{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:44:23Z","timestamp":1762782263449,"version":"build-2065373602"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"crossref","award":["24-29-00041","24-29-00041"],"award-info":[{"award-number":["24-29-00041","24-29-00041"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00242-1","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:38:07Z","timestamp":1762781887000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection of anomalous network behavior based on one-way delay measurements"],"prefix":"10.1007","volume":"5","author":[{"given":"E. S.","family":"Sagatov","sequence":"first","affiliation":[]},{"given":"D. P.","family":"Chernysh","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mayhoub","sequence":"additional","affiliation":[]},{"given":"A. M.","family":"Sukhov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"issue":"11","key":"242_CR1","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.47772\/IJRISS.2023.7011121","volume":"7","author":"CI Erondu","year":"2023","unstructured":"Erondu CI, Erondu UI. The role of cyber security in a digitalizing economy: a development perspective. Int J Res Innov Soc Sci. 2023;7(11):1558\u201370.","journal-title":"Int J Res Innov Soc Sci"},{"issue":"1","key":"242_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s40537-024-00957-y","volume":"11","author":"AH Salem","year":"2024","unstructured":"Salem AH, Azzam SM, Emam O, Abohany AA. Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. J Big Data. 2024;11(1):105.","journal-title":"J Big Data"},{"key":"242_CR3","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1109\/TIFS.2022.3191493","volume":"17","author":"C Wang","year":"2022","unstructured":"Wang C, Zhu H. Wrongdoing monitor: a graph-based behavioral anomaly detection in cyber security. IEEE Trans Inf Forensics Secur. 2022;17:2703\u201318.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"242_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Security. 2023;127:103096.","journal-title":"Comput Security"},{"key":"242_CR5","doi-asserted-by":"publisher","first-page":"71073","DOI":"10.1109\/ACCESS.2023.3246180","volume":"11","author":"A Jahangeer","year":"2023","unstructured":"Jahangeer A, Bazai SU, Aslam S, Marjan S, Anas M, Hashemi SH. A review on the security of IoT networks: from network layer\u2019s perspective. IEEE Access. 2023;11:71073\u201387.","journal-title":"IEEE Access"},{"issue":"11","key":"242_CR6","doi-asserted-by":"publisher","first-page":"3571","DOI":"10.3390\/s24113571","volume":"24","author":"M Gelgi","year":"2024","unstructured":"Gelgi M, Guan Y, Arunachala S, Samba Siva Rao M, Dragoni N. Systematic literature review of IoT Botnet DDOS attacks and evaluation of detection techniques. Sensors. 2024;24(11):3571.","journal-title":"Sensors"},{"issue":"6","key":"242_CR7","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari A, Jabraeil Jamali MA. Internet of Things intrusion detection systems: a comprehensive review and future directions. Clust Comput. 2023;26(6):3753\u201380.","journal-title":"Clust Comput"},{"issue":"3","key":"242_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/computers14030087","volume":"14","author":"L Diana","year":"2025","unstructured":"Diana L, Dini P, Paolini D. Overview on intrusion detection systems for computers networking security. Computers. 2025;14(3):87.","journal-title":"Computers"},{"issue":"1","key":"242_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.337","volume":"7","author":"A Dhadhania","year":"2024","unstructured":"Dhadhania A, Bhatia J, Mehta R, Tanwar S, Sharma R, Verma A. Unleashing the power of SDN and GNN for network anomaly detection: state-of-the-art, challenges, and future directions. Security Privacy. 2024;7(1):e337.","journal-title":"Security Privacy"},{"issue":"15","key":"242_CR10","doi-asserted-by":"publisher","first-page":"6850","DOI":"10.3390\/s23156850","volume":"23","author":"RMA Haseeb-Ur-Rehman","year":"2023","unstructured":"Haseeb-Ur-Rehman RMA, Aman AHM, Hasan MK, Ariffin KAZ, Namoun A, Tufail A, et al. High-speed network ddos attack detection: a survey. Sensors. 2023;23(15):6850.","journal-title":"Sensors"},{"key":"242_CR11","doi-asserted-by":"crossref","unstructured":"Amet M, Thomas L, Song YQ. A Performance Evaluation of QUIC in Real-Time Networks. In: Proceedings of the 32nd International Conference on Real-Time Networks and Systems; 2024. p. 255\u2013265.","DOI":"10.1145\/3696355.3699698"},{"issue":"12","key":"242_CR12","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1109\/TIM.2008.926052","volume":"57","author":"L De Vito","year":"2008","unstructured":"De Vito L, Rapuano S, Tomaciello L. One-way delay measurement: state of the art. IEEE Trans Instrum Meas. 2008;57(12):2742\u201350.","journal-title":"IEEE Trans Instrum Meas"},{"key":"242_CR13","doi-asserted-by":"crossref","unstructured":"Nezhad AH, Azizi Y. GPS clock based one way delay measurement and modeling in web environment. In: 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE); 2014. p. 312\u2013315.","DOI":"10.1109\/ICCKE.2014.6993464"},{"key":"242_CR14","doi-asserted-by":"crossref","unstructured":"P\u00e4\u00e4kk\u00f6nen P, Prokkola J, Lattunen A. Instrumentation-based tool for latency measurements. In: Proceedings of the 2nd ACM\/SPEC International Conference on Performance engineering; 2011. p. 403\u2013412.","DOI":"10.1145\/1958746.1958802"},{"issue":"12","key":"242_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2010.5673072","volume":"48","author":"R Ben-El-Kezadri","year":"2010","unstructured":"Ben-El-Kezadri R, Pau G. TimeRemap: stable and accurate time in vehicular networks. IEEE Commun Mag. 2010;48(12):52\u20137.","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"242_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.3390\/electronics14010081","volume":"14","author":"A Yusupov","year":"2024","unstructured":"Yusupov A, Park S, Kim J. Synchronized delay measurement of multi-stream analysis over data concentrator units. Electronics. 2024;14(1):81.","journal-title":"Electronics"},{"key":"242_CR17","doi-asserted-by":"crossref","unstructured":"Hanemann A, Boote JW, Boyd EL, Durand J, Kudarimoti L, \u0141apacz R, et\u00a0al. Perfsonar: a service oriented architecture for multi-domain network monitoring. In: International conference on service-oriented computing; 2005. p. 241\u2013254.","DOI":"10.1007\/11596141_19"},{"key":"242_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12988\/astp.2016.510105","volume":"10","author":"G Almes","year":"2016","unstructured":"Almes G, Kalidindi S, Zekauskas M, Morton A. A one-way delay metric for IP performance metrics (IPPM). IETF. 2016;10:1\u201327.","journal-title":"IETF"},{"key":"242_CR19","unstructured":"Oleynikov I. Oleynikov I, editor. SO_TIMESTAMPING in pictures. Packet receiving. Habr. (in Russian). https:\/\/habr.com\/ru\/company\/metrotek\/blog\/304644\/."},{"issue":"9","key":"242_CR20","first-page":"5105","volume":"11","author":"Z Li","year":"2013","unstructured":"Li Z, Zhong Z, Zhu W, Qin B. A hardware time stamping method for PTP messages based on Linux system. TELKOMNIKA Indones J Electr Eng. 2013;11(9):5105\u201311.","journal-title":"TELKOMNIKA Indones J Electr Eng"},{"key":"242_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100636","volume":"52","author":"SE Mathe","year":"2024","unstructured":"Mathe SE, Kondaveeti HK, Vappangi S, Vanambathina SD, Kumaravelu NK. A comprehensive review on applications of Raspberry Pi. Comput Sci Rev. 2024;52:100636.","journal-title":"Comput Sci Rev"},{"issue":"7","key":"242_CR22","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.3390\/s24072113","volume":"24","author":"M Fletcher","year":"2024","unstructured":"Fletcher M, Paulz E, Ridge D, Michaels AJ. Low-latency wireless network extension for industrial internet of things. Sensors. 2024;24(7):2113.","journal-title":"Sensors"},{"issue":"4","key":"242_CR23","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11018-017-1202-7","volume":"60","author":"NI Vinogradov","year":"2017","unstructured":"Vinogradov NI, Sagatov ES, Sukhov AM. Measurement of one-way delays in IP networks. Meas Tech. 2017;60(4):359\u201365.","journal-title":"Meas Tech"},{"key":"242_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.measurement.2014.03.020","volume":"54","author":"J Breuer","year":"2014","unstructured":"Breuer J, Vigner V, Rozto\u010dil J. Precise packet delay measurement in an Ethernet network. Measurement. 2014;54:215\u201321.","journal-title":"Measurement"},{"key":"242_CR25","doi-asserted-by":"crossref","unstructured":"Eidson JC, Fischer M, White J. IEEE-1588\u2122\u00a0Standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting; 2002. p. 243\u2013254.","DOI":"10.1109\/SFICON.2002.1159815"},{"key":"242_CR26","first-page":"59","volume":"7","author":"T H\u00e9gr","year":"2013","unstructured":"H\u00e9gr T, Boh\u00e1\u010d L, Kocur Z, Voz\u0148\u00e1k M, Chlumsk\u1ef3 P. Methodology of the direct measurement of the switching latency. Przeglad Elektrotechniczny. 2013;7:59\u201363.","journal-title":"Przeglad Elektrotechniczny"},{"issue":"3","key":"242_CR27","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2805789.2805796","volume":"45","author":"V Bajpai","year":"2015","unstructured":"Bajpai V, Eravuchira SJ, Sch\u00f6nw\u00e4lder J. Lessons learned from using the ripe atlas platform for measurement research. ACM SIGCOMM Comput Commun Rev. 2015;45(3):35\u201342.","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"10","key":"242_CR28","doi-asserted-by":"publisher","first-page":"2839","DOI":"10.1109\/TIM.2013.2263914","volume":"62","author":"J Fabini","year":"2013","unstructured":"Fabini J, Abmayer M. Delay measurement methodology revisited: time-slotted randomness cancellation. IEEE Trans Instrum Meas. 2013;62(10):2839\u201348.","journal-title":"IEEE Trans Instrum Meas"},{"issue":"7","key":"242_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3466167","volume":"54","author":"D Chefrour","year":"2021","unstructured":"Chefrour D. One-way delay measurement from traditional networks to SDN: a survey. ACM Comput Surveys (CSUR). 2021;54(7):1\u201335.","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"242_CR30","doi-asserted-by":"crossref","unstructured":"Chamoli S, Mittal V. DDoS landscape: insight into attacks and tools. In: 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT). 1. IEEE; 2024. p. 1\u20136.","DOI":"10.1109\/ICEECT61758.2024.10739102"},{"key":"242_CR31","doi-asserted-by":"crossref","unstructured":"Rodday N, Rodosek GD, Pras A, van Rijswijk-Deij R. Exploring the benefit of path plausibility algorithms in BGP. In: NOMS 2024-2024 IEEE Network Operations and Management Symposium. IEEE; 2024. p. 1\u201310.","DOI":"10.1109\/NOMS59830.2024.10575088"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00242-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00242-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00242-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:38:15Z","timestamp":1762781895000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00242-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["242"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00242-1","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"24 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"129"}}