{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:36Z","timestamp":1755993696824,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T00:00:00Z","timestamp":1704326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["SATC-2030611"],"award-info":[{"award-number":["SATC-2030611"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,4]]},"DOI":"10.1145\/3631461.3631954","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:08:30Z","timestamp":1705946910000},"page":"292-297","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Diversity based Detection for ON-OFF Low Strength DDoS Attacks in Smart Home IoT"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4348-3618","authenticated-orcid":false,"given":"Joseph","family":"Okonofua","sequence":"first","affiliation":[{"name":"Computer Science, Western Michigan University, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9666-9363","authenticated-orcid":false,"given":"Richard T","family":"Meyer","sequence":"additional","affiliation":[{"name":"Mechanical and Aerospace, Western Michigan University, US"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3596-9447","authenticated-orcid":false,"given":"Shameek","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"Computer Science, Western Michigan University, US"}]}],"member":"320","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security Symposium","author":"M.","year":"2017","unstructured":"[1] M. Antonakakis et. al. \u201cUnderstanding the Mirai Botnet\", USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_2_1","first-page":"51","volume-title":"Quantifying the reflective DDoS attack capability of household IoT devices\" ACM WiSec","author":"Lyu M.","year":"2017","unstructured":"[2] M. Lyu, D. Sherratt, A. Sivanathan, H. Gharakheili, A. Radford, V. Sivaraman. \u201cQuantifying the reflective DDoS attack capability of household IoT devices\" ACM WiSec, pp. 46\u201351, 2017."},{"key":"e_1_3_2_1_3_1","first-page":"955","volume-title":"IoT-NetSec: Policy-Based IoT Network Security Using OpenFlow\" IEEE PerCom Workshops","author":"Nobakht M.","year":"2019","unstructured":"[3] M. Nobakht, C. Russell, W. Hu, A. Seneviratne, \u201cIoT-NetSec: Policy-Based IoT Network Security Using OpenFlow\" IEEE PerCom Workshops, pp. 955-960, 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"ACM SOSR","author":"Hamza A.","year":"2019","unstructured":"[4] A. Hamza, H. Gharakheili, T. Benson, V. Sivaraman, \u201cDetecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity\", ACM SOSR, 2019."},{"key":"e_1_3_2_1_5_1","first-page":"1362","volume-title":"SoK: Security Evaluation of Home-Based IoT Deployments,\" IEEE Symposium on Security and Privacy (SP)","author":"Alrawi O.","year":"2019","unstructured":"[5] O. Alrawi, C. Lever, M. Antonakakis, F. Monrose, \u201cSoK: Security Evaluation of Home-Based IoT Deployments,\" IEEE Symposium on Security and Privacy (SP), pp. 1362-1380, 2019."},{"key":"e_1_3_2_1_6_1","first-page":"559","volume-title":"Characterizing and classifying IoT traffic in smart cities and campuses,\" IEEE INFOCOM Workshops","author":"Sivanathan A.","year":"2017","unstructured":"[6] A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, V. Sivaraman, \u201cCharacterizing and classifying IoT traffic in smart cities and campuses,\" IEEE INFOCOM Workshops, pp. 559-564, 2017."},{"volume-title":"https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/ [Accessed","year":"2020","key":"e_1_3_2_1_7_1","unstructured":"[7] [Online] Available at: https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/ [Accessed 24 February 2020]."},{"key":"e_1_3_2_1_8_1","volume-title":"Avast-AIC laboratory, Stratosphere IPS","author":"Parmisano A.","year":"2019","unstructured":"[8] A. Parmisano, S. Garcia, M. Erquiaga, \u2019IoT-23 Dataset: A labeled dataset of Malware and Benign IoT Traffic.\u2019, Avast-AIC laboratory, Stratosphere IPS, Czech Technical University (CTU), Prague, Czech Republic, 2019."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"[9] D. Scott \u201cMultivariate Density Estimation: Theory Practice and Visualization\" Wiley 1992.","DOI":"10.1002\/9780470316849"},{"key":"e_1_3_2_1_10_1","unstructured":"[10] Y. Amar H. Haddadi R. Mortier A. Brown J. Colley A. Crabtree \u201cAn Analysis of Home IoT Network Traffic and Behaviour\" arXiv:1803.05368 2018."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE MASS","author":"AlSheakh H.","year":"2020","unstructured":"[12] H. AlSheakh, S. Bhattacharjee, \u201c Towards a Unified Trust Framework for Detecting Smart IoT Devices Under Attacks\", IEEE MASS, 2020."},{"key":"e_1_3_2_1_13_1","first-page":"363","volume-title":"Entropy and diversity","author":"Jost L.","year":"2006","unstructured":"[13] L. Jost, \u201cEntropy and diversity\", Wiley Oikos, Vol. 112, pp. 363-375, 2006."}],"event":{"name":"ICDCN '24: International Conference on Distributed Computing and Networking","acronym":"ICDCN '24","location":"Chennai India"},"container-title":["Proceedings of the 25th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631461.3631954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631461.3631954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:40:37Z","timestamp":1755909637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631461.3631954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,4]]},"references-count":13,"alternative-id":["10.1145\/3631461.3631954","10.1145\/3631461"],"URL":"https:\/\/doi.org\/10.1145\/3631461.3631954","relation":{},"subject":[],"published":{"date-parts":[[2024,1,4]]},"assertion":[{"value":"2024-01-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}