Abstract
Building detection systems based on anomalies to identify and mitigate DDoS attacks enables networks, such as IoT, to operate securely and robustly, preventing damage to the services offered in this environment. Using tools such as Docker and Kubernetes, it is feasible to emulate IoT networks in virtual environments segregated from the network environments used by companies, allowing expe…