{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:52:32Z","timestamp":1762642352997,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11277-020-07486-w","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T16:04:50Z","timestamp":1589904290000},"page":"2493-2510","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Isolation of DDoS Attack in IoT: A New Perspective"],"prefix":"10.1007","volume":"114","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6607-0453","authenticated-orcid":false,"given":"Upendra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shreyshi","family":"Navaneet","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Subhash Chandra","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,19]]},"reference":[{"issue":"1","key":"7486_CR1","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/JIOT.2017.2785219","volume":"5","author":"Basim K J Al-Shammari","year":"2018","unstructured":"Al-Shammari, B. K. J., Al-Aboody, N., & Al-Raweshidy, H. S. (2018). IoT traffic management and integration in the QoS supported network. IEEE Internet of Things Journal, 5(1), 352\u2013370.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"7486_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"Andrea Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 30\u201334.","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"7486_CR3","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233\u20132243.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"7486_CR4","first-page":"1","volume":"80","author":"K Rose","year":"2015","unstructured":"Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of things: An overview. The Internet Society (ISOC), 80, 1\u201350.","journal-title":"The Internet Society (ISOC)"},{"key":"7486_CR5","doi-asserted-by":"crossref","unstructured":"Rajagopalan, A., Jagga, M., Kumari, A., & Ali, S. T. (2017). A DDoS prevention scheme for session resumption SEA architecture in healthcare IoT. In 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT) (Vol. 6, pp. 1\u20135).","DOI":"10.1109\/CIACT.2017.7977361"},{"issue":"1","key":"7486_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MIOT.2018.8552480","volume":"1","author":"F Restruccia","year":"2018","unstructured":"Restruccia, F., Salvatorc, D., & Melodia, T. (2018). Security the Internet of things, new perspective and Research challenges. IEEE Internet of Things Journal, 1(1), 1\u201316.","journal-title":"IEEE Internet of Things Journal"},{"key":"7486_CR7","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT. In A survey international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 4, pp. 3\u20136).","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"7486_CR8","doi-asserted-by":"crossref","unstructured":"Lokulwar, P. P., & Deshmukh, H. R. (2017).Threat analysis and attacks modelling in routing towards IoT. In International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (Vol. 6, pp. 2\u20134).","DOI":"10.1109\/I-SMAC.2017.8058273"},{"issue":"1","key":"7486_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-015-1659-2","volume":"5","author":"JW Seo","year":"2016","unstructured":"Seo, J. W., & Lee, S. J. (2016). A Study of efficient detection of network based IP Spoofing DDoS and Malware infected system. Springer Plus, 5(1), 1\u201320.","journal-title":"Springer Plus"},{"key":"7486_CR10","doi-asserted-by":"crossref","unstructured":"Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2016). A denial of service attack method for an IoT system. In 8th international conference on information technology in medicine and education (Vol. 5, pp. 1\u20133).","DOI":"10.1109\/ITME.2016.0087"},{"key":"7486_CR11","doi-asserted-by":"crossref","unstructured":"Liu, X., Trappe, W., & Lindqvist, J. (2014). A policy-driven approach to access control in future internet name resolution services. In Proceedings of the 9th ACM workshop on mobility in the evolving internet architecture, Maui, HI, USA (pp. 7\u201312).","DOI":"10.1145\/2645892.2645897"},{"issue":"3","key":"7486_CR12","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78(3), 680\u2013698.","journal-title":"Future Generation Computer Systems"},{"key":"7486_CR13","doi-asserted-by":"crossref","unstructured":"Anirudh, M., Arul Thileeban, S., & Nallathambi, D. J. (2017). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In IEEE international conference on computer, communication, and signal processing (ICCCSP-2017) (Vol. 4, pp. 3\u20135).","DOI":"10.1109\/ICCCSP.2017.7944057"},{"key":"7486_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: Survey on the security of Iot frameworks. Journal of Information Security and Applications, 38, 8\u201327.","journal-title":"Journal of Information Security and Applications"},{"key":"7486_CR15","first-page":"501","volume-title":"Detection of DDoS attacks using optimized traffic matrix","author":"SM Lee","year":"2012","unstructured":"Lee, S. M., Kim, D. S., Lee, J. H., & Park, J. S. (2012). Detection of DDoS attacks using optimized traffic matrix (pp. 501\u2013510). Amsterdam: Elsevier."},{"key":"7486_CR16","doi-asserted-by":"crossref","unstructured":"Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. In IEEE World congress on services (SERVICES). IEEE (pp. 21\u201328).","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"4","key":"7486_CR17","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2014.2337336","volume":"1","author":"S Chen","year":"2014","unstructured":"Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). Vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things Journal, 1(4), 349\u2013359.","journal-title":"IEEE Internet of Things Journal"},{"key":"7486_CR18","doi-asserted-by":"crossref","unstructured":"Gehrmann, C., & Abdelraheem, M. A. (2016). IoT protection through device to cloud synchronization. In IEEE 8th international conference on cloud computing technology and science (Vol. 4, pp. 1\u20136).","DOI":"10.1109\/CloudCom.2016.0092"},{"issue":"4","key":"7486_CR19","doi-asserted-by":"publisher","first-page":"4951","DOI":"10.1007\/s11277-017-4759-1","volume":"97","author":"T Ramasamy","year":"2017","unstructured":"Ramasamy, T., & Arjunasamy, A. (2017). Advanced heuristic for selecting friends in social Internet of things. Wireless Personal Communications, 97(4), 4951\u20134965.","journal-title":"Wireless Personal Communications"},{"key":"7486_CR20","first-page":"1","volume":"7","author":"Md Mahmudul Hasah","year":"2019","unstructured":"Mahmudul Hasah, Md, Milon Islam, Md, Zarif, Ishrak Islam, & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 1\u201314.","journal-title":"Internet of Things"},{"issue":"67","key":"7486_CR21","first-page":"1","volume":"6","author":"Chad L Calvert","year":"2019","unstructured":"Calvert, Chad L., & Khoshgoftaar, Taghi M. (2019). Impact of class distribution on the detection of slow HTTP DoS attacks using big data. Journal of Big Data, 6(67), 1\u201318.","journal-title":"Journal of Big Data"},{"key":"7486_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","volume":"73","author":"Ruchi Vishwakarma","year":"2020","unstructured":"Vishwakarma, Ruchi, & Jain, Ankit Kumar. (2020). A survey of DDoS attacking techniques and defence mechanism in the IoT network. Telecommunication systems, 73, 3\u201325.","journal-title":"Telecommunication systems"},{"key":"7486_CR23","first-page":"1","volume":"816","author":"Jes\u00fas Galeano-Brajones","year":"2020","unstructured":"Galeano-Brajones, Jes\u00fas, Carmona-Murillo, Javier, Valenzuela-Vald\u00e9s, Juan F., & Luna-Valero, Francisco. (2020). Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach. Sensors, 816, 1\u201318.","journal-title":"Sensors"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07486-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07486-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07486-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:30:37Z","timestamp":1621380637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07486-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,19]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["7486"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07486-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,5,19]]},"assertion":[{"value":"19 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}