{"id":"https://openalex.org/W4413640441","doi":"https://doi.org/10.1109/csr64739.2025.11130003","title":"Machine-Learning Anomaly Detection for Early Identification of DDoS in Smart Home IoT Devices","display_name":"Machine-Learning Anomaly Detection for Early Identification of DDoS in Smart Home IoT Devices","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413640441","doi":"https://doi.org/10.1109/csr64739.2025.11130003"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://openaccess.city.ac.uk/id/eprint/35009/8/440684730_roland_lamptey_Camera_Ready-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034160190","display_name":"Roland Lamptey","orcid":null},"institutions":[{"id":"https://openalex.org/I165862685","display_name":"St George's, University of London","ror":"https://ror.org/040f08y74","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I165862685"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Roland Lamptey","raw_affiliation_strings":["City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom","institution_ids":["https://openalex.org/I165862685"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026767634","display_name":"Mohammad Saedi","orcid":"https://orcid.org/0000-0001-6436-1057"},"institutions":[{"id":"https://openalex.org/I165862685","display_name":"St George's, University of London","ror":"https://ror.org/040f08y74","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I165862685"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammad Saedi","raw_affiliation_strings":["City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom","institution_ids":["https://openalex.org/I165862685"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048091865","display_name":"Vladimir Stankovi\u0107","orcid":"https://orcid.org/0000-0002-1075-2420"},"institutions":[{"id":"https://openalex.org/I165862685","display_name":"St George's, University of London","ror":"https://ror.org/040f08y74","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I165862685"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vladimir Stankovic","raw_affiliation_strings":["City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"City St George&#x2019;s, University of London,Department of Computer Science,London,United Kingdom","institution_ids":["https://openalex.org/I165862685"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034160190"],"corresponding_institution_ids":["https://openalex.org/I165862685"],"apc_list":null,"apc_paid":null,"fwci":4.441,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9496411,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8641999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8641999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7809034585952759},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7779654264450073},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7055820226669312},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6228198409080505},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.600918173789978},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4346180856227875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3579615354537964},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3251521587371826},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16522133350372314},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10066065192222595}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7809034585952759},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7779654264450073},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7055820226669312},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6228198409080505},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.600918173789978},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4346180856227875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3579615354537964},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3251521587371826},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16522133350372314},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10066065192222595},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr64739.2025.11130003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:openaccess.city.ac.uk:35009","is_oa":true,"landing_page_url":"https://openaccess.city.ac.uk/view/creators_id/vladimir=2Estankovic=2E1.html>","pdf_url":"https://openaccess.city.ac.uk/id/eprint/35009/8/440684730_roland_lamptey_Camera_Ready-4.pdf","source":{"id":"https://openalex.org/S4306401940","display_name":"City Research Online (City University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I180825142","host_organization_name":"City, University of London","host_organization_lineage":["https://openalex.org/I180825142"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:openaccess.city.ac.uk:35009","is_oa":true,"landing_page_url":"https://openaccess.city.ac.uk/view/creators_id/vladimir=2Estankovic=2E1.html>","pdf_url":"https://openaccess.city.ac.uk/id/eprint/35009/8/440684730_roland_lamptey_Camera_Ready-4.pdf","source":{"id":"https://openalex.org/S4306401940","display_name":"City Research Online (City University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I180825142","host_organization_name":"City, University of London","host_organization_lineage":["https://openalex.org/I180825142"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413640441.pdf","grobid_xml":"https://content.openalex.org/works/W4413640441.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W2278186031","https://openalex.org/W2733765803","https://openalex.org/W2797742547","https://openalex.org/W2890686092","https://openalex.org/W3026792667","https://openalex.org/W3038507396","https://openalex.org/W3122529337","https://openalex.org/W3154485088","https://openalex.org/W3216442403","https://openalex.org/W4210579600","https://openalex.org/W4361019982","https://openalex.org/W4379115384","https://openalex.org/W4381744898","https://openalex.org/W4389371738","https://openalex.org/W4393973698","https://openalex.org/W4403022629","https://openalex.org/W4404035300"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"The":[0],"rapid":[1],"adoption":[2],"of":[3,5,19,31],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"in":[9,58,138],"smart":[10,59,147],"homes":[11],"has":[12],"introduced":[13],"security":[14],"vulnerabilities,":[15],"with":[16,111],"Distributed":[17],"Denial":[18],"Service":[20],"(DDoS)":[21],"emerging":[22],"as":[23],"a":[24,48,66,130,142],"critical":[25],"threat.":[26],"Exploiting":[27],"the":[28,122],"often-unsecured":[29],"nature":[30],"these":[32],"interconnected":[33],"devices,":[34],"such":[35],"attacks":[36],"overwhelm":[37],"network":[38,69],"resources,":[39],"causing":[40],"severe":[41],"disruptions":[42],"and":[43,75,84,102,132],"privacy":[44],"breaches.":[45],"We":[46,128],"present":[47],"novel":[49],"anomaly":[50],"detection":[51],"system":[52],"for":[53,118,135],"early-stage":[54],"DDoS":[55],"attack":[56],"identification":[57],"home":[60,148],"IoT":[61,68,140],"environments.":[62],"Using":[63],"NS-3":[64],"simulator,":[65],"realistic":[67],"dataset":[70],"was":[71],"generated,":[72],"capturing":[73],"normal":[74],"malicious":[76],"traffic.":[77],"Key":[78],"traffic":[79],"features,":[80],"e.g.,":[81],"packet":[82],"size":[83],"inter-arrival":[85],"times,":[86],"were":[87],"extracted":[88],"to":[89,115,145],"train":[90],"two":[91],"lightweight":[92,131],"Machine":[93,100],"Learning":[94],"(ML)":[95],"models:":[96],"One-Class":[97],"Support":[98],"Vector":[99],"(OCSVM)":[101],"Isolation":[103],"Forest":[104],"(IF).":[105],"OCSVM":[106],"model":[107,124],"achieved":[108],"superior":[109],"performance":[110],"accuracies":[112],"from":[113],"96%":[114],"$99":[116],"\\%$":[117],"various":[119],"attacks,":[120],"while":[121],"IF":[123],"performed":[125],"marginally":[126],"worse.":[127],"offer":[129],"scalable":[133],"solution":[134],"real-time":[136],"deployment":[137],"resource-constrained":[139],"environments,":[141],"significant":[143],"step":[144],"enhance":[146],"security.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
