Skip to main content

Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach

  • Conference paper
  • First Online:
  • 504 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1400))

  • The original version of this chapter was revised: The author name “Francico Zayas-Gato” has been changed to “Francisco Zayas-Gato”. The correction to this chapter is available at https://doi.org/10.1007/978-3-030-87872-6_41

Abstract

Nowadays, Internet of things (IoT) systems add connectivity to physical and common objects offering new possibilities, this systems have special features such as the low capacity of the devices and behaviour of the protocols used. These facts make cybersecurity in this kind of systems is critical. The current work uses a dataset is based on denial of service attacks over a traffic protocol used in IoT systems, called MQTT. In order to address the classification of new denial of service attacks, one-class technique is applied, obtaining good results using the Principal Component Analysis (PCA) algorithm as complement to this method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Change history

  • 23 January 2022

    In the original version of the chapters 9 and 31, the following belated corrections have been incorporated: The author name “Francico Zayas-Gato” has been changed to “Francisco Zayas-Gato”. The correction chapters and the book have been updated with the changes.

References

  1. GitHub - moscajs/aedes: Barebone MQTT broker that can run on any stream server, the node way. https://github.com/moscajs/aedes

  2. KDD Cup 99 Dataset (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  3. Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6. IEEE (2017)

    Google Scholar 

  4. Blaauw, D., et al.: IoT design space challenges: circuits and systems. In: 2014 Symposium on VLSI Technology (VLSI-Technology): Digest of Technical Papers, pp. 1–2. IEEE (2014)

    Google Scholar 

  5. Bradley, A.P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145–1159 (1997). https://doi.org/10.1016/S0031-3203(96)00142-2

    Article  Google Scholar 

  6. Casale, P., Pujol, O., Radeva, P.: Approximate convex hulls family for one-class classification. In: Sansone, C., Kittler, J., Roli, F. (eds.) MCS 2011. LNCS, vol. 6713, pp. 106–115. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21557-5_13

    Chapter  Google Scholar 

  7. Casteleiro-Roca, J.L., Javier Barragan, A., Segura, F., Luis Calvo-Rolle, J., Manuel Andujar, J.: Intelligent hybrid system for the prediction of the voltage-current characteristic curve of a hydrogen-based fuel cell. Rev. Iberoamericana Autom. Inform. Ind. 16(4), 492–501 (2019)

    Article  Google Scholar 

  8. Casteleiro-Roca, J.L., Jove, E., Gonzalez-Cava, J.M., Pérez, J.A.M., Calvo-Rolle, J.L., Alvarez, F.B.: Hybrid model for the ANI index prediction using remifentanil drug and EMG signal. Neural Comput. Appl. 32(5), 1249–1258 (2020). https://doi.org/10.1007/s00521-018-3605-z

    Article  Google Scholar 

  9. Chen, F., Huo, Y., Zhu, J., Fan, D.: A review on the study on MQTT security challenge. Proceedings - 2020 IEEE International Conference on Smart Cloud, SmartCloud 2020, pp. 128–133 (2020). https://doi.org/10.1109/SmartCloud49737.2020.00032

  10. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

  11. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18–28 (2009). https://doi.org/10.1016/j.cose.2008.08.003

    Article  Google Scholar 

  12. Jove, E., et al.: Missing data imputation over academic records of electrical engineering students. Log. J. IGPL 28(4), 487–501 (2020)

    Article  MathSciNet  Google Scholar 

  13. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: A fault detection system based on unsupervised techniques for industrial control loops. Expert Syst. 36(4), e12395 (2019)

    Article  Google Scholar 

  14. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: Virtual sensor for fault detection, isolation and data recovery for bicomponent mixing machine monitoring. Informatica 30(4), 671–687 (2019)

    Article  Google Scholar 

  15. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: A new method for anomaly detection based on non-convex boundaries with random two-dimensional projections. Inform. Fusion 65, 50–57 (2021)

    Article  Google Scholar 

  16. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Simić, D., Méndez-Pérez, J.A., Luis Calvo-Rolle, J.: Anomaly detection based on one-class intelligent techniques over a control level plant. Log. J. IGPL 28, 502–518 (2020)

    Article  MathSciNet  Google Scholar 

  17. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Log. J. IGPL (2021)

    Google Scholar 

  18. Juwita, P.S., Fadhil, R., Damayanti, T.N., Ramadan, D.N.: Smart parking management system using SSGA MQTT and real-time database. Telkomnika (Telecommun. Comput. Electron. Control) 18(3), 1243–1251 (2020). https://doi.org/10.12928/TELKOMNIKA.v18i3.14869

  19. Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2015)

    Article  Google Scholar 

  20. Lee, J., Kao, A.: Industry 4.0 factory in big data environment. tec. News HARTING’s Technol. Newsl. 26(Industry 4.0 Factory in Big Data Environment), 8–9 (2014)

    Google Scholar 

  21. Liu, J., Kantarci, B., Adams, C.: Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: WiseML 2020 - Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, pp. 25–30 (2020). https://doi.org/10.1145/3395352.3402621

  22. Wollschlaeger, M., Sauter, T., Jasperneite, J.: The future of industrial communication. IEEE Ind. Electron. Mag. 11(4), 17–27 (2017). https://doi.org/10.1109/MIE.2017.2649104

    Article  Google Scholar 

  23. Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017 (2017)

    Google Scholar 

  24. Shalabi, L.A., Shaaban, Z.: Normalization as a preprocessing engine for data mining and the approach of preference matrix. In: 2006 International Conference on Dependability of Computer Systems, pp. 207–214, May 2006. https://doi.org/10.1109/DEPCOS-RELCOMEX.2006.38

  25. Vega Vega, R., Quintián, H., Calvo-Rolle, J.L., Herrero, Á., Corchado, E.: Gaining deep knowledge of android malware families through dimensionality reduction techniques. Log. J. IGPL 27(2), 160–176 (2019)

    Article  MathSciNet  Google Scholar 

  26. Wu, J., Zhang, X.: A PCA classifier and its application in vehicle detection. In: IJCNN 2001. International Joint Conference on Neural Networks. Proceedings (Cat. No. 01CH37222), vol. 1, pp. 600–604. IEEE (2001)

    Google Scholar 

  27. Zhang, X., Upton, O., Beebe, N.L., Choo, K.K.R.: IoT botnet forensics: a comprehensive digital forensic case study on Mirai botnet servers. Forensic Sci. Int.: Digit. Invest. 32, 300926 (2020). https://doi.org/10.1016/j.fsidi.2020.300926

    Article  Google Scholar 

Download references

Acknowledgements

Spanish National Cybersecurity Institute (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC).

CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esteban Jove .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aveleira-Mata, J. et al. (2022). Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_9

Download citation

Publish with us

Policies and ethics