{"id":"https://openalex.org/W4413679258","doi":"https://doi.org/10.1109/csr64739.2025.11130026","title":"Towards DoS Attack Detection for IoT Systems: A Cross-Layer Oriented Approach Based on Machine Learning Techniques","display_name":"Towards DoS Attack Detection for IoT Systems: A Cross-Layer Oriented Approach Based on Machine Learning Techniques","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679258","doi":"https://doi.org/10.1109/csr64739.2025.11130026"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119437377","display_name":"Dimitrios Tasiopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Dimitrios Tasiopoulos","raw_affiliation_strings":["University of Thessaly,Department of Digital Systems,Larissa,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Digital Systems,Larissa,Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057885963","display_name":"Apostolos Xenakis","orcid":"https://orcid.org/0000-0002-7300-7380"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Apostolos Xenakis","raw_affiliation_strings":["University of Thessaly,Department of Digital Systems,Larissa,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Digital Systems,Larissa,Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076338496","display_name":"Alexios Lekidis","orcid":"https://orcid.org/0000-0002-8243-7075"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Alexios Lekidis","raw_affiliation_strings":["University of Thessaly,Department of Energy Systems,Larissa,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Energy Systems,Larissa,Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062791654","display_name":"Dimitrios Kosmanos","orcid":"https://orcid.org/0000-0001-9677-8594"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dimitrios Kosmanos","raw_affiliation_strings":["University of Thessaly,Department of Digital Systems,Larissa,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Digital Systems,Larissa,Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082227059","display_name":"Costas Chaikalis","orcid":"https://orcid.org/0000-0002-3761-5178"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Costas Chaikalis","raw_affiliation_strings":["University of Thessaly,Department of Digital Systems,Larissa,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Digital Systems,Larissa,Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070633338","display_name":"Vasileios Vlachos","orcid":"https://orcid.org/0000-0003-3151-682X"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasileios Vlachos","raw_affiliation_strings":["University of Thessaly,Department of Economics,Volos,Greece"],"affiliations":[{"raw_affiliation_string":"University of Thessaly,Department of Economics,Volos,Greece","institution_ids":["https://openalex.org/I145722265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5119437377"],"corresponding_institution_ids":["https://openalex.org/I145722265"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3005478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9179999828338623,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7562294006347656},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.669515073299408},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5840626955032349},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.4268541634082794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3595731854438782},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.27185481786727905},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20695385336875916},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.06952112913131714}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7562294006347656},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.669515073299408},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5840626955032349},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.4268541634082794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3595731854438782},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.27185481786727905},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20695385336875916},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.06952112913131714},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":67,"referenced_works":["https://openalex.org/W1587417959","https://openalex.org/W2025590274","https://openalex.org/W2896726339","https://openalex.org/W2965236767","https://openalex.org/W2991140181","https://openalex.org/W3007510133","https://openalex.org/W3017236471","https://openalex.org/W3046981164","https://openalex.org/W3047322466","https://openalex.org/W3088582808","https://openalex.org/W3092415487","https://openalex.org/W3093884144","https://openalex.org/W3112856665","https://openalex.org/W3116933921","https://openalex.org/W3117648698","https://openalex.org/W3120254830","https://openalex.org/W3121373143","https://openalex.org/W3123096735","https://openalex.org/W3133583991","https://openalex.org/W3162639575","https://openalex.org/W3186748362","https://openalex.org/W3194453829","https://openalex.org/W3198281410","https://openalex.org/W4205660274","https://openalex.org/W4206126024","https://openalex.org/W4206420101","https://openalex.org/W4212944369","https://openalex.org/W4220849747","https://openalex.org/W4221043374","https://openalex.org/W4223894309","https://openalex.org/W4245920785","https://openalex.org/W4293733616","https://openalex.org/W4295136063","https://openalex.org/W4295927236","https://openalex.org/W4312327787","https://openalex.org/W4312390262","https://openalex.org/W4312699873","https://openalex.org/W4313315028","https://openalex.org/W4313338979","https://openalex.org/W4320717878","https://openalex.org/W4352976815","https://openalex.org/W4362499341","https://openalex.org/W4364295496","https://openalex.org/W4378977275","https://openalex.org/W4383113368","https://openalex.org/W4385729657","https://openalex.org/W4385768289","https://openalex.org/W4386243247","https://openalex.org/W4387870116","https://openalex.org/W4388193444","https://openalex.org/W4388207102","https://openalex.org/W4390190112","https://openalex.org/W4390643483","https://openalex.org/W4392175490","https://openalex.org/W4392350409","https://openalex.org/W4392976453","https://openalex.org/W4393951160","https://openalex.org/W4394711613","https://openalex.org/W4396529278","https://openalex.org/W4396908479","https://openalex.org/W4399120183","https://openalex.org/W4399563440","https://openalex.org/W4399881249","https://openalex.org/W4400228983","https://openalex.org/W4400270701","https://openalex.org/W4400911012","https://openalex.org/W4401436749"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2504933265","https://openalex.org/W2216035532","https://openalex.org/W1585302186","https://openalex.org/W2181429049"],"abstract_inverted_index":{"The":[0,46],"rapid":[1],"expansion":[2],"of":[3,5,20,48,61,78,136],"Internet":[4],"Things":[6],"(IoT)":[7],"systems":[8],"has":[9],"expanded":[10],"the":[11,17,29,39,59,76],"threat":[12],"surface":[13],"as":[14,16],"well":[15],"increased":[18],"likelihood":[19],"cyber-attacks":[21],"that":[22,114],"can":[23],"result":[24],"in":[25,28,71,157],"Denial-of-Service":[26],"(DoS)":[27],"system":[30],"operation.":[31],"Prominent":[32],"attacks":[33,50],"leading":[34],"to":[35,38,83,147],"DoS":[36],"belong":[37],"blackhole,":[40],"flooding,":[41],"sinkhole,":[42],"and":[43,64,87,124],"spoofing":[44],"categories.":[45],"detection":[47,66,86,92,145],"these":[49],"though":[51],"still":[52],"remains":[53],"a":[54],"great":[55],"challenge,":[56],"which":[57],"necessitates":[58],"presence":[60],"more":[62,143],"accurate":[63],"robust":[65,144],"methods.":[67],"To":[68],"this":[69,72],"end,":[70],"paper":[73],"we":[74,101],"investigate":[75],"use":[77],"Machine":[79],"Learning":[80],"(ML)":[81],"models":[82],"perform":[84],"cross-layer":[85,137,151],"compare":[88],"them":[89],"with":[90,139],"singlelayer":[91],"approaches":[93],"across":[94,109],"several":[95],"IoT":[96,159],"systems.":[97],"In":[98],"our":[99],"analysis,":[100],"evaluate":[102],"performance":[103],"metrics":[104],"(accuracy,":[105],"precision,":[106],"recall,":[107],"F1-score)":[108],"all":[110,126],"attacks.":[111],"Results":[112],"reveal":[113],"crosslayer":[115],"methodologies":[116],"consistently":[117],"outperform":[118],"single-layer":[119,148],"detection,":[120],"achieving":[121],"higher":[122],"accuracy":[123],"almost":[125],"cases":[127],"lower":[128],"variability.":[129],"Additionally,":[130],"feature":[131],"selection":[132],"is":[133],"another":[134],"advantage":[135],"methodologies,":[138],"multi-layered":[140],"datasets":[141],"enabling":[142],"compared":[146],"approaches.":[149],"Hence,":[150],"frameworks":[152],"overall":[153],"allow":[154],"enhancing":[155],"security":[156],"multi-threat":[158],"environments.":[160]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
