Abstract
Effective detection and mitigation of DDoS attacks directly depend on the quality of the information sources used as input for the intrusion detection systems employed. Undoubtedly, one of the best sources of information is the network traffic captured on the network interfaces of the devices under protection, especially in IoT environments. In this way, network intrusion detection system…