{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:31:25Z","timestamp":1775838685427,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3604223","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"969-974","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2710-5326","authenticated-orcid":false,"given":"Nguyen","family":"Huy-Trung","sequence":"first","affiliation":[{"name":"People's Security Academy, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1249-7706","authenticated-orcid":false,"given":"Nguyen","family":"Viet Quoc","sequence":"additional","affiliation":[{"name":"Cyber Security and Counter High-Tech Crime Department, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\u201c41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025 Truy cp: https:\/\/www.helpnetsecurity.com\/2019\/06\/21\/connected-iot-devices-forecast\/. Ng\u00e0y truy cp: 10\/3\/2022.\u201d  \u201c41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025 Truy cp: https:\/\/www.helpnetsecurity.com\/2019\/06\/21\/connected-iot-devices-forecast\/. Ng\u00e0y truy cp: 10\/3\/2022.\u201d"},{"key":"e_1_3_2_1_2_1","volume-title":"Singh, S., Sheng, Q. Z., Benkhelifa, E., & Lloret, J. (2020)","unstructured":"\u201c Singh, S., Sheng, Q. Z., Benkhelifa, E., & Lloret, J. (2020) . Guest Editorial: Energy Management, Protocols , and Security for the Next-Generation Networks and Internet of Things. IEEE Trans. Ind. Informatics , 16(5), 3515-3520.\u201d \u201cSingh, S., Sheng, Q. Z., Benkhelifa, E., & Lloret, J. (2020). Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things. IEEE Trans. Ind. Informatics, 16(5), 3515-3520.\u201d"},{"key":"e_1_3_2_1_3_1","volume-title":"Mi, H., Wang, H., Zhou, Y., Lyu, M. R. T., & Cai, H. (2013). Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems","unstructured":"\u201c Mi, H., Wang, H., Zhou, Y., Lyu, M. R. T., & Cai, H. (2013). Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems . IEEE Transactions on Parallel and Distributed Systems , 24(6), 1245-1255.\u201d \u201cMi, H., Wang, H., Zhou, Y., Lyu, M. R. T., & Cai, H. (2013). Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1245-1255.\u201d"},{"key":"e_1_3_2_1_4_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 121-130)","unstructured":"\u201c Zhu, J., He, S., Liu, J., He, P., Xie, Q., Zheng, Z., & Lyu, M. R. (2019, May). Tools and benchmarks for automated log parsing . In 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 121-130) . IEEE.\u201d \u201cZhu, J., He, S., Liu, J., He, P., Xie, Q., Zheng, Z., & Lyu, M. R. (2019, May). Tools and benchmarks for automated log parsing. In 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 121-130). IEEE.\u201d"},{"key":"e_1_3_2_1_5_1","volume-title":"2013 IEEE Globecom Workshops (GC Wkshps) (pp. 194-199)","unstructured":"\u201c Shu, X., Smiy, J., Yao, D. D., & Lin, H. (2013, December). Massive distributed and parallel log analysis for organizational security . In 2013 IEEE Globecom Workshops (GC Wkshps) (pp. 194-199) . IEEE.\u201d \u201cShu, X., Smiy, J., Yao, D. D., & Lin, H. (2013, December). Massive distributed and parallel log analysis for organizational security. In 2013 IEEE Globecom Workshops (GC Wkshps) (pp. 194-199). IEEE.\u201d"},{"key":"e_1_3_2_1_6_1","first-page":"4745","volume-title":"IJCAI. ijcai.org","year":"2019","unstructured":"\u201c W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, \u2018Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs ,\u2019 in IJCAI. ijcai.org , 2019 , pp. 4739\u2013 4745 .\u201d \u201cW. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, \u2018Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs,\u2019 in IJCAI. ijcai.org, 2019, pp. 4739\u20134745.\u201d"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807-817)","unstructured":"\u201c Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y., ... & Zhang, D. (2019, August). Robust log-based anomaly detection on unstable log data . In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807-817) .\u201d \u201cZhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y., ... & Zhang, D. (2019, August). Robust log-based anomaly detection on unstable log data. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807-817).\u201d"},{"key":"e_1_3_2_1_8_1","first-page":"111","volume-title":"ACM","year":"2016","unstructured":"\u201c Q. Lin, H. Zhang, J. Lou, Y. Zhang, and X. Chen, \u2018Log clustering based problem identification for online service systems,\u2019 in ICSE (Companion Volume) . ACM , 2016 , pp. 102\u2013 111 .\u201d \u201cQ. Lin, H. Zhang, J. Lou, Y. Zhang, and X. Chen, \u2018Log clustering based problem identification for online service systems,\u2019 in ICSE (Companion Volume). ACM, 2016, pp. 102\u2013111.\u201d"},{"key":"e_1_3_2_1_9_1","first-page":"4745","volume-title":"IJCAI. ijcai.org","year":"2019","unstructured":"\u201c W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, \u2018Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs ,\u2019 in IJCAI. ijcai.org , 2019 , pp. 4739\u2013 4745 .\u201d \u201cW. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, and R. Zhou, \u2018Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs,\u2019 in IJCAI. ijcai.org, 2019, pp. 4739\u20134745.\u201d"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"\u201cHan S. Wu Q. & Yang Y. (2022). Machine learning for Internet of things anomaly detection under low-quality data. International Journal of Distributed Sensor Networks 18(10) 15501329221133765.\u201d  \u201cHan S. Wu Q. & Yang Y. (2022). Machine learning for Internet of things anomaly detection under low-quality data. International Journal of Distributed Sensor Networks 18(10) 15501329221133765.\u201d","DOI":"10.1177\/15501329221133765"},{"key":"e_1_3_2_1_11_1","unstructured":"\u201cGranlund O. (2019). Unsupervised anomaly detection on log-based time series data (Dissertation). Retrieved from http:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:kth:diva-265534.\u201d  \u201cGranlund O. (2019). Unsupervised anomaly detection on log-based time series data (Dissertation). Retrieved from http:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:kth:diva-265534.\u201d"},{"key":"e_1_3_2_1_12_1","volume-title":"2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1215-1220)","unstructured":"\u201c Yadav, R. B., Kumar, P. S., & Dhavale, S. V. (2020, June). A survey on log anomaly detection using deep learning . In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1215-1220) . IEEE.\u201d \u201cYadav, R. B., Kumar, P. S., & Dhavale, S. V. (2020, June). A survey on log anomaly detection using deep learning. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1215-1220). IEEE.\u201d"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"\u201cChalapathy R. & Chawla S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.\u201d  \u201cChalapathy R. & Chawla S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.\u201d","DOI":"10.1145\/3394486.3406704"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1285-1298)","unstructured":"\u201c Du, M., Li, F., Zheng, G., & Srikumar, V. (2017, October). Deeplog: Anomaly detection and diagnosis from system logs through deep learning . In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1285-1298) .\u201d \u201cDu, M., Li, F., Zheng, G., & Srikumar, V. (2017, October). Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1285-1298).\u201d"},{"key":"e_1_3_2_1_15_1","first-page":"4739","volume-title":"IJCAI (Vol. 19, No. 7","unstructured":"\u201c Meng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y., ... & Zhou, R. (2019, August). LogAnomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs . In IJCAI (Vol. 19, No. 7 , pp. 4739 - 4745 ).\u201d \u201cMeng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y., ... & Zhou, R. (2019, August). LogAnomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In IJCAI (Vol. 19, No. 7, pp. 4739-4745).\u201d"},{"key":"e_1_3_2_1_16_1","volume-title":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (pp. 492-504)","unstructured":"\u201c Le, V. H., & Zhang, H. (2021, November). Log-based anomaly detection without log parsing . In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (pp. 492-504) . IEEE.\u201d \u201cLe, V. H., & Zhang, H. (2021, November). Log-based anomaly detection without log parsing. In 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (pp. 492-504). IEEE.\u201d"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-020-09347-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"\u201cWang J. Tang Y. He S. Zhao C. Sharma P. K. Alfarraj O. & Tolba A. (2020). LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things. Sensors 20(9) 2451.\u201d  \u201cWang J. Tang Y. He S. Zhao C. Sharma P. K. Alfarraj O. & Tolba A. (2020). LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things. Sensors 20(9) 2451.\u201d","DOI":"10.3390\/s20092451"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"\u201cXin Y. Kong L. Liu Z. Chen Y. Li Y. Zhu H. ... & Wang C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access 6 35365-35381.\u201d  \u201cXin Y. Kong L. Liu Z. Chen Y. Li Y. Zhu H. ... & Wang C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access 6 35365-35381.\u201d","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"e_1_3_2_1_20_1","first-page":"584","volume-title":"37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907)","year":"2007","unstructured":"\u201c A. Oliner and J. Stearley, \u2018What supercomputers say: A study of five system logs,\u2019 in 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907) . IEEE, 2007 , pp. 575\u2013 584 .\u201d \u201cA. Oliner and J. Stearley, \u2018What supercomputers say: A study of five system logs,\u2019 in 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907). IEEE, 2007, pp. 575\u2013 584.\u201d"},{"key":"e_1_3_2_1_21_1","volume-title":"2017 IEEE international conference on web services (ICWS) (pp. 33-40)","unstructured":"\u201c He, P., Zhu, J., Zheng, Z., & Lyu, M. R. (2017, June). Drain: An online log parsing approach with fixed depth tree . In 2017 IEEE international conference on web services (ICWS) (pp. 33-40) . IEEE.\u201d \u201cHe, P., Zhu, J., Zheng, Z., & Lyu, M. R. (2017, June). Drain: An online log parsing approach with fixed depth tree. In 2017 IEEE international conference on web services (ICWS) (pp. 33-40). IEEE.\u201d"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","location":"Xiamen China","acronym":"CNIOT'23"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3604223","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3604223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:06Z","timestamp":1750178766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3604223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":21,"alternative-id":["10.1145\/3603781.3604223","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3604223","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}