{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:21Z","timestamp":1742913381810,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811600098"},{"type":"electronic","value":"9789811600104"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-0010-4_16","type":"book-chapter","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:19:49Z","timestamp":1612829989000},"page":"174-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Behavioural Network Traffic Novelty Detection for the Internet of Things Infrastructures"],"prefix":"10.1007","author":[{"given":"Salma Abdalla","family":"Hamad","sequence":"first","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Dai Hoang","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Wei Emma","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"16_CR1","unstructured":"Boddy, S., Shattuck, J.: The hunt for IoT: the rise of the thingbots. F5 Labs Threat Anal. Rep. 3, 1\u201327 (2017)"},{"key":"16_CR2","unstructured":"Lamrini, B., Gjini, A., Daudin, S.: Anomaly detection using similarity-based one-class SVM for network traffic characterization. In: International Workshop on Principles of Diagnosis - DX, pp. 1\u20138 (2018)"},{"key":"16_CR3","first-page":"1","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan, M., Islam, M.M., Zarif, M.I.I., Hashem, M.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. IEEE Internet Things - IoT J. 7, 1\u201314 (2019)","journal-title":"IEEE Internet Things - IoT J."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Salman, T., Bhamare, D.: Machine learning for anomaly detection and categorization in multi-cloud environments. In: IEEE International Conference on Cyber Security and Cloud Computing - CSCloud, pp. 97\u2013103 (2017)","DOI":"10.1109\/CSCloud.2017.15"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa, N., Turnbull, B., Choo, K.K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet Things J. - IoT J. 6, 4815\u20134830 (2018)","journal-title":"IEEE Internet Things J. - IoT J."},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.adhoc.2018.09.014","volume":"84","author":"F Feng","year":"2019","unstructured":"Feng, F., Liu, X., Yong, B., Zhou, R., Zhou, Q.: Anomaly detection in ad-hoc networks based on deep learning model: a plug and play device. Ad Hoc Netw. 84, 82\u201389 (2019)","journal-title":"Ad Hoc Netw."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, J.: Imagenet: a large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition - CVPR, pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"16_CR8","unstructured":"Franklin, J., Mccoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: USENIX Security Symposium - USENIX-SS, p. Article No. 12 (2006)"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TDSC.2014.2369033","volume":"12","author":"SV Radhakrishnan","year":"2015","unstructured":"Radhakrishnan, S.V., Uluagac, A.S., Beyah, R.: GTID: a technique for physical device and device type fingerprinting. IEEE Trans. Dependable Secure Comput. TDSC 12, 519\u2013532 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput. TDSC"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., Tarkoma, S.: IoT SENTINEL: automated device-type identification for security enforcement in IoT. In: IEEE International Conference on Distributed Computing Systems - ICDCS, pp. 2177\u20132184 (2017)","DOI":"10.1109\/ICDCS.2017.283"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In: Network and Distributed Systems Security Symposium - NDSS, pp. 1\u201315 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Hamza, A., Gharakheili, H.H., Benson: Detecting volumetric attacks on loT devices via SDN-based monitoring of MUD activity. In: ACM Symposium on SDN Research - SOSR, pp. 36\u201348 (2019)","DOI":"10.1145\/3314148.3314352"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Bezerra, V.H., da Costa, V.G.T., Barbon Junior, S., Miani, R.S., Zarpel\u00e3o, B.B.: IoTDS: a one-class classification approach to detect botnets in Internet of Things devices. Sensors 19, 1\u201320 (2019)","DOI":"10.3390\/s19143188"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N.: DIoT: a federated self-learning anomaly detection system for IoT. In: IEEE International Conference on Distributed Computing Systems - ICDCS, pp. 1\u201312 (2019)","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"16_CR15","unstructured":"Fruhlinger, J.: The Mirai botnet explained: how IoT devices almost brought down the internet|CSO Online (2018). https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Hamad, S.A., Zhang, W.E., Sheng, Q.Z., Nepal, S.: IoT device identification via network-flow based fingerprinting and learning. IEEE International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom, pp. 103\u2013111 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"16_CR17","unstructured":"Pierce, R.: Quartiles (2016). https:\/\/mathsisfun.com\/data\/quartiles.html"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Bellinger, C., Sharma, S., Japkowicz, N.: One-class versus binary classification: which and when? In: International Conference on Machine Learning and Applications - ICMLA, pp. 102\u2013106 (2012)","DOI":"10.1109\/ICMLA.2012.212"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MAF Pimentel","year":"2014","unstructured":"Pimentel, M.A.F., Clifton, D.A., Clifton, L.: A review of novelty detection. Signal Process. 99, 215\u2013249 (2014)","journal-title":"Signal Process."},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Ting, K.M., Aryal, S.: Tutorial: which anomaly detector should i use? In: IEEE International Conference on Data Mining - ICDM, pp. 1\u2013143 (2018)","DOI":"10.1109\/ICDM.2018.00015"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: IEEE International Conference on Data Mining - ICDM, pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data TKDD 6, 1\u201337 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data TKDD"},{"key":"16_CR23","unstructured":"Guru99: RNN(Recurrent Neural Network) Tutorial: TensorFlow Example (2020). https:\/\/www.guru99.com\/rnn-tutorial.html"},{"key":"16_CR24","unstructured":"UNSW-Sydney: IoT Security - IoT Traffic Analysis (2019). https:\/\/iotanalytics.unsw.edu.au\/attack-data"},{"key":"16_CR25","unstructured":"Scikit: Sklearn documentation (2019). https:\/\/scikit-learn.org\/stable\/"},{"key":"16_CR26","unstructured":"Keras: Home - Keras Documentation (2019). https:\/\/keras.io\/"}],"container-title":["Communications in Computer and Information Science","Parallel Architectures, Algorithms and Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-0010-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T14:36:41Z","timestamp":1617287801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-16-0010-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811600098","9789811600104"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-0010-4_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Parallel Architectures, Algorithms and Programming","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"paap2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}