{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:52:38Z","timestamp":1775065958585,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_19","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"317-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1921-4952","authenticated-orcid":false,"given":"Abdulkareem A.","family":"Hezam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5348-502X","authenticated-orcid":false,"given":"Salama A.","family":"Mostafa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7742-5929","authenticated-orcid":false,"given":"Azizul Azhar","family":"Ramli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2275-0094","authenticated-orcid":false,"given":"Hairulnizam","family":"Mahdin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1676-932X","authenticated-orcid":false,"given":"Bashar Ahmed","family":"Khalaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"issue":"5","key":"19_CR1","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/3310165.3310175","volume":"48","author":"A Abhishta","year":"2019","unstructured":"Abhishta, A., van Rijswijk-Deij, R., Nieuwenhuis, L.J.: Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. ACM SIGCOMM Comput. Commun. Rev. 48(5), 70\u201376 (2019)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"19_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29\u201335. IEEE (2018)","DOI":"10.1109\/SPW.2018.00013"},{"issue":"3","key":"19_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Khalaf, B.A., et al.: An adaptive protection of flooding attacks model for complex network environments. Secur. Commun. Netw. 2021, 1\u201317 (2021)","DOI":"10.1155\/2021\/5542919"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","volume":"9","author":"ZK Maseer","year":"2021","unstructured":"Maseer, Z.K., Yusof, R., Bahaman, N., Mostafa, S.A., Foozy, C.F.M.: Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE Access 9, 22351\u201322370 (2021)","journal-title":"IEEE Access"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Azizan, A.H., et al.: A machine learning approach for improving the performance of network intrusion detection systems. Ann. Emerging Technol. Comput. (AETiC) 5(5), (2021)","DOI":"10.33166\/AETiC.2021.05.025"},{"key":"19_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-981-33-6835-4_21","volume-title":"Advances in Cyber Security","author":"A Zulhilmi","year":"2021","unstructured":"Zulhilmi, A., Mostafa, S.A., Khalaf, B.A., Mustapha, A., Tenah, S.S.: A comparison of three machine learning algorithms in the classification of network intrusion. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 313\u2013324. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_21"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Khalaf, B.A., Mostafa, S.A., Mustapha, A., Mohammed, M.A., Abduallah, W.M.: Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7, 51691\u201351713 (2019)","DOI":"10.1109\/ACCESS.2019.2908998"},{"key":"19_CR10","unstructured":"Al-Othman, Z., Alkasassbeh, M., Baddar, S.A.-H.: A state-of-the-art review on IoT botnet attack detection. arXiv preprint arXiv:2010.13852 (2020)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Ahmed, M.E., Kim, H.: DDoS attack mitigation in internet of things using software defined networking. In: Proceedings of 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService, pp. 271\u2013276 (2017)","DOI":"10.1109\/BigDataService.2017.41"},{"issue":"2","key":"19_CR12","first-page":"76","volume":"119","author":"R Metz","year":"2016","unstructured":"Metz, R.: Finding insecurity in the internet of things. Technol. Rev 119(2), 76\u201377 (2016)","journal-title":"Technol. Rev"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceedings of 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, vol. 3, pp. 648\u2013651 (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: Proceedings 2018 IEEE Symposium on Security and Privacy Workshops, SPW, pp. 29\u201335 (2018)","DOI":"10.1109\/SPW.2018.00013"},{"issue":"7","key":"19_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"issue":"10","key":"19_CR16","doi-asserted-by":"publisher","first-page":"9552","DOI":"10.1109\/JIOT.2020.2993782","volume":"7","author":"Y Jia","year":"2020","unstructured":"Jia, Y., Zhong, F., Alrawais, A., Gong, B., Cheng, X.: Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J. 7(10), 9552\u20139562 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"19_CR17","doi-asserted-by":"publisher","first-page":"4372","DOI":"10.3390\/s20164372","volume":"20","author":"YN Soe","year":"2020","unstructured":"Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Sakurai, K.: Machine learning-based IoT-botnet attack detection with sequential architecture. Sensors 20(16), 4372 (2020)","journal-title":"Sensors"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Parra, G.D.L.T., Rad, P., Choo, K.K.R., Beebe, N.: Detecting Internet of Things attacks using distributed deep learning. J. Netw. Comput. Appl. 163, 102662 (2020)","DOI":"10.1016\/j.jnca.2020.102662"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Ab Aziz, M.F., Mostafa, S.A., Foozy, C.F.M., Mohammed, M.A., Elhoseny, M., Abualkishik, A.: Integrating elman recurrent neural network with particle swarm optimization algorithms for an improved hybrid training of multidisciplinary datasets. Expert Syst. Appl. 183, 115441 (2021)","DOI":"10.1016\/j.eswa.2021.115441"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"51258","DOI":"10.1109\/ACCESS.2021.3069770","volume":"9","author":"SA Kashinath","year":"2021","unstructured":"Kashinath, S.A., et al.: Review of data fusion methods for real-time and multi-sensor traffic flow analysis. IEEE Access 9, 51258\u201351276 (2021)","journal-title":"IEEE Access"},{"key":"19_CR21","unstructured":"Wu, J.: Introduction to convolutional neural networks. Natl. Key Lab Novel Softw. Technol. 5(23), 495 (2017)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Maseer, Z.K., Yusof, R., Mostafa, S.A., Bahaman, N., Musa, O., Al-rimy, B.A.S.: DeepIoT.IDS: hybrid deep learning for enhancing IoT network intrusion detection. CMC-Comput. Mater. Continua 69(3), 3945\u20133966 (2021)","DOI":"10.32604\/cmc.2021.016074"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:16:28Z","timestamp":1638450988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}