{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:16:03Z","timestamp":1771236963553,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359992.3366641","type":"proceedings-article","created":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T13:46:52Z","timestamp":1574171212000},"page":"42-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Unsupervised machine learning for network-centric anomaly detection in IoT"],"prefix":"10.1145","author":[{"given":"Randeep","family":"Bhatia","sequence":"first","affiliation":[{"name":"Nokia Bell Labs"}]},{"given":"Steven","family":"Benno","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs"}]},{"given":"Jairo","family":"Esteban","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs"}]},{"given":"T. V.","family":"Lakshman","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs"}]},{"given":"John","family":"Grogan","sequence":"additional","affiliation":[{"name":"C Spire"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Lightweight intrusion detection for networks Lisa","author":"Snort M. Roesch","year":"1999"},{"key":"e_1_3_2_1_2_1","volume-title":"Garcia-Teodoro et al. Anomaly-based network intrusion detection: Techniques, systems and challenges Computers and Security 28","author":"P.","year":"2009"},{"key":"e_1_3_2_1_3_1","volume-title":"Takehisa Anomaly detection using autoencoders with nonlinear dimensionality reduction 2nd Workshop on Machine Learning for Sensory Data Analysis (MLSDA)","author":"Sakurada M.","year":"2014"},{"key":"e_1_3_2_1_4_1","volume-title":"Chen A survey of intrusion detection techniques for cyber-physical systems ACM Computing Surveys 46.4","author":"Mitchell R.","year":"2014"},{"key":"e_1_3_2_1_5_1","volume-title":"Evaluation of anomaly detection techniques for scada communication resilience IEEE Resilience Week (RWS)","author":"Shirazi S. N.","year":"2016"},{"key":"e_1_3_2_1_6_1","volume-title":"Autoencoder-based feature learning for cyber security applications International Joint Conference on Neural Networks (IJCNN)","author":"Yousefi-Azar Mahmood","year":"2017"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. Yadav S. Subramanian Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) 2016  S. Yadav S. Subramanian Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) 2016","DOI":"10.1109\/ICCTICT.2016.7514608"},{"key":"e_1_3_2_1_8_1","first-page":"2","volume":"1","author":"Buczak A. L.","year":"2016","journal-title":"Tutorials"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M H. Bhuyan etal Network anomaly detection: methods systems and tools IEEE communications surveys & tutorials 16.1 (2014)  M H. Bhuyan et al. Network anomaly detection: methods systems and tools IEEE communications surveys & tutorials 16.1 (2014)","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"e_1_3_2_1_10_1","volume-title":"N. Feamster Machine Learning DDoS Detection for Consumer Internet of Things Devices IEEE Deep Learning and Security Workshop 2018","author":"Doshi R."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"R. Kwitt U. Hofmann Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)  R. Kwitt U. Hofmann Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","DOI":"10.1109\/ICCGI.2007.62"},{"key":"e_1_3_2_1_12_1","volume-title":"A novel anomaly detection scheme based on principal component classifier In Proceedings of 3rd IEEE International Conference on Data Mining","author":"Shyu M.-L.","year":"2003"},{"key":"e_1_3_2_1_13_1","volume-title":"Deep Architectures Proceedings of ICML workshop on unsupervised and transfer learning. 2012","author":"Autoencoders P. Baldi"},{"key":"e_1_3_2_1_14_1","volume-title":"Exploring the Use of Autoencoders for Botnets Traffic Representation IEEE Deep Learning and Security Workshop 2018","author":"Dargenio R."},{"key":"e_1_3_2_1_15_1","volume-title":"K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods IEEE Transactions on Knowledge and Data Engineering","author":"Gaddam S.R.","year":"2007"},{"key":"e_1_3_2_1_16_1","unstructured":"NJCCIC Mirai [Online]:https:\/\/www.cyber.nj.gov\/threat-profiles\/botnet-variants\/mirai-botnet  NJCCIC Mirai [Online]:https:\/\/www.cyber.nj.gov\/threat-profiles\/botnet-variants\/mirai-botnet"},{"key":"e_1_3_2_1_17_1","volume":"201","author":"Sivanathan A.","journal-title":"Classifying IoT devices in smart environments using network traffic characteristics IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_18_1","unstructured":"https:\/\/iotanalytics.unsw.edu.au\/attack-data  https:\/\/iotanalytics.unsw.edu.au\/attack-data"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Gama etal A survey on concept drift adaptation ACM computing surveys (CSUR) 46.4 (2014): 44  J. Gama et al. A survey on concept drift adaptation ACM computing surveys (CSUR) 46.4 (2014): 44","DOI":"10.1145\/2523813"},{"key":"e_1_3_2_1_20_1","unstructured":"M. Harel etal Concept drift detection through resampling International Conference on Machine Learning 2014  M. Harel et al. Concept drift detection through resampling International Conference on Machine Learning 2014"},{"key":"e_1_3_2_1_21_1","volume-title":"Extreme Dimensionality Reduction for Network Attack Visualization with Autoencoders International Joint Conference on Neural Networks (IJCNN)","author":"Ferreira D. C.","year":"2019"},{"key":"e_1_3_2_1_22_1","first-page":"275","volume-title":"et al. Nightlights: Entropy- based metrics for classifying darkspace traffic patterns Passive and Active Measurement","author":"Zseby T.","year":"2014"}],"event":{"name":"CoNEXT '19: The 15th International Conference on emerging Networking EXperiments and Technologies","location":"Orlando FL USA","acronym":"CoNEXT '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359992.3366641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359992.3366641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:28Z","timestamp":1750202008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359992.3366641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":22,"alternative-id":["10.1145\/3359992.3366641","10.1145\/3359992"],"URL":"https:\/\/doi.org\/10.1145\/3359992.3366641","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}