{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:11Z","timestamp":1759091591199,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR001120C0160"],"award-info":[{"award-number":["HR001120C0160"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3485730.3493695","type":"proceedings-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T11:41:35Z","timestamp":1636630895000},"page":"560-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Large-scale Urban IoT Activity Data for DDoS Attack Emulation"],"prefix":"10.1145","author":[{"given":"Arvin","family":"Hekmati","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Eugenio","family":"Grippo","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI51257.2020.9247722"},{"volume-title":"Introduction to machine learning","author":"Alpaydin Ethem","key":"e_1_3_2_1_2_1","unstructured":"Ethem Alpaydin . 2020. Introduction to machine learning . MIT press . Ethem Alpaydin. 2020. Introduction to machine learning. MIT press."},{"key":"e_1_3_2_1_3_1","volume-title":"AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 0305--0310","author":"Alrashdi Ibrahim","year":"2019","unstructured":"Ibrahim Alrashdi , Ali Alqazzaz , Esam Aloufi , Raed Alharthi , Mohamed Zohdy , and Hua Ming . 2019 . AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 0305--0310 . https:\/\/doi.org\/10.1109\/CCWC.2019.8666450 10.1109\/CCWC.2019.8666450 Ibrahim Alrashdi, Ali Alqazzaz, Esam Aloufi, Raed Alharthi, Mohamed Zohdy, and Hua Ming. 2019. AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 0305--0310. https:\/\/doi.org\/10.1109\/CCWC.2019.8666450"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241275"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555867"},{"volume-title":"A new Attack Composition for Network Security. In 10. DFN-Forum Kommunikationstechnologien","author":"Beer Frank","key":"e_1_3_2_1_6_1","unstructured":"Frank Beer , Tim Hofer , David Karimi , and Ulrich B\u00fchler . 2017. A new Attack Composition for Network Security. In 10. DFN-Forum Kommunikationstechnologien , Paul M\u00fcller, Bernhard Neumair , Helmut Raiser, and Gabi Dreo Rodosek (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn , 11--20. Frank Beer, Tim Hofer, David Karimi, and Ulrich B\u00fchler. 2017. A new Attack Composition for Network Security. In 10. DFN-Forum Kommunikationstechnologien, Paul M\u00fcller, Bernhard Neumair, Helmut Raiser, and Gabi Dreo Rodosek (Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 11--20."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"e_1_3_2_1_8_1","unstructured":"CAIDA. 2007. The CAIDA UCSD \"DDoS Attack 2007\" Datasett. https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset. Accessed: 09-12-2021.  CAIDA. 2007. The CAIDA UCSD \"DDoS Attack 2007\" Datasett. https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset. Accessed: 09-12-2021."},{"key":"e_1_3_2_1_9_1","volume-title":"Lincoln Laboratory","author":"DARPA.","year":"2000","unstructured":"DARPA. 2000. DARPA intrusion detection evaluation dataset , Lincoln Laboratory , Massachusetts Institute of Technology . https:\/\/www.ll.mit.edu\/r-d\/datasets\/ 2000 -darpa-intrusion-detection-scenario-specific-datasets. Accessed: 09-12-2021. DARPA. 2000. DARPA intrusion detection evaluation dataset, Lincoln Laboratory, Massachusetts Institute of Technology. https:\/\/www.ll.mit.edu\/r-d\/datasets\/2000-darpa-intrusion-detection-scenario-specific-datasets. Accessed: 09-12-2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Bo\u011fazi\u00e7i University distributed denial of service dataset. Data in brief 32","author":"Erhan Derya","year":"2020","unstructured":"Derya Erhan and Emin Anar\u0131m . 2020. Bo\u011fazi\u00e7i University distributed denial of service dataset. Data in brief 32 ( 2020 ), 106187. https:\/\/doi.org\/10.1016\/j.dib.2020.106187 10.1016\/j.dib.2020.106187 Derya Erhan and Emin Anar\u0131m. 2020. Bo\u011fazi\u00e7i University distributed denial of service dataset. Data in brief 32 (2020), 106187. https:\/\/doi.org\/10.1016\/j.dib.2020.106187"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.800"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992966"},{"key":"e_1_3_2_1_13_1","volume-title":"2nd international conference on internet of things, big data and security. SCITEPRESS. 47--58","author":"Hallman Roger","year":"2017","unstructured":"Roger Hallman , Josiah Bryan , Geancarlo Palavicini , Joseph Divita , and Jose Romero-Mariona . 2017 . IoDDoS-the internet of distributed denial of sevice attacks . In 2nd international conference on internet of things, big data and security. SCITEPRESS. 47--58 . https:\/\/doi.org\/10.5220\/0006246600470058 10.5220\/0006246600470058 Roger Hallman, Josiah Bryan, Geancarlo Palavicini, Joseph Divita, and Jose Romero-Mariona. 2017. IoDDoS-the internet of distributed denial of sevice attacks. In 2nd international conference on internet of things, big data and security. SCITEPRESS. 47--58. https:\/\/doi.org\/10.5220\/0006246600470058"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_15_1","first-page":"80","article-title":"DDoS in the IoT","volume":"50","author":"Kolias Constantinos","year":"2017","unstructured":"Constantinos Kolias , Georgios Kambourakis , Angelos Stavrou , and Jeffrey Voas . 2017 . DDoS in the IoT : Mirai and Other Botnets. Computer 50 , 7 (2017), 80 -- 84 . https:\/\/doi.org\/10.1109\/MC.2017.201 10.1109\/MC.2017.201 Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. Computer 50, 7 (2017), 80--84. https:\/\/doi.org\/10.1109\/MC.2017.201","journal-title":"Mirai and Other Botnets. Computer"},{"key":"e_1_3_2_1_16_1","unstructured":"Nickolaos Koroniotis and Nour Moustafa. 2019. University of New South Wales The Bot-IoT Dataset. https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset. Accessed: 09-12-2021.  Nickolaos Koroniotis and Nour Moustafa. 2019. University of New South Wales The Bot-IoT Dataset. https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset. Accessed: 09-12-2021."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"e_1_3_2_1_18_1","volume-title":"The Evolution of Bashlite and Mirai IoT Botnets. In 2018 IEEE Symposium on Computers and Communications (ISCC). 00813--00818","author":"Marzano Artur","year":"2018","unstructured":"Artur Marzano , David Alexander , Osvaldo Fonseca , Elverton Fazzion , Cristine Hoepers , Klaus Steding-Jessen , Marcelo H. P. C. Chaves , \u00cdtalo Cunha , Dorgival Guedes , and Wagner Meira . 2018 . The Evolution of Bashlite and Mirai IoT Botnets. In 2018 IEEE Symposium on Computers and Communications (ISCC). 00813--00818 . https:\/\/doi.org\/10.1109\/ISCC.2018.8538636 10.1109\/ISCC.2018.8538636 Artur Marzano, David Alexander, Osvaldo Fonseca, Elverton Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves, \u00cdtalo Cunha, Dorgival Guedes, and Wagner Meira. 2018. The Evolution of Bashlite and Mirai IoT Botnets. In 2018 IEEE Symposium on Computers and Communications (ISCC). 00813--00818. https:\/\/doi.org\/10.1109\/ISCC.2018.8538636"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"e_1_3_2_1_20_1","volume-title":"Manuel Ricardo P\u00e9rez, and Luis Carlos Trujillo","author":"Medina Camilo Alejandro","year":"2017","unstructured":"Camilo Alejandro Medina , Manuel Ricardo P\u00e9rez, and Luis Carlos Trujillo . 2017 . IoT Paradigm into the Smart City Vision: A Survey. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) . 695--704. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.109 10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.109 Camilo Alejandro Medina, Manuel Ricardo P\u00e9rez, and Luis Carlos Trujillo. 2017. IoT Paradigm into the Smart City Vision: A Survey. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 695--704. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.109"},{"key":"e_1_3_2_1_21_1","unstructured":"Yair Meidan Michael Bohadana Yael Mathov Yisroel Mirsky Asaf Shabtai Dominik Breitenbacher and Yuval Elovici. [n. d.]. University of California Irvine Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/detection_of_IoT_botnet_attacks_N_BaIoT. Accessed: 09-12-2021.  Yair Meidan Michael Bohadana Yael Mathov Yisroel Mirsky Asaf Shabtai Dominik Breitenbacher and Yuval Elovici. [n. d.]. University of California Irvine Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/detection_of_IoT_botnet_attacks_N_BaIoT. Accessed: 09-12-2021."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Advanced Intelligent Systems and Informatics. Springer, 855--864","author":"Nassar Ahmed Samy","year":"2017","unstructured":"Ahmed Samy Nassar , Ahmed Hossam Montasser , and Nashwa Abdelbaki . 2017 . A survey on smart cities' IoT . In International Conference on Advanced Intelligent Systems and Informatics. Springer, 855--864 . https:\/\/doi.org\/10.1007\/978-3-319-64861-3_80 10.1007\/978-3-319-64861-3_80 Ahmed Samy Nassar, Ahmed Hossam Montasser, and Nashwa Abdelbaki. 2017. A survey on smart cities' IoT. In International Conference on Advanced Intelligent Systems and Informatics. Springer, 855--864. https:\/\/doi.org\/10.1007\/978-3-319-64861-3_80"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI. 361--369","author":"Ring Markus","year":"2017","unstructured":"Markus Ring , Sarah Wunderlich , Dominik Gr\u00fcdl , Dieter Landes , and Andreas Hotho . 2017 . Flow-based benchmark data sets for intrusion detection . In Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI. 361--369 . Markus Ring, Sarah Wunderlich, Dominik Gr\u00fcdl, Dieter Landes, and Andreas Hotho. 2017. Flow-based benchmark data sets for intrusion detection. In Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI. 361--369."},{"key":"e_1_3_2_1_25_1","first-page":"40","article-title":"Creation of Flow-Based Data Sets for Intrusion Detection","volume":"16","author":"Ring Markus","year":"2017","unstructured":"Markus Ring , Sarah Wunderlich , Dominik Gr\u00fcdl , Dieter Landes , and Andreas Hotho . 2017 . Creation of Flow-Based Data Sets for Intrusion Detection . Journal of Information Warfare 16 (2017), 40 -- 53 . Issue 4. https:\/\/www.jstor.org\/stable\/26504117 Markus Ring, Sarah Wunderlich, Dominik Gr\u00fcdl, Dieter Landes, and Andreas Hotho. 2017. Creation of Flow-Based Data Sets for Intrusion Detection. Journal of Information Warfare 16 (2017), 40--53. Issue 4. https:\/\/www.jstor.org\/stable\/26504117","journal-title":"Journal of Information Warfare"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"e_1_3_2_1_27_1","first-page":"100","article-title":"Machine learning techniques used in detection of DoS attacks: a literature review","volume":"6","author":"Sharma Niharika","year":"2016","unstructured":"Niharika Sharma , Amit Mahajan , and V Malhotra . 2016 . Machine learning techniques used in detection of DoS attacks: a literature review . International Journal of Advance Research in Computer Science and Software Engineering 6 , 3 (2016), 100 -- 105 . Niharika Sharma, Amit Mahajan, and V Malhotra. 2016. Machine learning techniques used in detection of DoS attacks: a literature review. International Journal of Advance Research in Computer Science and Software Engineering 6, 3 (2016), 100--105.","journal-title":"International Journal of Advance Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2017.8115504"},{"key":"e_1_3_2_1_29_1","unstructured":"UCI. 2021. University of California Irvine KDD Archive. https:\/\/www.kdd.org\/kdd-cup\/view\/kdd-cup-1999\/Data. Accessed: 09-11-2021.  UCI. 2021. University of California Irvine KDD Archive. https:\/\/www.kdd.org\/kdd-cup\/view\/kdd-cup-1999\/Data. Accessed: 09-11-2021."},{"key":"e_1_3_2_1_30_1","volume-title":"Mahmoud","author":"Ullah Imtiaz","year":"2020","unstructured":"Imtiaz Ullah and Qusay H . Mahmoud . 2020 . A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In Advances in Artificial Intelligence, Cyril Goutte and Xiaodan Zhu (Eds.). Springer International Publishing , Cham, 508--520. https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52 10.1007\/978-3-030-47358-7_52 Imtiaz Ullah and Qusay H. Mahmoud. 2020. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In Advances in Artificial Intelligence, Cyril Goutte and Xiaodan Zhu (Eds.). Springer International Publishing, Cham, 508--520. https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52"},{"key":"e_1_3_2_1_31_1","volume-title":"Canadian Institute for Cybersecurity, \"CICIDS2017,\" unb.ca","author":"UNB.","year":"2017","unstructured":"UNB. 2017. Canadian Institute for Cybersecurity, \"CICIDS2017,\" unb.ca , 2017 . https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html. Accessed : 09-13-2021. UNB. 2017. Canadian Institute for Cybersecurity, \"CICIDS2017,\" unb.ca, 2017. https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html. Accessed: 09-13-2021."},{"key":"e_1_3_2_1_32_1","volume-title":"University of New Brunswick, \"CSE-CIC-IDS2018 on AWS","author":"UNB.","year":"2018","unstructured":"UNB. 2018. University of New Brunswick, \"CSE-CIC-IDS2018 on AWS ,\" 2018 . https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html. Accessed : 09-13-2021. UNB. 2018. University of New Brunswick, \"CSE-CIC-IDS2018 on AWS,\" 2018. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html. Accessed: 09-13-2021."},{"key":"e_1_3_2_1_33_1","volume-title":"University of New Brunswick, \"DDoS Evaluation Dataset (CICD-DoS2019)\", unb.ca","author":"UNB.","year":"2019","unstructured":"UNB. 2019. University of New Brunswick, \"DDoS Evaluation Dataset (CICD-DoS2019)\", unb.ca , 2019 . https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html. Accessed : 09-13-2021. UNB. 2019. University of New Brunswick, \"DDoS Evaluation Dataset (CICD-DoS2019)\", unb.ca, 2019. https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html. Accessed: 09-13-2021."},{"key":"e_1_3_2_1_34_1","volume-title":"University of New Brunswick","author":"UNB.","year":"2021","unstructured":"UNB. 2021. University of New Brunswick , Canadian Institute for Cybersecurity . https:\/\/www.unb.ca\/cic\/datasets\/. Accessed: 09-11- 2021 . UNB. 2021. University of New Brunswick, Canadian Institute for Cybersecurity. https:\/\/www.unb.ca\/cic\/datasets\/. Accessed: 09-11-2021."},{"key":"e_1_3_2_1_35_1","unstructured":"UNSW. 2015. University of New South Wales The UNSW-NB15 Dataset. https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset. Accessed: 09-11-2021.  UNSW. 2015. University of New South Wales The UNSW-NB15 Dataset. https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset. Accessed: 09-11-2021."},{"key":"e_1_3_2_1_36_1","volume-title":"Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things. In International conference on Computer Networks, Big data and IoT. Springer, 120--126","author":"Vengatesan K","year":"2018","unstructured":"K Vengatesan , Abhishek Kumar , M Parthibhan , Achintya Singhal , and R Rajesh . 2018 . Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things. In International conference on Computer Networks, Big data and IoT. Springer, 120--126 . https:\/\/doi.org\/10.1007\/978-3-030-24643-3_13 10.1007\/978-3-030-24643-3_13 K Vengatesan, Abhishek Kumar, M Parthibhan, Achintya Singhal, and R Rajesh. 2018. Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things. In International conference on Computer Networks, Big data and IoT. Springer, 120--126. https:\/\/doi.org\/10.1007\/978-3-030-24643-3_13"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"volume-title":"Neural network principles and applications","author":"Zayegh Amer","key":"e_1_3_2_1_39_1","unstructured":"Amer Zayegh and N Bassam . 2018. Neural network principles and applications . Vol. 10 . London : Pearson . Amer Zayegh and N Bassam. 2018. Neural network principles and applications. Vol. 10. London: Pearson."}],"event":{"name":"SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Coimbra Portugal","acronym":"SenSys '21"},"container-title":["Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485730.3493695","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485730.3493695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:11Z","timestamp":1750191131000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485730.3493695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":39,"alternative-id":["10.1145\/3485730.3493695","10.1145\/3485730"],"URL":"https:\/\/doi.org\/10.1145\/3485730.3493695","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}