{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:28:39Z","timestamp":1755221319513,"version":"3.43.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006295","type":"print"},{"value":"9783032006301","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00630-1_14","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:37:05Z","timestamp":1754660225000},"page":"248-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Are Trees Really Green? A Detection Approach of\u00a0IoT Malware Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8269-9777","authenticated-orcid":false,"given":"Silvia Lucia","family":"Sanna","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0092-9067","authenticated-orcid":false,"given":"Diego","family":"Soi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2640-4663","authenticated-orcid":false,"given":"Davide","family":"Maiorca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5759-3017","authenticated-orcid":false,"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"14_CR1","unstructured":"What is the Mirai botnet? (2025). https:\/\/www.cloudflare.com\/it-it\/learning\/ddos\/glossary\/mirai-botnet\/"},{"issue":"15","key":"14_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010). https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010","journal-title":"Comput. Netw."},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Bader, O., Lichy, A., Hajaj, C., Dubin, R., Dvir, A.: MalDIST: from encrypted traffic classification to malware traffic detection and classification. In: 2022 IEEE 19th Annual Consumer Communications and Networking Conference (CCNC), pp. 527\u2013533 (2022). https:\/\/doi.org\/10.1109\/CCNC49033.2022.9700625","DOI":"10.1109\/CCNC49033.2022.9700625"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Barradas, D., Novo, C., Portela, B., Romeiro, S., Santos, N.: Extending c2 traffic detection methodologies: from TLS 1.2 to TLS 1.3-enabled malware. In: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses. RAID \u201924, Association for Computing Machinery, New York, (2024). https:\/\/doi.org\/10.1145\/3678890.3678921","DOI":"10.1145\/3678890.3678921"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 129\u2013138. ACSAC \u201912, Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2420950.2420969","DOI":"10.1145\/2420950.2420969"},{"key":"14_CR6","doi-asserted-by":"publisher","DOI":"10.1134\/S1064562422060230","author":"S Budennyy","year":"2022","unstructured":"Budennyy, S., et al.: eco2AI: carbon emissions tracking of machine learning models as the first step towards sustainable AI. Dokl. Math. (2022). https:\/\/doi.org\/10.1134\/S1064562422060230","journal-title":"Dokl. Math."},{"key":"14_CR7","unstructured":"Business, T.: \u2018Hide\u2019n seek\u2019 botnet uses peer-to-peer infrastructure to compromise IoT devices (2018). https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/-hide-n-seek-botnet-uses-peer-to-peer-infrastructure-to-compromise-iot-devices"},{"key":"14_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107621","volume":"97","author":"D Canavese","year":"2022","unstructured":"Canavese, D., Regano, L., Basile, C., Ciravegna, G., Lioy, A.: Encryption-agnostic classifiers of traffic originators and their application to anomaly detection. Comput. Electr. Eng. 97, 107621 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107621","journal-title":"Comput. Electr. Eng."},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Candelieri, A., Ponti, A., Archetti, F.: Fair and green hyperparameter optimization via multi-objective and multiple information source Bayesian optimization. Mach. Learn. 113 (2024). https:\/\/doi.org\/10.1007\/s10994-024-06515-0","DOI":"10.1007\/s10994-024-06515-0"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Churcher, A., et al.: An experimental analysis of attack classification using machine learning in IoT networks. Sensors 21(2) (2021). https:\/\/doi.org\/10.3390\/s21020446","DOI":"10.3390\/s21020446"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Davanian, A., Faloutsos, M., Lindorfer, M.: C2miner: Tricking IoT malware into revealing live command and control servers. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. ASIA CCS \u201924, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3634737.3644992","DOI":"10.1145\/3634737.3644992"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Garc\u00eda-Mart\u00edn, E., Lavesson, N., Grahn, H., Casalicchio, E., Boeva, V.: How to measure energy consumption in machine learning algorithms. In: ECML PKDD 2018 Workshops, pp. 243\u2013255. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-13453-2_20","DOI":"10.1007\/978-3-030-13453-2_20"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jpdc.2019.07.007","volume":"134","author":"E Garc\u00eda-Mart\u00edn","year":"2019","unstructured":"Garc\u00eda-Mart\u00edn, E., Rodrigues, C.F., Riley, G., Grahn, H.: Estimation of energy consumption in machine learning. J. Parallel Distrib. Comput. 134, 75\u201388 (2019). https:\/\/doi.org\/10.1016\/j.jpdc.2019.07.007","journal-title":"J. Parallel Distrib. Comput."},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Geurst, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63 (2006). https:\/\/doi.org\/10.1007\/s10994-006-6226-1","DOI":"10.1007\/s10994-006-6226-1"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","volume":"9","author":"TT Huong","year":"2021","unstructured":"Huong, T.T., et al.: LocKedge: low-complexity cyberattack detection in IoT edge computing. IEEE Access 9, 29696\u201329710 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3058528","journal-title":"IEEE Access"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Ioannou, I., et al.: GEMLIDS-MIOT: a green effective machine learning intrusion detection system based on federated learning for medical IoT network security hardening. Comput. Commun. 218 (2024).https:\/\/doi.org\/10.1016\/j.comcom.2024.02.023","DOI":"10.1016\/j.comcom.2024.02.023"},{"issue":"10","key":"14_CR17","doi-asserted-by":"publisher","first-page":"9552","DOI":"10.1109\/JIOT.2020.2993782","volume":"7","author":"Y Jia","year":"2020","unstructured":"Jia, Y., Zhong, F., Alrawais, A., Gong, B., Cheng, X.: FlowGuard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J. 7(10), 9552\u20139562 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2993782","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/JIOT.2021.3121517","volume":"9","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Swarnkar, M., Singal, G., Kumar, N.: IoT network traffic classification using machine learning algorithms: an experimental analysis. IEEE Internet Things J. 9(2), 989\u20131008 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3121517","journal-title":"IEEE Internet Things J."},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-34062-8_32","volume-title":"Information Computing and Applications","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Wang, Y., Zhang, J.: New machine learning algorithm: random forest. In: Liu, B., Ma, M., Chang, J. (eds.) ICICA 2012. LNCS, vol. 7473, pp. 246\u2013252. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34062-8_32"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Keertikumar, M., Shubham, M., Banakar, R.: Evolution of IoT in smart vehicles: an overview. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 804\u2013809 (2015). https:\/\/doi.org\/10.1109\/ICGCIoT.2015.7380573","DOI":"10.1109\/ICGCIoT.2015.7380573"},{"issue":"5","key":"14_CR21","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182\u20138201 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2935189","journal-title":"IEEE Internet Things J."},{"key":"14_CR22","doi-asserted-by":"publisher","DOI":"10.3390\/su141610161","author":"FB Modarress","year":"2022","unstructured":"Modarress, F.B., Ansari, A., Al, A.: Threats of Internet-of-Thing on environmental sustainability by e-waste. Sustainability (2022). https:\/\/doi.org\/10.3390\/su141610161","journal-title":"Sustainability"},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Mukhtar, B.I., Elsayed, M.S., Jurcut, A.D., Azer, M.A.: IoT vulnerabilities and attacks: silex malware case study. Symmetry 15(11) (2023).https:\/\/doi.org\/10.3390\/sym15111978","DOI":"10.3390\/sym15111978"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Navada, A., Ansari, A.N., Patil, S., Sonkamble, B.A.: Overview of use of decision tree algorithms in machine learning. In: 2011 IEEE Control and System Graduate Research Colloquium, pp. 37\u201342 (2011). https:\/\/doi.org\/10.1109\/ICSGRC.2011.5991826","DOI":"10.1109\/ICSGRC.2011.5991826"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Schiller, E., et al.: Landscape of IoT security. Comput. Sci. Rev. 44, 100467 (2022). https:\/\/doi.org\/10.1016\/j.cosrev.2022.100467","DOI":"10.1016\/j.cosrev.2022.100467"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Garcia, S., Agustin\u00a0Parmisano, M.J.E.: IoT-23: a labeled dataset with malicious and benign IoT network traffic https:\/\/doi.org\/10.5281\/zenodo.4743746","DOI":"10.5281\/zenodo.4743746"},{"key":"14_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100670","volume":"21","author":"N Tekin","year":"2023","unstructured":"Tekin, N., Acar, A., Aris, A., Uluagac, A.S., Gungor, V.C.: Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 21, 100670 (2023). https:\/\/doi.org\/10.1016\/j.iot.2022.100670","journal-title":"Internet Things"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"Tripp, C.E., et al.: Measuring the energy consumption and efficiency of deep neural networks: an empirical analysis and design recommendations (2024). https:\/\/doi.org\/10.48550\/arXiv.2403.08151","DOI":"10.48550\/arXiv.2403.08151"},{"issue":"2","key":"14_CR29","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TEVC.2014.2313407","volume":"19","author":"T Tu\u0161ar","year":"2015","unstructured":"Tu\u0161ar, T., Filipi\u010d, B.: Visualization of pareto front approximations in evolutionary multiobjective optimization: a critical review and the prosection method. IEEE Trans. Evol. Comput. 19(2), 225\u2013245 (2015). https:\/\/doi.org\/10.1109\/TEVC.2014.2313407","journal-title":"IEEE Trans. Evol. Comput."},{"key":"14_CR30","unstructured":"Vijayan, J.: \u2018torii\u2019 breaks new ground for IoT malware (2018). https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/-torii-breaks-new-ground-for-iot-malware"},{"issue":"20","key":"14_CR31","doi-asserted-by":"publisher","first-page":"15422","DOI":"10.1109\/JIOT.2021.3063840","volume":"8","author":"H Wang","year":"2021","unstructured":"Wang, H.: An evolutionary study of IoT malware. IEEE Internet Things J. 8(20), 15422\u201315440 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3063840","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"14_CR32","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10(4), 2233\u20132243 (2014). https:\/\/doi.org\/10.1109\/TII.2014.2300753","journal-title":"IEEE Trans. Industr. Inf."},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Yarally, T., Cruz, L., Feitosa, D., Sallou, J., van Deursen, A.: Uncovering energy-efficient practices in deep learning training: preliminary steps towards green AI. In: 2023 IEEE\/ACM 2nd International Conference on AI Engineering \u2013 Software Engineering for AI (CAIN), pp. 25\u201336 (2023). https:\/\/doi.org\/10.1109\/CAIN58948.2023.00012","DOI":"10.1109\/CAIN58948.2023.00012"},{"key":"14_CR34","doi-asserted-by":"publisher","unstructured":"Yokoyama, A.M., Ferro, M., Schulze, B.: A multi-objective hyperparameter optimization for machine learning using genetic algorithms: A green AI centric approach. In: Bicharra\u00a0Garcia, A.C., Ferro, M., Rodr\u00edguez\u00a0Rib\u00f3n, J.C. (eds.) Advances in Artificial Intelligence \u2013 IBERAMIA 2022. Springer International Publishing (2022). https:\/\/doi.org\/10.1007\/978-3-031-22419-5_12","DOI":"10.1007\/978-3-031-22419-5_12"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00630-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:37:06Z","timestamp":1754660226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00630-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006295","9783032006301"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00630-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}