A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport

被引:10
作者
Michelena, Alvaro [1 ]
Aveleira-Mata, Jose [2 ]
Jove, Esteban [1 ]
Bayon-Gutierrez, Martin [3 ]
Novais, Paulo [4 ]
Romero, Oscar Fontenla [5 ]
Calvo-Rolle, Jose Luis [1 ]
Alaiz-Moreton, Hector [2 ]
机构
[1] Univ A Coruna, Dept Ind Engn, CTC, CITIC, La Coruna, Spain
[2] Univ Leon, RIASC Res Inst Appl Sci Cybersecur, Leon, Spain
[3] Univ Leon, Dept Elect & Syst Engn, Leon, Spain
[4] Univ Minho, ALGORITMI Ctr, Dept Informat, Braga, Portugal
[5] Univ A Coruna, CITIC Res & Dev Lab Artificial Intelligence LIDIA, La Coruna, Spain
关键词
artificial neural networks; cybersecurity; decision trees; intrusion detection system; K-nearest-neighbours; man-in-the-middle; message queuing telemetry transport; principal component analysis; random forest; MACHINE LEARNING TECHNIQUES; NETWORKS;
D O I
10.1111/exsy.13263
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work, an intrusion detection system (IDS), where intelligent models can be deployed, is the approach to detect this type of attack considering network alterations. Therefore, this paper presents a novel method to develop the intelligent model used by the IDS, being this method based on a hybrid process. The first stage of the process implements a feature extraction method, while the second one applies different supervised classification techniques, both over a message queuing telemetry transport (MQTT) dataset compiled by authors in previous works. The contribution shows excellent performance for any compared classification methods. Likewise, the best results are obtained using the method with the highest computational cost. Thanks to this, a functional IDS will be able to prevent MQTT attacks.
引用
收藏
页数:15
相关论文
共 54 条
  • [1] Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset
    Abdalgawad, N.
    Sajun, A.
    Kaddoura, Y.
    Zualkernan, I. A.
    Aloul, F.
    [J]. IEEE ACCESS, 2022, 10 : 6430 - 6441
  • [2] Al Enany Marwa O., 2021, 2021 International Conference on Electronic Engineering (ICEEM), DOI 10.1109/ICEEM52022.2021.9480384
  • [3] Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol
    Alaiz-Moreton, Hector
    Aveleira-Mata, Jose
    Ondicol-Garcia, Jorge
    Luis Munoz-Castaneda, Angel
    Garcia, Isaias
    Benavides, Carmen
    [J]. COMPLEXITY, 2019, 2019
  • [4] Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways
    Ashraf, Suleman
    Shawon, Mohammad H.
    Khalid, Haris M.
    Muyeen, S. M.
    [J]. SENSORS, 2021, 21 (19)
  • [5] IDS prototype for intrusion detection with machine learning models in IoT systems of the Industry 4.0
    Aveleira-Mata, Jose
    Luis Munoz-Castaneda, Angel
    Teresa Garcia-Ordas, Maria
    Benavides-Cuellar, Carmen
    Alberto Benitez-Andrades, Jose
    Alaiz-Moreton, Hector
    [J]. DYNA, 2021, 96 (03): : 270 - 275
  • [6] Supervised machine learning techniques for the classification of metabolic disorders in newborns
    Baumgartner, C
    Böhm, C
    Baumgartner, D
    Marini, G
    Weinberger, K
    Olgemöller, B
    Liebl, B
    Roscher, AA
    [J]. BIOINFORMATICS, 2004, 20 (17) : 2985 - 2996
  • [7] Bishop C.M., 2006, Pattern Recognition and Machine Learning (Information Science and Statistics), VVolume 4
  • [8] The use of the area under the roc curve in the evaluation of machine learning algorithms
    Bradley, AP
    [J]. PATTERN RECOGNITION, 1997, 30 (07) : 1145 - 1159
  • [9] Cekerevac Z., 2017, MEST Journal, V5, P15
  • [10] Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
    Chatzoglou, Efstratios
    Kambourakis, Georgios
    Kolias, Constantinos
    [J]. IEEE ACCESS, 2021, 9 : 34188 - 34205