{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T15:51:14Z","timestamp":1751385074804,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T00:00:00Z","timestamp":1721692800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T00:00:00Z","timestamp":1721692800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,23]]},"DOI":"10.1109\/wincom62286.2024.10655360","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:59:40Z","timestamp":1725559180000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection Systems for the Internet of Things Network: Survey on Rare Attacks"],"prefix":"10.1109","author":[{"given":"Zaid","family":"Alkhawlani","sequence":"first","affiliation":[{"name":"Ibn Tofail University,Faculty of Sciences, Laboratory of Research in Informatics (LaRI),Kenitra,Morocco"}]},{"given":"Khalil","family":"Ibrahimi","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Boutabia","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Internationale de Casablanca,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s22134730"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206789"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.111"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369617"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001017"},{"key":"ref13","article-title":"Deep Learning-Based Intrusion Detection for Rare Class Network Attacks","author":"Yang","year":"2023","journal-title":"Preprints"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","article-title":"A survey on intrusion detection systems in iot-based applications","volume":"151","author":"Garuba","year":"2019","journal-title":"Computer Networks"},{"key":"ref15","first-page":"1","article-title":"Enhancing intrusion detection in iot networks using ensemble learning techniques","volume-title":"Proceedings of the IEEE International Conference on Internet of Things (IoT)","author":"Smith","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1404.7828"},{"issue":"2","key":"ref17","first-page":"567","article-title":"A survey of hybrid machine learning and deep learning approaches for intrusion detection in iot networks","volume":"45","author":"Jones","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref18","first-page":"1","article-title":"Enhancing intrusion detection in iot networks using ensemble learning techniques","volume-title":"Proceedings of the IEEE International Conference on Internet of Things (IoT)","author":"Smith","year":"2020"},{"issue":"2","key":"ref19","first-page":"567","article-title":"A survey of hybrid machine learning and deep learning approaches for intrusion detection in iot networks","volume":"45","author":"Jones","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref20","first-page":"2024","article-title":"Outlier detection techniques for wireless sensor networks: A review","volume":"4","author":"Chen","year":"2016","journal-title":"IEEE Access"},{"key":"ref21","first-page":"17290","article-title":"Anomaly detection in wireless sensor networks based on extreme learning machine","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"issue":"9","key":"ref22","first-page":"7318","article-title":"A review of anomaly detection techniques in internet of things","volume":"7","author":"Song","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"ref23","first-page":"2073","article-title":"A novel deep learning framework for iot intrusion detection systems using feature fusion and attention mechanism","volume":"17","author":"Alazab","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"17","key":"ref24","first-page":"13477","article-title":"Federated learning-based intrusion detection in industrial internet of things systems","volume":"8","author":"Hu","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref25","first-page":"1","article-title":"A survey on machine learning techniques for intrusion detection systems in internet of things (iot)","author":"Manogaran","year":"2022","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5120\/19787-1571"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"issue":"3","key":"ref30","first-page":"1806","article-title":"Unveiling iot botnets: A novel scalable iot fingerprinting methodology and case studies","volume":"17","author":"Vlaj","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref31","first-page":"55347","article-title":"Efficient and secure data transmission protocol for iot devices in smart grids","volume":"7","author":"Shin","year":"2019","journal-title":"IEEE Access"},{"issue":"6","key":"ref32","first-page":"4413","article-title":"Iot-based autonomous self-learning malware detection using deep reinforcement learning","volume":"17","author":"Karmakar","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref33","first-page":"72099","article-title":"Artificial intelligence-based intrusion detection for iot applications: A review","volume":"8","author":"Viani","year":"2020","journal-title":"IEEE Access"},{"key":"ref34","first-page":"1153","article-title":"Design and implementation of intrusion detection system for iot using machine learning algorithm","volume":"180","author":"Mishra","year":"2021","journal-title":"Procedia Computer Science"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref36","first-page":"1","article-title":"A survey on internet of things security: Requirements, challenges, and solutions","author":"Kouicem","year":"2017","journal-title":"Internet of Things"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"volume-title":"Security in IoT Devices: From Physical to Communication Security","year":"2020","author":"Alomainy","key":"ref38"},{"volume-title":"Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations","year":"2018","author":"Truong","key":"ref39"},{"volume-title":"The Dark Side of the Internet of Things (IoT): Threats, Security Breaches, and Dark Web Markets","year":"2020","author":"Kshetri","key":"ref40"},{"volume-title":"Securing the Internet of Things: Concepts, Theories and Applications","year":"2019","author":"Mishra","key":"ref41"},{"volume-title":"The IoT Hackers Handbook: A Practical Guide to Hacking the Internet of Things","year":"2019","author":"Garlan","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref46","first-page":"9185049","article-title":"Improving machine learning idss classification accuracy on iot traffic data using feature reduction techniques","volume":"2020","author":"Alshammari","year":"2020","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref48","first-page":"13","article-title":"Evaluation of unswnb 15 for accuracy and computational time of intrusion detection systems","volume":"50","author":"Moustafa","year":"2020","journal-title":"Journal of Information Security and Applications"},{"key":"ref49","first-page":"34838","article-title":"A comprehensive evaluation of feature selection approaches for rfidbased iot intrusion detection systems","volume":"9","author":"Alqarni","year":"2021","journal-title":"IEEE Access"},{"issue":"5","key":"ref50","first-page":"1346","article-title":"Design and implementation of an intrusion detection system based on deep learning for iot environments","volume":"20","author":"Arroyo","year":"2020","journal-title":"Sensors"},{"key":"ref51","first-page":"107478","article-title":"Detection of ddos attacks in internet of things using machine learning techniques","volume":"182","author":"Qian","year":"2020","journal-title":"Computer Networks"},{"issue":"3","key":"ref52","first-page":"032064","article-title":"Evaluation of artificial neural network for detecting iot network security attacks","volume-title":"Journal of Physics: Conference Series","volume":"1376","author":"Zin","year":"2019"},{"issue":"1","key":"ref53","first-page":"727","article-title":"Hybrid approach for detecting and filtering ddos attacks in iot-based smart grids","volume":"11","author":"Ramadan","year":"2021","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"journal-title":"A dataset bundle for building automation and control systems security analysis","year":"2022","author":"Graveto","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"}],"event":{"name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2024,7,23]]},"location":"Leeds, United Kingdom","end":{"date-parts":[[2024,7,25]]}},"container-title":["2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10654795\/10654813\/10655360.pdf?arnumber=10655360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:29:31Z","timestamp":1725769771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10655360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,23]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/wincom62286.2024.10655360","relation":{},"subject":[],"published":{"date-parts":[[2024,7,23]]}}}