{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:20:48Z","timestamp":1777735248900,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,11]]},"DOI":"10.1145\/3726122.3726166","type":"proceedings-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T23:43:11Z","timestamp":1751499791000},"page":"295-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Bringing IoT Intrusion Detection to the Edge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2809-6273","authenticated-orcid":false,"given":"Barikisu","family":"Asulba","sequence":"first","affiliation":[{"name":"CISTER, Faculdade de Engenharia, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0822-3423","authenticated-orcid":false,"given":"Pedro F.","family":"Souto","sequence":"additional","affiliation":[{"name":"CISTER, Faculdade de Engenharia, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9544-3028","authenticated-orcid":false,"given":"Luis","family":"Almeida","sequence":"additional","affiliation":[{"name":"CISTER, Faculdade de Engenharia, Universidade do Porto, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. Tstat. http:\/\/tstat.polito.it\/. Accessed on Feb 1 2023."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Josue\u00a0Genaro Almaraz-Rivera Jesus\u00a0Arturo Perez-Diaz Jose\u00a0Antonio Cantoral-Ceballos Juan\u00a0Felipe Botero and Luis\u00a0A. Trejo. 2022. LATAM-DDoS-IoT dataset. (2022). 10.21227\/rwtj-dd43","DOI":"10.21227\/rwtj-dd43"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"N. Borgioli L.\u00a0T.\u00a0X. Phan F. Aromolo A. Biondi and G. Buttazzo. 2023. Real-time packet-based intrusion detection on edge devices. Proceedings of Cyber-Physical Systems and Internet of Things Week 2023 (2023). 10.1145\/3576914.3587551","DOI":"10.1145\/3576914.3587551"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48247-5_28"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51664.2024.10454871"},{"key":"e_1_3_3_1_7_2","volume-title":"Malware and IoT Attacks See Huge Rise in H1 2024","year":"2024","unstructured":"Digit.fyi. 2024. Malware and IoT Attacks See Huge Rise in H1 2024. Digit.fyi. https:\/\/www.digit.fyi\/malware-and-iot-attacks-see-huge-rise-in-h1-2024\/"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Mohamed\u00a0Amine Ferrag Othmane Friha Djallel Hamouda Leandros Maglaras and Helge Janicke. 2022. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 10 (2022) 40281\u201340306. 10.1109\/ACCESS.2022.3165809","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323656"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Mingshu He Yuanming Huang Xinlei Wang Peng Wei and Xiaojuan Wang. 2024. A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping. IEEE Internet of Things Journal 11 2 (2024) 2935\u20132949. 10.1109\/JIOT.2023.3294259","DOI":"10.1109\/JIOT.2023.3294259"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Haochen Hua Yutong Li Tonghe Wang Nanqing Dong Wei Li and Junwei Cao. 2023. Edge Computing with Artificial Intelligence: A Machine Learning Perspective. ACM Comput. Surv. 55 9 Article 184 (jan 2023) 35\u00a0pages. 10.1145\/3555802","DOI":"10.1145\/3555802"},{"key":"e_1_3_3_1_12_2","volume-title":"New Report on IoT Security Underscores the Current Risk of Unsecured Devices and Equipment","author":"News IoT Business","year":"2024","unstructured":"IoT Business News. 2024. New Report on IoT Security Underscores the Current Risk of Unsecured Devices and Equipment. IoT Business News. https:\/\/iotbusinessnews.com"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Shahbaz\u00a0Ahmad Khanday Hoor Fatima and Nitin Rakesh. 2023. Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks. Expert Systems with Applications 215 (2023) 119330. 10.1016\/j.eswa.2022.119330","DOI":"10.1016\/j.eswa.2022.119330"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Jan L\u00e1nsk\u00fd Saqib Ali Mokhtar Mohammadi Mohammed\u00a0Kamal Majeed Sarkhel\u00a0H. Taher Karim Shima Rashidi Mehdi Hosseinzadeh and Amir masoud Rahmani. 2021. Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 9 (2021) 101574\u2013101599. https:\/\/api.semanticscholar.org\/CorpusID:236479767","DOI":"10.1109\/ACCESS.2021.3097247"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Nour Moustafa. 2019. ToN_IoT datasets. IEEE Dataport. 10.21227\/fesz-dm97Accessed on: Feb 1 2023.","DOI":"10.21227\/fesz-dm97"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0G.\u00a0Sarwar Murshed Christopher Murphy Daqing Hou Nazar Khan Ganesh Ananthanarayanan and Faraz Hussain. 2021. Machine Learning at the Network Edge: A Survey. ACM Comput. Surv. 54 8 Article 170 (oct 2021) 37\u00a0pages. 10.1145\/3469029","DOI":"10.1145\/3469029"},{"key":"e_1_3_3_1_18_2","unstructured":"OpenWrt Wiki. 2024. Table of Hardware (Extended). https:\/\/openwrt.org\/toh\/views\/toh_extended_all. Accessed: 15-Oct-2024."},{"key":"e_1_3_3_1_19_2","unstructured":"F. Pedregosa G. Varoquaux A. Gramfort V. Michel B. Thirion O. Grisel M. Blondel P. Prettenhofer R. Weiss V. Dubourg J. Vanderplas A. Passos D. Cournapeau M. Brucher M. Perrot and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011) 2825\u20132830."},{"key":"e_1_3_3_1_20_2","unstructured":"Qualcomm. n. d.. Qualcomm Networking Pro 600 Platform. https:\/\/www.qualcomm.com\/content\/dam\/qcomm-martech\/dm-assets\/documents\/qualcomm_networking_pro_600_platform_final.pdf Accessed: 2024-10-18."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"P.\u00a0J. Rousseeuw and K.\u00a0V. Driessen. 1999. A fast algorithm for the minimum covariance determinant estimator. Technometrics 41 (1999) 212. Issue 3. 10.2307\/1270566","DOI":"10.2307\/1270566"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56252-5_15"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Bernhard Sch\u00f6lkopf John\u00a0C. Platt John Shawe-Taylor Alex\u00a0J. Smola and Robert\u00a0C. Williamson. 2001. Estimating the Support of a High-Dimensional Distribution. Neural Computation 13 7 (2001) 1443\u20131471. 10.1162\/089976601750264965","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Guo sheng Zhao Yang Wang and Jian Wang. 2023. Intrusion Detection Model of Internet of Things Based on LightGBM. IEICE Trans. Commun. 106 (2023) 622\u2013634. https:\/\/api.semanticscholar.org\/CorpusID:245499868","DOI":"10.1587\/transcom.2022EBP3169"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"C. Shieh T. Nguyen C. Chen and M. Horng. 2022. Detection of unknown ddos attack using reconstruct error and one-class svm featuring stochastic gradient descent. Mathematics 11 (2022) 108. Issue 1. 10.3390\/math11010108","DOI":"10.3390\/math11010108"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Md. Maruf\u00a0Hossain Shuvo Syed\u00a0Kamrul Islam Jianlin Cheng and Bashir\u00a0I. Morshed. 2023. Efficient Acceleration of Deep Learning Inference on Resource-Constrained Edge Devices: A Review. Proc. IEEE 111 (2023) 42\u201391. https:\/\/api.semanticscholar.org\/CorpusID:254706813","DOI":"10.1109\/JPROC.2022.3226481"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Chongbo Wei Gaogang Xie and Zulong Diao. 2023. A lightweight deep learning framework for botnet detecting at the IoT edge. Computers & Security 129 (2023) 103195. 10.1016\/j.cose.2023.103195","DOI":"10.1016\/j.cose.2023.103195"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279691"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576914.3589807"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Marek \u017byli\u0144ski Amir Nassibi Ildar Rakhmatulin Adil Malik Christos Papavassiliou and Danilo\u00a0P. Mandic. 2024. Deployment of Artificial Intelligence Models on Edge Devices: A Tutorial Brief. IEEE Transactions on Circuits and Systems II: Express Briefs 71 (2024) 1738\u20131743. https:\/\/api.semanticscholar.org\/CorpusID:265492906","DOI":"10.1109\/TCSII.2023.3336831"}],"event":{"name":"ICFNDS '24: The 8th International Conference on Future Networks & Distributed Systems","location":"Marakech Morocco","acronym":"ICFNDS '24"},"container-title":["Proceedings of the 8th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726122.3726166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:26:11Z","timestamp":1751502371000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726122.3726166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"references-count":29,"alternative-id":["10.1145\/3726122.3726166","10.1145\/3726122"],"URL":"https:\/\/doi.org\/10.1145\/3726122.3726166","relation":{},"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"2025-07-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}