{"id":"https://openalex.org/W4313315848","doi":"https://doi.org/10.1109/commnet56067.2022.9993816","title":"A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Opl\u00e0 Device in IoT Environment","display_name":"A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Opl\u00e0 Device in IoT Environment","publication_year":2022,"publication_date":"2022-12-12","ids":{"openalex":"https://openalex.org/W4313315848","doi":"https://doi.org/10.1109/commnet56067.2022.9993816"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068496827","display_name":"Mahmoud Al-Maani","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Al-Maani","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010898785","display_name":"Gayle Frisbie","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gayle Frisbie","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091384635","display_name":"Frederick Shippy","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frederick Shippy","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037013253","display_name":"Mario Tiseo","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mario Tiseo","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091723521","display_name":"Omar Darwish","orcid":"https://orcid.org/0000-0001-8346-7148"},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Darwish","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076636276","display_name":"Munther Abualkibash","orcid":null},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Munther Abualkibash","raw_affiliation_strings":["Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan"],"affiliations":[{"raw_affiliation_string":"Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan","institution_ids":["https://openalex.org/I138216421"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.364,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.354281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":76},"biblio":{"volume":"73","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9917,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arduino","display_name":"Arduino","score":0.7117356},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.6062251},{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.42521524}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8573892},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77729195},{"id":"https://openalex.org/C136501162","wikidata":"https://www.wikidata.org/wiki/Q175957","display_name":"Arduino","level":2,"score":0.7117356},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.64855087},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.6062251},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5759575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5735797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.50598544},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.50427973},{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.42521524},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3150972},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.31465238},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27059618},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.22923297},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18408072},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.12109554}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Zero hunger","id":"https://metadata.un.org/sdg/2","score":0.81}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1988037376","https://openalex.org/W2162969618","https://openalex.org/W2408892127","https://openalex.org/W2525500666","https://openalex.org/W2587884014","https://openalex.org/W2735927200","https://openalex.org/W2761800654","https://openalex.org/W2798794960","https://openalex.org/W2890450137","https://openalex.org/W2910424156","https://openalex.org/W2920220640","https://openalex.org/W2965568386","https://openalex.org/W3109683149","https://openalex.org/W3114296309","https://openalex.org/W3130190988","https://openalex.org/W4221089828"],"related_works":["https://openalex.org/W4214491888","https://openalex.org/W3191461944","https://openalex.org/W3096006032","https://openalex.org/W3003508951","https://openalex.org/W2967802456","https://openalex.org/W2807997743","https://openalex.org/W2756012949","https://openalex.org/W2363944694","https://openalex.org/W2313958768","https://openalex.org/W2100170134"],"abstract_inverted_index":{"The":[0,91,136],"use":[1,24],"of":[2,4,54,64,70,128],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7,33,58],"is":[8,152],"on":[9,35,43,107,164],"the":[10,49,76,86,116,132,139,150,157,161],"rise":[11],"as":[12],"they":[13,45],"enter":[14],"our":[15],"homes":[16],"and":[17,29,41,67,110,156,167],"businesses,":[18],"from":[19,48],"smart":[20],"appliances":[21],"to":[22,39,62,101,153],"increased":[23],"in":[25,125,141],"agriculture,":[26],"health":[27],"care,":[28],"manufacturing.":[30],"These":[31],"IoT":[32,57,133],"rely":[34],"their":[36],"network":[37,73,134],"connection":[38],"send":[40],"act":[42],"data":[44],"are":[46,59,93],"acquiring":[47],"environment":[50],"around":[51],"them.":[52],"Because":[53],"this":[55],"dependency,":[56],"especially":[60],"susceptible":[61,149],"denial":[63,69],"service":[65,71],"(DoS)":[66],"distributed":[68],"(DDoS)":[72],"attacks.":[74],"In":[75],"following":[77],"research,":[78],"a":[79],"simulated":[80],"DoS":[81,154],"attack":[82],"will":[83],"be":[84,146],"performed":[85],"new":[87],"Arduino":[88],"Opl\u00e0":[89],"device.":[90],"results":[92,137],"then":[94],"fed":[95],"into":[96],"several":[97],"machine":[98],"learning":[99],"algorithms":[100],"review":[102],"predictability":[103],"for":[104],"detection":[105],"based":[106],"packet":[108,111,168],"loss":[109],"transit":[112],"time.":[113],"Results":[114],"indicated":[115],"Decision":[117],"Tree":[118],"J48":[119],"algorithm":[120],"with":[121],"5-fold":[122],"cross-validation":[123],"resulting":[124],"an":[126],"f1-score":[127],"0.848":[129],"best":[130],"predicts":[131],"attack.":[135],"show":[138],"methods":[140],"which":[142],"these":[143],"attacks":[144,162],"can":[145],"performed,":[147],"how":[148],"device":[151],"attacks,":[155],"adverse":[158],"effects":[159],"that":[160],"have":[163],"response":[165],"time":[166],"loss.":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313315848","counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-21T12:49:38.601440","created_date":"2023-01-06"}