{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:36:19Z","timestamp":1773092179321,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723319","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:20:33Z","timestamp":1749194433000},"page":"1066-1073","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposing a framework to prevent Distributed Denial of Service (DDoS) attacks on IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9137-2683","authenticated-orcid":false,"given":"Md. Abdur","family":"Rouf","sequence":"first","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1061-0847","authenticated-orcid":false,"given":"Atia Rasida","family":"Silvia","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1475-7126","authenticated-orcid":false,"given":"Mihir Kanti","family":"Roy","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5973-2774","authenticated-orcid":false,"given":"Sujoy Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5218-4760","authenticated-orcid":false,"given":"Syma Kamal","family":"Chaity","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"D. Kumar K. Shen B. Case D. Garg G. Alperovich D. Kuznetsov and R. Gupta \"All Things Considered: An Analysis of IoT Devices on Home Networks\"."},{"key":"e_1_3_3_2_3_2","unstructured":"\"THE 2023 IOT SECURITY LANDSCAPE REPORT \" Bitdefender Natgear 2023."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"L. Metongnon R. Sadre and E. C. Ezin \"Distributed Middlebox Architecture for IoT Protection \" in 15th International Conference on Network and Service Management (CNSM) 2019.","DOI":"10.23919\/CNSM46954.2019.9012738"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"B. Dash M. F. Ansari P. Sharma and A. Ali \"Threats and Opportunities with AI-based Cyber Security Intrusion Detection: A Review \" International Journal of Software Engineering Applications vol. 13 2022.","DOI":"10.5121\/ijsea.2022.13502"},{"key":"e_1_3_3_2_6_2","unstructured":"Y.-R. SU X.-F. LI S.-F. WANG and J. YI \"Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices \" 2018."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"P. Oser R. W. v. d. Heijden S. L\u00fcders and F. Kargl \"Risk Prediction of IoT Devices Based on Vulnerability Analysis \" ACM Journals vol. 25 no. 2 pp. 1-36 2022.","DOI":"10.1145\/3510360"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"D. K. Sharma T. Dhankhar G. Agrawal S. K. Singh D. Gupta J. Nebhen and I. Razzak \"Anomaly detection framework to prevent DDoS attack in fog empowered IoT Networks \" Science Direct 2021.","DOI":"10.1016\/j.adhoc.2021.102603"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"A. Rajagopalan M. Jagga A. Kumari and S. T. Ali \"A DDoS Prevention Scheme for Session Resumption SEA Architecture in Healthcare IoT \" in Computational Intelligence and Communication Technology 2017.","DOI":"10.1109\/CIACT.2017.7977361"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Y. Jia F. Zhong A. Alrawais B. Gong and X. Cheng \"FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks \" IEEE Internet of Things Journal vol. 7 no. 10 pp. 9552 - 9562 2020.","DOI":"10.1109\/JIOT.2020.2993782"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"J. J. Kponyo J. O. Agyemang G. S. Klogo and J. O. Boateng \"Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices \" Internet of Things vol. 12 December 2020.","DOI":"10.1016\/j.iot.2020.100319"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"N. Ravi and S. M. Shalinie \"Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture \" IEEE INTERNET OF THINGS JOURNAL vol. 7 no. 4 pp. 3559 - 3570 April 2020.","DOI":"10.1109\/JIOT.2020.2973176"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"S.-H. Lee Y.-L. Shiue C.-H. Cheng Y.-H. Li and Y.-F. Huang \"Detection and Prevention of DDoS Attacks on the IoT \" Applied Sciences 2022.","DOI":"10.3390\/app122312407"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"F. Hussain S. G. Abbas M. Husnain U. U. Fayyaz F. Shahzad and G. A. Shah \"IoT DoS and DDoS Attack Detection using ResNet \" in IEEE 23rd International Multitopic Conference (INMIC) Bahawalpur Pakistan 2020.","DOI":"10.1109\/INMIC50486.2020.9318216"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"N. Moustafa \"A new distributed architecture for evaluating AI-based security systems at the edge: Network TON IoT datasets \" Sustainable Cities and Society vol. 72 2021.","DOI":"10.1016\/j.scs.2021.102994"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"D. YIN L. ZHANG and K. YANG \"A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework \" IEEE Access 2018.","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"J. BHAYO S. HAMEED and S. A. SHAH \"An Efficient CounterBased DDoS Attack Detection Framework Leveraging SoftwareDefined IoT (SD-IoT) \" IEEE Access vol. 8 pp. 221612 - 221631.","DOI":"10.1109\/ACCESS.2020.3043082"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"A. Wani and S. Revathi \"DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA) \" Journal of The Institution of Engineers (India): Series B vol. 101 p. 117\u2013128 2020.","DOI":"10.1007\/s40031-020-00442-z"},{"key":"e_1_3_3_2_19_2","unstructured":"K. M. S. Azad N. Hossain M. J. Islam and A. Rahman \"Preventive Determination and Avoidance of DDoS Attack with SDN over the IoT Networks \" in International Conference on Automation Control and Mechatronics for Industry 4.0 (ACMI) Rajshahi Bangladesh 2021."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"K. HUANG L.-X. YANG X. YANG Y. XIANG and Y. Y. TANG \"A Low-Cost Distributed Denial-of-Service Attack Architecture \" 2020.","DOI":"10.1109\/ACCESS.2020.2977112"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"M. Saqlain M. Piao Y. Shim and J. Y. Lee \"Framework of an IoT-based Industrial Data Management for Smart Manufacturing \" Journal of Sensor and Actuator Networks vol. 8 no. 25 2019","DOI":"10.3390\/jsan8020025"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"R. Vishwakarma and A. K. Jain \"A survey of DDoS attacking techniques and defence mechanisms \" Springer Science+Business Media 2019.","DOI":"10.1007\/s11235-019-00599-z"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2024"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723319","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:48Z","timestamp":1750298208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":21,"alternative-id":["10.1145\/3723178.3723319","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723319","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}