{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:41:26Z","timestamp":1771047686546,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"JST (Japan Science and Technology Agency)","award":["JPMJCR21M3"],"award-info":[{"award-number":["JPMJCR21M3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,13]]},"DOI":"10.1145\/3675741.3675753","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T16:34:45Z","timestamp":1722962085000},"page":"65-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["GothX: a generator of customizable, legitimate and malicious IoT network traffic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1479-4953","authenticated-orcid":false,"given":"Manuel","family":"Poisson","sequence":"first","affiliation":[{"name":"CentraleSup\u00e9lec, France and Amossys, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0843-3033","authenticated-orcid":false,"given":"Rodrigo","family":"Carnier","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8372-2807","authenticated-orcid":false,"given":"Kensuke","family":"Fukuda","sequence":"additional","affiliation":[{"name":"National Institute of Informatics \/ Sokendai, Japan"}]}],"member":"320","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"etactica\/mqtt-malaria. https:\/\/github.com\/etactica\/mqtt-malaria (Accessed on May 13th","year":"2024","unstructured":"2024. etactica\/mqtt-malaria. https:\/\/github.com\/etactica\/mqtt-malaria (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-25194 (Accessed on May 13th","author":"NVD","year":"2024","unstructured":"2024. NVD - CVE-2023-25194. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-25194 (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3205351"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijmlc.2022.12.6.1120"},{"key":"e_1_3_2_1_5_1","volume-title":"KDD Cup 1999 Data. https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html (Accessed on May 13th","author":"Archive The","year":"2024","unstructured":"The UCI\u00a0KDD Archive. 1999. KDD Cup 1999 Data. https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2560919"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIoT.2020.3007690"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319313"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3288942"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089465"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"e_1_3_2_1_12_1","volume-title":"FIT IoT-LAB: The Largest IoT Open Experimental Testbed. ERCIM News101 (April","author":"Fleury Eric","year":"2015","unstructured":"Eric Fleury, Nathalie Mitton, Thomas Noel, and C\u00e9dric Adjih. 2015. FIT IoT-LAB: The Largest IoT Open Experimental Testbed. ERCIM News101 (April 2015), 4. https:\/\/inria.hal.science\/hal-01138038"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETST49965.2020.9080732"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00080"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Saida Helali. 2020. Simulating Network Architectures with GNS3. 9\u201325. https:\/\/doi.org\/10.1002\/9781119779964.ch2","DOI":"10.1002\/9781119779964.ch2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Takashi Kurimoto Koji Sasayama Osamu Akashi and Shigeo Urushidani. 2023. SINET6: Nationwide 400GE-Based Academic Backbone Network in Japan. 1\u20133. https:\/\/doi.org\/10.23919\/OFC49934.2023.10117428","DOI":"10.23919\/OFC49934.2023.10117428"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3280465"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/www.sinetstream.net\/index.en.html Japan. (Accessed on May 13th","author":"National\u00a0Institute of Informatics. 2021. SINETStream.","year":"2024","unstructured":"National\u00a0Institute of Informatics. 2021. SINETStream. https:\/\/www.sinetstream.net\/index.en.html Japan. (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/www.sinet.ad.jp Japan. (Accessed on May 13th","author":"National\u00a0Institute of Informatics. 2024. SINET6.","year":"2024","unstructured":"National\u00a0Institute of Informatics. 2024. SINET6. https:\/\/www.sinet.ad.jp Japan. (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 19th Asian Internet Engineering Conference (August","author":"Osaki Atsuya","year":"2024","unstructured":"Atsuya Osaki, Manuel Poisson, Seiki Makino, Shiiba Ryusei, Kensuke\u00a0Fukuda Fukuda, Okoshi Tadashi, and Jin Nakazawa. 2024. Dynamic Fixed-point Values in eBPF: a Case for Fully In-kernel Anomaly Detection. Proceedings of the 19th Asian Internet Engineering Conference (August 2024), 9 pages."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00023"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC47947.2019.9032519"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-021-04156-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3247166"},{"key":"e_1_3_2_1_27_1","volume-title":"CAIDA UCSD DDoS 2007 Attack Dataset. https:\/\/ieee-dataport.org\/documents\/caida-ucsd-ddos-2007-attack-dataset (Accessed on May 13th","author":"Shirsath Vaishali","year":"2024","unstructured":"Vaishali Shirsath. 2023. CAIDA UCSD DDoS 2007 Attack Dataset. https:\/\/ieee-dataport.org\/documents\/caida-ucsd-ddos-2007-attack-dataset (Accessed on May 13th, 2024)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEA54677.2022.9936302"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Atsuko Takefusa Jingtao Sun Ikki Fujiwara Hiroshi Yoshida Kento Aida and Calton Pu. 2021. SINETStream: Enabling Research IoT Applications with Portability Security and Performance Requirements. In 2021 IEEE 45th Annual Computers Software and Applications Conference (COMPSAC). 482\u2013492. https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00073 ISSN: 0730-3157.","DOI":"10.1109\/COMPSAC51774.2021.00073"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.046"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102932"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09124-5"}],"event":{"name":"CSET 2024: Workshop on Cyber Security Experimentation and Test","location":"Philadelphia PA USA","acronym":"CSET 2024"},"container-title":["Proceedings of the 17th Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675741.3675753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:09Z","timestamp":1750291449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675741.3675753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":33,"alternative-id":["10.1145\/3675741.3675753","10.1145\/3675741"],"URL":"https:\/\/doi.org\/10.1145\/3675741.3675753","relation":{},"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"2024-08-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}