{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:43Z","timestamp":1750309123220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632145","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Recognition of Denial-of-Service Attacks in IoT Networks with Linear Complexity Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9492-4615","authenticated-orcid":false,"given":"Henrique","family":"Fell Lautert","sequence":"first","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6268-1196","authenticated-orcid":false,"given":"La\u00e9rcio","family":"Pioli","sequence":"additional","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3237-4168","authenticated-orcid":false,"given":"Douglas D. J. de","family":"Macedo","sequence":"additional","affiliation":[{"name":"Federal University of Santa Catarina, Florian\u00f3polis, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet of things: A survey on enabling technologies, protocols, and applications","author":"Al-Fuqaha Ala","year":"2015","unstructured":"Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE communications surveys & tutorials 17, 4 (2015), 2347--2376."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"8294","DOI":"10.3390\/app12168294","article-title":"Detecting ddos attacks in iot-based networks using matrix profile","volume":"12","author":"Alzahrani Mohammed Ali","year":"2022","unstructured":"Mohammed Ali Alzahrani, Ali M Alzahrani, and Muhammad Shoaib Siddiqui. 2022. Detecting ddos attacks in iot-based networks using matrix profile. Applied Sciences 12, 16 (2022), 8294.","journal-title":"Applied Sciences"},{"key":"e_1_3_2_1_3_1","volume-title":"In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1--6.","author":"Anjum Afia","year":"2022","unstructured":"Afia Anjum, Paul Agbaje, Sena Hounsinou, and Habeeb Olufowobi. 2022. In-Vehicle Network Anomaly Detection Using Extreme Gradient Boosting Machine. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). IEEE, 1--6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.19107\/IJISC.2021.01.06","article-title":"Denial-of-Service Attack","volume":"10","author":"Ioana Balaban","year":"2021","unstructured":"Ioana Balaban et al. 2021. Denial-of-Service Attack. International Journal of Information Security and Cybercrime (IJISC) 10, 1 (2021), 59--64.","journal-title":"International Journal of Information Security and Cybercrime (IJISC)"},{"key":"e_1_3_2_1_6_1","unstructured":"BBC. 2020. New Zealand stock exchange halted by cyber-attack - BBC News. https:\/\/www.bbc.com\/news\/53918580. (Acessado em 02\/06\/2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Pradeepkumar Bhale Santosh Biswas and Sukumar Nandi. 2019. LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem. In 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE 1--6.","DOI":"10.1109\/ANTS47819.2019.9118052"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03120-3"},{"key":"e_1_3_2_1_9_1","volume-title":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 5--10","author":"Binu PK","year":"2021","unstructured":"PK Binu, Deepak Mohan, and EM Sreerag Haridas. 2021. An sdn-based prototype for dynamic detection and mitigation of dos attacks in iot. In 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 5--10."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03203-1"},{"key":"e_1_3_2_1_11_1","volume-title":"2019 38th Symposium on Reliable Distributed Systems (SRDS). IEEE, 369--3692","author":"Ciklabakkal Ege","year":"2019","unstructured":"Ege Ciklabakkal, Ataberk Donmez, Mert Erdemir, Emre Suren, Mert Kaan Yilmaz, and Pelin Angin. 2019. ARTEMIS: An intrusion detection system for MQTT attacks in Internet of Things. In 2019 38th Symposium on Reliable Distributed Systems (SRDS). IEEE, 369--3692."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"e_1_3_2_1_13_1","unstructured":"Matos Mascarenhas Dalbert. 2021. Instalando o OpenWRT no VirtualBox - YouTube. https:\/\/www.youtube.com\/watch?v=ihxzYCz-8Lw. (Accessed on 10\/27\/2023)."},{"key":"e_1_3_2_1_14_1","volume-title":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE, 1--5.","author":"Daneshgadeh Salva","year":"2018","unstructured":"Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, and Nazife Baykal. 2018. A hybrid approach to detect DDoS attacks using KOAD and the Mahalanobis distance. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE, 1--5."},{"key":"e_1_3_2_1_15_1","unstructured":"Walter Dean. 2015. Computational complexity theory. (2015)."},{"key":"e_1_3_2_1_16_1","unstructured":"Luca Di Vita. 2019. Protocols Counter. https:\/\/github.com\/lucadivit\/Protocols_Counter. [Acessado em 31\/08\/2023]."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning. 49--54","author":"Doshi Keval","year":"2019","unstructured":"Keval Doshi, Mahsa Mozaffari, and Yasin Yilmaz. 2019. RAPID: Real-time anomaly-based preventive intrusion detection. In Proceedings of the ACM Workshop on Wireless Security and Machine Learning. 49--54."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3049942"},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE EUROCON 2023-20th International Conference on Smart Technologies. IEEE, 728--733","author":"Estrada Rebeca","year":"2023","unstructured":"Rebeca Estrada, Irving Valeriano, Xavier Aizaga, Lourdes Vargas, Nelson Vera, and Diego Zambrano. 2023. Wifi indoor positioning system based on openwrt. In IEEE EUROCON 2023-20th International Conference on Smart Technologies. IEEE, 728--733."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"e_1_3_2_1_21_1","first-page":"6293","article-title":"Distributed variational bayes-based in-network security for the Internet of Things","volume":"8","author":"He Wenji","year":"2020","unstructured":"Wenji He, Yifeng Liu, Haipeng Yao, Tianle Mai, Ni Zhang, and F Richard Yu. 2020. Distributed variational bayes-based in-network security for the Internet of Things. IEEE Internet of Things Journal 8, 8 (2020), 6293--6304.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1186\/s42400-022-00128-7","article-title":"A lightweight DDoS detection scheme under SDN context","volume":"5","author":"Jia Kun","year":"2022","unstructured":"Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu, and Feng Liu. 2022. A lightweight DDoS detection scheme under SDN context. Cybersecurity 5, 1 (2022), 27.","journal-title":"Cybersecurity"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2017.14"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.21227\/q70p-q449"},{"key":"e_1_3_2_1_25_1","unstructured":"Henrique Lautert. 2023. GitHub - hflautert\/AnomalyDetection --- github.com. https:\/\/github.com\/hflautert\/AnomalyDetection. [Accessed by 09\/14\/2023]."},{"volume-title":"Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023)","author":"Lautert Henrique Fell","key":"e_1_3_2_1_26_1","unstructured":"Henrique Fell Lautert, DDJ de Macedo, and La\u00e9rcio Pioli. 2023. Micro IDS: OnLine Recognition of Denial-of-Service Attacks on IoT Networks. In Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1. Springer, 446--459."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2897063"},{"key":"e_1_3_2_1_28_1","volume-title":"2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 1--9.","author":"Mergendahl Samuel","year":"2020","unstructured":"Samuel Mergendahl and Jun Li. 2020. Rapid: Robust and adaptive detection of distributed denial-of-service traffic from the internet of things. In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 1--9."},{"key":"e_1_3_2_1_29_1","volume-title":"Alessandro EC Redondi, and Matteo Cesana","author":"Palmese Fabio","year":"2022","unstructured":"Fabio Palmese, Alessandro EC Redondi, and Matteo Cesana. 2022. Feature-Sniffer: Enabling IoT Forensics in OpenWrt based Wi-Fi Access Points. In 2022 IEEE 8th World Forum on Internet of Things (WF-IoT). IEEE, 1--6."},{"key":"e_1_3_2_1_30_1","unstructured":"Nicole Perlroth. 2016. Hackers Used New Weapons to Disrupt Major Websites Across U.S. - The New York Times. https:\/\/www.nytimes.com\/2016\/10\/22\/business\/internet-problems-attack.html. (Acessado em 02\/02\/2023)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01073-6"},{"key":"e_1_3_2_1_32_1","unstructured":"Jon Porter. 2020. Amazon says it mitigated the largest DDoS attack ever recorded --- theverge.com. https:\/\/www.theverge.com\/2020\/6\/18\/21295337\/amazon-aws-biggest-ddos-attack-ever-2-3-tbps-shield-github-netscout-arbor. [Acessado em 02\/02\/2023]."},{"key":"e_1_3_2_1_33_1","unstructured":"Martin Roesch. 2023. DaemonLogger is a fast packet logger designed specifically for use in NSM environments. https:\/\/www.talosintelligence.com\/daemon. [Acessado em 31\/08\/2023]."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040602"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3394956","article-title":"SDN-assisted DDoS defense framework for the internet of multimedia things","volume":"16","author":"Sahoo Kshira Sagar","year":"2020","unstructured":"Kshira Sagar Sahoo and Deepak Puthal. 2020. SDN-assisted DDoS defense framework for the internet of multimedia things. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16, 3s (2020), 1--18.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1109\/TNSM.2021.3088326","article-title":"Chronos: Ddos attack detection using time-based autoencoder","volume":"19","author":"Salahuddin Mohammad A","year":"2021","unstructured":"Mohammad A Salahuddin, Vahid Pourahmadi, Hyame Assem Alameddine, Md Faizul Bari, and Raouf Boutaba. 2021. Chronos: Ddos attack detection using time-based autoencoder. IEEE Transactions on Network and Service Management 19, 1 (2021), 627--641.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"e_1_3_2_1_37_1","volume-title":"2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, 69--75","author":"Santoyo-Gonz\u00e1lez Alejandro","year":"2019","unstructured":"Alejandro Santoyo-Gonz\u00e1lez, Cristina Cervell\u00f3-Pastor, and Dimitrios P Pezaros. 2019. High-performance, platform-independent DDoS detection for IoT ecosystems. In 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, 69--75."},{"key":"e_1_3_2_1_38_1","unstructured":"Sinha Satyajit. 2023. Number of connected IoT devices growing 16% to 16.7 billion globally. https:\/\/iot-analytics.com\/number-connected-iot-devices\/. (Accessed by 12\/09\/2023)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","first-page":"102603","DOI":"10.1016\/j.adhoc.2021.102603","article-title":"Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks","volume":"121","author":"Sharma Deepak Kumar","year":"2021","unstructured":"Deepak Kumar Sharma, Tarun Dhankhar, Gaurav Agrawal, Satish Kumar Singh, Deepak Gupta, Jamel Nebhen, and Imran Razzak. 2021. Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks. Ad Hoc Networks 121 (2021), 102603.","journal-title":"Ad Hoc Networks"},{"key":"e_1_3_2_1_41_1","volume-title":"Optimization, Efficient Deployment and Execution of Machine Learning Algorithms on Resource-Constrained IoT Hardware.","author":"Sudharsan Bharath","year":"2022","unstructured":"Bharath Sudharsan. 2022. On-Device Learning, Optimization, Efficient Deployment and Execution of Machine Learning Algorithms on Resource-Constrained IoT Hardware. (2022)."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 432--446","author":"Joon-Wie Tann Wesley","year":"2021","unstructured":"Wesley Joon-Wie Tann, Jackie Jin Wei Tan, Joanna Purba, and Ee-Chien Chang. 2021. Filtering DDoS attacks from unlabeled network traffic data using online deep learning. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 432--446."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"e_1_3_2_1_44_1","first-page":"89","article-title":"Characterizing and mining traffic patterns of IoT devices in edge networks","volume":"8","author":"Wan Yinxin","year":"2020","unstructured":"Yinxin Wan, Kuai Xu, Feng Wang, and Guoliang Xue. 2020. Characterizing and mining traffic patterns of IoT devices in edge networks. IEEE Transactions on Network Science and Engineering 8, 1 (2020), 89--101.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"e_1_3_2_1_45_1","volume-title":"Two-Stage DDoS Mitigation with Variational Auto-Encoder and Cyclic Queuing. In ICC 2022-IEEE International Conference on Communications. IEEE, 5421--5426","author":"Yaegashi Ryo","year":"2022","unstructured":"Ryo Yaegashi, Erina Takeshita, and Yu Nakayama. 2022. Two-Stage DDoS Mitigation with Variational Auto-Encoder and Cyclic Queuing. In ICC 2022-IEEE International Conference on Communications. IEEE, 5421--5426."}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"UCC '23"},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":45,"alternative-id":["10.1145\/3603166.3632145","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632145","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}