{"id":"https://openalex.org/W4411010492","doi":"https://doi.org/10.1145/3714393.3726004","title":"IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems","display_name":"IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4411010492","doi":"https://doi.org/10.1145/3714393.3726004"},"language":"en","primary_location":{"id":"doi:10.1145/3714393.3726004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726004","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726004","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726004","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100334307","display_name":"Hyunwoo Lee","orcid":"https://orcid.org/0000-0001-7490-9936"},"institutions":[{"id":"https://openalex.org/I4210127102","display_name":"Korea Institute of Energy Research","ror":"https://ror.org/0298pes53","country_code":"KR","type":"facility","lineage":["https://openalex.org/I2801339556","https://openalex.org/I4210127102","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyunwoo Lee","raw_affiliation_strings":["Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea","institution_ids":["https://openalex.org/I4210127102"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054016248","display_name":"Charalampos Katsis","orcid":"https://orcid.org/0000-0002-1876-8478"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charalampos Katsis","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026386385","display_name":"Abdelhadi Lotfi","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alireza Lotfi","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Taejun Choi","orcid":"https://orcid.org/0009-0000-7685-1731"},"institutions":[{"id":"https://openalex.org/I4210127102","display_name":"Korea Institute of Energy Research","ror":"https://ror.org/0298pes53","country_code":"KR","type":"facility","lineage":["https://openalex.org/I2801339556","https://openalex.org/I4210127102","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taejun Choi","raw_affiliation_strings":["Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea","institution_ids":["https://openalex.org/I4210127102"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Soeun Kim","orcid":"https://orcid.org/0009-0008-6809-410X"},"institutions":[{"id":"https://openalex.org/I4210127102","display_name":"Korea Institute of Energy Research","ror":"https://ror.org/0298pes53","country_code":"KR","type":"facility","lineage":["https://openalex.org/I2801339556","https://openalex.org/I4210127102","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soeun Kim","raw_affiliation_strings":["Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Korea Institute of Energy Technology, Naju, Republic of Korea","institution_ids":["https://openalex.org/I4210127102"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032325271","display_name":"Ashish Kundu","orcid":"https://orcid.org/0000-0003-1499-5558"},"institutions":[{"id":"https://openalex.org/I2801562743","display_name":"Cisco College","ror":"https://ror.org/03gc7jk79","country_code":"US","type":"education","lineage":["https://openalex.org/I2801562743"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashish Kundu","raw_affiliation_strings":["Cisco Research, Cisco, San Jose, CA, USA"],"affiliations":[{"raw_affiliation_string":"Cisco Research, Cisco, San Jose, CA, USA","institution_ids":["https://openalex.org/I2801562743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100334307"],"corresponding_institution_ids":["https://openalex.org/I4210127102"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35341749,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"413","last_page":"418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7834422588348389},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7602693438529968},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7160014510154724},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.42015576362609863},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3775337338447571}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7834422588348389},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7602693438529968},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7160014510154724},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.42015576362609863},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3775337338447571}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3714393.3726004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726004","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726004","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3714393.3726004","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3714393.3726004","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3714393.3726004","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G486605795","display_name":null,"funder_award_id":"211247","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6360409883","display_name":null,"funder_award_id":"2229876","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7527368801","display_name":null,"funder_award_id":"2112471 and 2229876","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411010492.pdf","grobid_xml":"https://content.openalex.org/works/W4411010492.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2586432806","https://openalex.org/W2752929869","https://openalex.org/W2960507082","https://openalex.org/W2963748489","https://openalex.org/W3022604549","https://openalex.org/W3164964481","https://openalex.org/W3207891930","https://openalex.org/W3209498073","https://openalex.org/W4239578735","https://openalex.org/W4372267129"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W1513478798","https://openalex.org/W4300599821"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"systems":[2],"(IDSes)":[3],"are":[4,19],"critical":[5],"building":[6],"blocks":[7],"for":[8,45,52,68,140],"securing":[9],"Internet-of-Things":[10],"(IoT)":[11],"devices":[12],"and":[13,82,101,128,143,153,172],"networks.":[14,56],"Advances":[15],"in":[16,54],"AI":[17],"techniques":[18,118],"contributing":[20],"to":[21,76],"enhancing":[22],"the":[23,46,69,94,109,111,114,137,148],"efficiency":[24],"of":[25,38,49,72,151,164,169,175],"IDSes,":[26],"but":[27],"their":[28],"performance":[29],"typically":[30],"depends":[31],"on":[32,108,119,161],"high-quality":[33],"training":[34],"datasets.":[35,132,145],"The":[36],"scarcity":[37],"such":[39,59],"datasets":[40,74,156],"is":[41],"a":[42,60,66,86,98],"major":[43],"concern":[44],"effective":[47],"use":[48],"machine":[50],"learning":[51],"IDSes":[53],"IoT":[55,165,176],"To":[57],"address":[58],"need,":[61],"we":[62],"present":[63],"IoTDSCreator":[64,84,134,152],"-":[65],"tool":[67],"automatic":[70],"generation":[71],"labeled":[73,131,142],"able":[75],"support":[77],"various":[78],"devices,":[79,166],"connectivity":[80],"technologies,":[81],"attacks.":[83],"provides":[85],"user":[87,95],"with":[88,157],"DC-API,":[89],"an":[90,102],"API":[91],"by":[92],"which":[93],"can":[96],"describe":[97],"target":[99],"network":[100],"attack":[103],"scenario":[104],"against":[105],"it.":[106],"Based":[107],"description,":[110],"framework":[112],"configures":[113],"network,":[115],"leveraging":[116],"virtualization":[117],"user-provided":[120],"physical":[121],"machines,":[122],"performs":[123],"single":[124],"or":[125],"multi-step":[126],"attacks,":[127],"finally":[129],"returns":[130],"Thereby,":[133],"dramatically":[135],"reduces":[136],"manual":[138],"effort":[139],"generating":[141],"diverse":[144],"We":[146],"release":[147],"source":[149],"code":[150],"16":[154],"generated":[155],"193":[158],"features":[159],"based":[160],"26":[162],"types":[163,168,174],"2":[167],"communication":[170],"links,":[171],"15":[173],"applications.":[177]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
