","timestamp":1716764952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-60994-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031609930","9783031609947"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-60994-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}