Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol

被引:78
作者
Alaiz-Moreton, Hector [1 ]
Aveleira-Mata, Jose [2 ]
Ondicol-Garcia, Jorge [2 ]
Luis Munoz-Castaneda, Angel [2 ]
Garcia, Isaias [1 ]
Benavides, Carmen [1 ]
机构
[1] Univ Leon, Escuela Ingn, E-24071 Leon, Spain
[2] Univ Leon, Res Inst Appl Sci Cybersecur RIASC MIC, E-24071 Leon, Spain
关键词
Internet of things;
D O I
10.1155/2019/6516253
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems (IDS) are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection Systems (IDS) can be improved through machine learning techniques. Our work focuses on creating classification models that can feed an IDS using a dataset containing frames under attacks of an IoT system that uses the MQTT protocol. We have addressed two types of method for classifying the attacks, ensemble methods and deep learning models, more specifically recurrent networks with very satisfactory results.
引用
收藏
页数:11
相关论文
共 49 条
  • [1] NOISY MATRIX DECOMPOSITION VIA CONVEX RELAXATION: OPTIMAL RATES IN HIGH DIMENSIONS
    Agarwal, Alekh
    Negahban, Sahand
    Wainwright, Martin J.
    [J]. ANNALS OF STATISTICS, 2012, 40 (02) : 1171 - 1197
  • [2] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
    Ahmadi, Mansour
    Ulyanov, Dmitry
    Semenov, Stanislav
    Trofimov, Mikhail
    Giacinto, Giorgio
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
  • [3] Aminanto ME, 2017, 2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), P99, DOI 10.1109/IWBIS.2017.8275109
  • [4] AN X, 2018, COMPUTING, V2018, DOI DOI 10.1155/2018/7472095
  • [5] Andy S., 2017, P 4 INT C EL ENG COM, P19
  • [6] [Anonymous], 2014, INTERNET THINGS WORL
  • [7] Fuzziness based semi-supervised learning approach for intrusion detection system
    Ashfaq, Rana Aamir Raza
    Wang, Xi-Zhao
    Huang, Joshua Zhexue
    Abbas, Haider
    He, Yu-Lin
    [J]. INFORMATION SCIENCES, 2017, 378 : 484 - 497
  • [8] Barradas D, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P169
  • [9] Effects of cyber security knowledge on attack detection
    Ben-Asher, Noam
    Gonzalez, Cleotilde
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 : 51 - 61
  • [10] Bhuyan MH, 2015, INTERNATIONAL JOURNA, V17, P683