{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:55:41Z","timestamp":1773330941613,"version":"3.50.1"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Funds thorugh the Mobilitas Plus Programme","doi-asserted-by":"publisher","award":["MOBTT75"],"award-info":[{"award-number":["MOBTT75"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1109\/jiot.2021.3098029","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T23:43:11Z","timestamp":1628638991000},"page":"3612-3630","source":"Crossref","is-referenced-by-count":87,"title":["A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3586-811X","authenticated-orcid":false,"given":"Jalal","family":"Bhayo","sequence":"first","affiliation":[]},{"given":"Riaz","family":"Jafaq","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4683-1988","authenticated-orcid":false,"given":"Sufian","family":"Hameed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2949-7391","authenticated-orcid":false,"given":"Syed Attique","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"issue":"7","key":"ref1","first-page":"97","article-title":"That \u2018Internet of Things\u2019 thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039985"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref5","volume-title":"IoT Growth Demands Rethink of Long-Term Storage Strategies, Says IDC","year":"2020"},{"key":"ref6","first-page":"1","volume-title":"Leading the IoT, Gartner Insights on How to Lead in a Connected World","author":"Hung","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2480421"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref10","volume-title":"IDC: 30 Billion Autonomous Devices By 2020","year":"2013"},{"key":"ref11","volume-title":"Forecast: IoT Security, Worldwide, 2018, Gartner Research","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"issue":"1","key":"ref13","first-page":"275","article-title":"Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model","volume":"33","author":"Yan","year":"2016","journal-title":"Adhoc Sensor Wireless Netw."},{"key":"ref14","volume-title":"Distributed denial of service (DDoS) network-based detection","author":"Reams","year":"2007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref16","volume-title":"Netscout Threat Intelligence Report Shows a Dramatic Increase in Multivector DDoS Attacks in First-Half","author":"Lopez","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013998"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2015.7057902"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICINA.2010.5636786"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100279"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/computers9010008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106889"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3052009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/fi10030023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903962"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00599-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s20113078"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.61"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168607"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1201\/9780203490044"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1240-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2016.073754"},{"issue":"2","key":"ref36","first-page":"83","article-title":"A new routing attack in mobile ad hoc networks","volume":"11","author":"Yi","year":"2005","journal-title":"Int. J. Inf. Technol."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039860"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043740"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0081-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502848"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043082"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2973176"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2019.8777688"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081639"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2017.41"},{"key":"ref47","first-page":"343","article-title":"Smart detection-IoT: A DDoS sensor system for Internet of Things","volume-title":"Proc. Int. Conf. Syst. Signals Image Process. (IWSSIP)","author":"Augusto"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062909"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369635"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2805191"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2917972"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100240"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510992"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.2234"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2015.7275389"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0038"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0069"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357519"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249158"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.015"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491212"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"ref64","volume-title":"Home\u2014Project Floodlight","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620743"},{"key":"ref66","article-title":"Hyperflow: A distributed control plane for openflow","volume-title":"Proc. Internet Netw. Manag. Conf. Res. Enterprise Netw. (INM\/WREN)","volume":"3","author":"Tootoonchian"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.113"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1866898.1866905"},{"key":"ref73","first-page":"1","article-title":"FRESCO: Modular composable security services for software-defined networks","volume-title":"Proc. Annu. Netw. Distrib. Syst. Security Symp. (NDSS)","author":"Shin"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377767"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592684"},{"issue":"1","key":"ref76","first-page":"187","article-title":"Intrusion detection system for SYN flood attack: Methods and implementation","volume":"15","author":"Almehmadi","year":"2017","journal-title":"Int. J. Comput. Sci. Inf. Security"},{"issue":"5","key":"ref77","first-page":"1","article-title":"Hello flood attack countermeasures in wireless sensor networks","volume":"4","author":"Singh","year":"2016","journal-title":"Int. J. Comput. Sci. Mobile Appl."},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.108"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.12.005"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"issue":"11","key":"ref81","first-page":"58","article-title":"A survey: DDoS attack on Internet of Things","volume":"10","author":"Sonar","year":"2014","journal-title":"Int. J. Eng. Res. Develop."},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s20030816"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5120\/17220-7458"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.5958\/2249-7315.2017.00225.8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.4018\/AISPE"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2917912"},{"key":"ref90","first-page":"9","article-title":"Main types of attacks in wireless sensor networks","volume-title":"Proc. WSEAS Int. Conf.","author":"Lupu"},{"key":"ref91","article-title":"DDoS through the Internet of Things","volume-title":"Proc. 25th Twente Student Conf. IT","author":"Hengst"},{"key":"ref92","first-page":"229","article-title":"SNORT: Lightweight intrusion detection for networks","volume-title":"Proc. LISA","volume":"99","author":"Roesch"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778599"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03323-w"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-020-00442-z"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8469-5_5"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0404-2"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218418"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322172"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9717339\/09490298.pdf?arnumber=9490298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:17:38Z","timestamp":1705015058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9490298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":100,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3098029","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]}}}