{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T00:55:24Z","timestamp":1776473724228,"version":"3.51.2"},"reference-count":57,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T00:00:00Z","timestamp":1591920000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2020,10,1]]},"DOI":"10.1080\/24751839.2020.1767484","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T18:37:15Z","timestamp":1591987035000},"page":"482-503","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":95,"title":["Denial of service attack detection through machine learning for the IoT"],"prefix":"10.1080","volume":"4","author":[{"given":"Naeem Firdous","family":"Syed","sequence":"first","affiliation":[{"name":"Security Research Institute, School of Science, Edith Cowan University, Perth, Australia"}]},{"given":"Zubair","family":"Baig","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, Australia"}]},{"given":"Ahmed","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Security Research Institute, School of Science, Edith Cowan University, Perth, Australia"}]},{"given":"Craig","family":"Valli","sequence":"additional","affiliation":[{"name":"Security Research Institute, School of Science, Edith Cowan University, Perth, Australia"}]}],"member":"301","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0528-7"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Alanazi, S. \n                     Al-Muhtadi, J. \n                     Derhab, A. \n                     Saleem, K. \n                     AlRomi, A. N. \n                     Alholaibah, H. S. & \n                     C. Rodrigues., J. J. P.   (2015). On resilience of wireless mesh routing protocol against dos attacks in IoT-based ambient assisted living applications. In 2015 17th International Conference on E-health Networking, Application Services (HealthCom) (pp. 205\u2013210), Boston, USA.","DOI":"10.1109\/HealthCom.2015.7454499"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Andy, S. \n                     Rahardjo, B. & \n                     Hanindhito, B.   (2017). Attack scenarios and security analysis of mqtt communication protocol in iot system. In 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (pp. 1\u20136), Yogyakarta, Indonesia.","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.013"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Ballani, H. & \n                     Francis, P.   (2008). Mitigating dns dos attacks. In Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08, New York, NY, USA (pp. 189\u2013198). ACM. ISBN 978-1-59593-810-7. https:\/\/doi.org\/10.1145\/1455770.1455796","DOI":"10.1145\/1455770.1455796"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Bencsath, B. & \n                     Ronai, M. A.   (2007). Empirical analysis of denial of service attack against smtp servers. In 2007 International Symposium on Collaborative Technologies and Systems (pp. 72\u201379), Orlando, FL.","DOI":"10.1109\/CTS.2007.4621740"},{"key":"CIT0009","unstructured":"Borgohain, T. \n                     Kumar, U. & \n                     Sanyal, S.   (2015). Survey of security and privacy issues of internet of things. CoRR, abs\/1501.02211. http:\/\/arxiv.org\/abs\/1501.02211"},{"key":"CIT0010","unstructured":"Brenner, B.   (2010).  Layer 7 increasingly under ddos gun. https:\/\/www.csoonline.com\/article\/2124801\/report\u2013layer-7-increasingly-under-ddos-gun.html"},{"key":"CIT0011","unstructured":"Cohn, R. J.   (2014). Individual Richard J Coppen, Andrew Banks, and Rahul Gupta. Mqtt version 3.1. https:\/\/docs.oasisopen.org\/mqtt\/mqtt\/v3.1.1\/csprd02\/mqtt-v3.1.1-csprd02.html ."},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Durcekova, V. \n                     Schwartz, L. & \n                     Shahmehri, N.   (2012, May). Sophisticated denial of service attacks aimed at application layer. In 2012 ELEKTRO (pp. 55\u201360), Rajeck Teplice, Slovakia.","DOI":"10.1109\/ELEKTRO.2012.6225571"},{"key":"CIT0013","unstructured":"Eclipse  (2018).  Eclipse paho. https:\/\/www.eclipse.org\/paho\/ ."},{"key":"CIT0014","unstructured":"EMQ  (2018).  Emqx. https:\/\/www.emqx.io\/ ."},{"key":"CIT0015","unstructured":"Fehrenbach, P.   (2017).  Messaging queues in the IoT under pressure. https:\/\/blog.it-securityguard.com\/wp-content\/uploads\/2017\/10\/IOT_Mosquitto_Pfehrenbach.pdf"},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"Firdous, S. N. \n                     Baig, Z. \n                     Valli, C. & \n                     Ibrahim, A.   (2017). Modelling and evaluation of malicious attacks against the iot mqtt protocol. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 748\u2013755), Exeter, UK.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.115"},{"key":"CIT0017","unstructured":"G\u00fcndo\u011fan, C. \n                     Kietzmann, P. \n                     Schmidt, T. C. \n                     Lenders, M. \n                     Petersen, H. & \n                     W\u00e4hlisch, M.   (2018). Ndn, coap, and mqtt: A comparative measurement study in the IoT. arXiv preprint arXiv:1806.01444."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Houimli, M. \n                     Kahloul, L. & \n                     Benaoun, S.   (2017). Formal specification, verification and evaluation of the MQTT protocol in the internet of things. In 2017 International Conference on Mathematics and Information Technology (ICMIT) (pp. 214\u2013221), Adrar, Algeria. IEEE.","DOI":"10.1109\/MATHIT.2017.8259720"},{"key":"CIT0021","unstructured":"Karagiannis, V. \n                     Chatzimisios, P. \n                     Vazquez-Gallego, F. & \n                     Alonso-Zarate, J.   (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud computing, 3(1), 11\u201317."},{"issue":"4","key":"CIT0022","first-page":"111","volume":"1","author":"Karlik B.","year":"2011","journal-title":"International Journal of Artificial Intelligence and Expert Systems"},{"key":"CIT0023","doi-asserted-by":"crossref","unstructured":"Kasinathan, P. \n                     Pastrone, C. \n                     Spirito, M. A. & \n                     Vinkovits, M.   (2013). Denial-of-service detection in 6lowpan based internet of things. In 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 600\u2013607), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673419"},{"issue":"2","key":"CIT0024","first-page":"24","volume":"15","author":"Koc L.","year":"2015","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"CIT0025","unstructured":"Lee, S. \n                     Kim, H. \n                     Hong, D. k. & \n                     Ju, H.   (2013, January). Correlation analysis of mqtt loss and delay according to qos level. In The International Conference on Information Networking 2013 (ICOIN) (pp. 714\u2013717)."},{"key":"CIT0026","doi-asserted-by":"crossref","unstructured":"Little, J. D. C. & \n                     Graves, S. C.   (2008). Little's law. In D. Chhajed & T. J. Lowe (Eds.), Building intuition (pp. 81\u2013100). Springer. https:\/\/doi.org\/10.1007\/978-0-387-73699-0_5 .","DOI":"10.1007\/978-0-387-73699-0_5"},{"key":"CIT0027","unstructured":"Luo, M. \n                     Peng, T. & \n                     Leckie, C.   (2008). Cpu-based dos attacks against sip servers. In NOMS 2008\u20132008 IEEE Network Operations and Management Symposium (pp. 41\u201348), Salvador, Bahia, Brazil."},{"key":"CIT0028","doi-asserted-by":"crossref","unstructured":"Luzuriaga, J. E. \n                     Perez, M. \n                     Boronat, P. \n                     Cano, J. C. \n                     Calafate, C. & \n                     Manzoni, P.   (2015). A comparative evaluation of amqp and mqtt protocols over unstable and mobile networks. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (pp. 931\u2013936), Las Vegas, USA. IEEE.","DOI":"10.1109\/CCNC.2015.7158101"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2015.073028"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Mektoubi, A. \n                     Hassani, H. L. \n                     Belhadaoui, H. \n                     Rifi, M. & \n                     Zakari, A.   (2016). New approach for securing communication over MQTT protocol a comparison between rsa and elliptic curve. In 2016 Third International Conference on Systems of Collaboration (SysCo) (pp. 1\u20136), Casablanca, Morocco. IEEE.","DOI":"10.1109\/SYSCO.2016.7831326"},{"key":"CIT0031","unstructured":"Mosquitto  (2017).  Eclipse mosquitto. https:\/\/mosquitto.org\/ ."},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"CIT0033","unstructured":"Oracle  (2018).  Oracle virtual box. https:\/\/www.virtualbox.org\/ ."},{"key":"CIT0034","first-page":"2825","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"CIT0035","doi-asserted-by":"crossref","unstructured":"Perrone, G. \n                     Vecchio, M. \n                     Pecori, R. & \n                     Giaffreda, R.   (2017). The day after Mirai: A survey on MQTT security solutions after the largest cyber-attack carried out through an army of IoT devices. In IoTBDS (pp. 246\u2013253), Porto, Portugal.","DOI":"10.5220\/0006287302460253"},{"key":"CIT0036","doi-asserted-by":"crossref","unstructured":"Rafique, M. Z. \n                     Akbar, M. A. & \n                     Farooq, M.   (2009). Evaluating dos attacks against SIP-based VoIP systems. In GLOBECOM 2009\u20132009 IEEE Global Telecommunications Conference (pp. 1\u20136), Honolulu, Hawaii.","DOI":"10.1109\/GLOCOM.2009.5426247"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926503"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"CIT0039","doi-asserted-by":"crossref","unstructured":"Sadeghi, A. \n                     Wachsmann, C. & \n                     Waidner, M.   (2015, June). Security and privacy challenges in industrial internet of things. In 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC) (pp. 1\u20136), San Francisco, CA, USA.","DOI":"10.1145\/2744769.2747942"},{"key":"CIT0040","unstructured":"Sanfilippo, S.   (2006).  hping. http:\/\/www.hping.org\/ ."},{"key":"CIT0041","doi-asserted-by":"crossref","unstructured":"Santiago Hern\u00e1ndez Ramos, M. T. V. & \n                     Lacuesta, R.   (2018). MQTT security: A novel fuzzing approach. Wireless Communications and Mobile Computing, 2018, Article ID 8261746. https:\/\/doi.org\/10.1155\/2018\/8261746 .","DOI":"10.1155\/2018\/8261746"},{"key":"CIT0042","unstructured":"Scalagent  (2015).  Benchmark of mqtt servers. http:\/\/www.scalagent.com\/IMG\/pdf\/Benchmark_MQTT_servers-v1-1.pdf ."},{"issue":"5","key":"CIT0043","volume":"8","author":"Shaker V.","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"CIT0044","unstructured":"Shan, H. \n                     Wang, Q. & \n                     Pu, C.   (2017). Tail attacks on web applications. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17 (pp. 1725\u20131739). ACM. ISBN 978-1-4503-4946-8. http:\/\/doi.acm.org\/10.1145\/3133956.3133968 ."},{"key":"CIT0045","doi-asserted-by":"crossref","unstructured":"Shin, S. H. \n                     Kobara, K. \n                     Chuang, C.C. & \n                     Huang, W.   (2016). A security framework for mqtt. In 2016 IEEE Conference on Communications and Network Security (CNS) (pp. 432\u2013436), Philadelphia, PA, USA. IEEE.","DOI":"10.1109\/CNS.2016.7860532"},{"key":"CIT0046","doi-asserted-by":"crossref","unstructured":"Singh, M. \n                     Rajan, M. A. \n                     Shivraj, V. L. & \n                     Balamuralidhar, P.   (2015). Secure mqtt for internet of things (iot). In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 746\u2013751), Gwalior, India. IEEE.","DOI":"10.1109\/CSNT.2015.16"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.005"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"CIT0049","unstructured":"TCPDUMP  (2019).  Tcpdump. https:\/\/www.tcpdump.org\/ ."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"CIT0051","doi-asserted-by":"crossref","unstructured":"Thangavel, D. \n                     Ma, X. \n                     Valera, A. \n                     Tan, H.X. & \n                     Tan, C. K.Y.   (2014). Performance evaluation of mqtt and coap via a common middleware. In 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 1\u20136), Singapore. IEEE.","DOI":"10.1109\/ISSNIP.2014.6827678"},{"key":"CIT0052","unstructured":"V\u00e4h\u00e4-Sipil\u00e4, A.   (2015).  mqtt_fuzz. https:\/\/github.com\/F-Secure\/mqtt_fuzz ."},{"key":"CIT0053","unstructured":"VerneMQ  (2018).  Vernemq. https:\/\/vernemq.com\/ ."},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-4258-6"},{"key":"CIT0055","unstructured":"Wireshark  (2019).  Tshark. https:\/\/www.wireshark.org\/docs\/man-pages\/tshark.html ."},{"key":"CIT0056","doi-asserted-by":"crossref","unstructured":"Yokotani, T. & \n                     Sasaki, Y.   (2016). Comparison with http and MQTT on required network resources for IoT. In 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) (pp. 1\u20136), Bandung, Indonesia. IEEE.","DOI":"10.1109\/ICCEREC.2016.7814989"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2020.1767484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T20:22:22Z","timestamp":1605039742000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2020.1767484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,12]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10,1]]}},"alternative-id":["10.1080\/24751839.2020.1767484"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2020.1767484","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-04-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}