Skip to main content

Denial of Service Attack Detection Based on Feature Extraction and Supervised Techniques

  • Conference paper
  • First Online:
Distributed Computing and Artificial Intelligence, Special Sessions, 19th International Conference (DCAI 2022)

Abstract

Internet of Things systems (IoT) is expanding exponentially, providing expanded services in different environments. The wide variety of these systems makes security an increasingly important challenge, several Malware, such as Mirai or Dark Nexus, demonstrate an increase in attacks based on IoT. One of the most used protocols in the application layer is the Message Queuing Telemetry Transport (MQTT), these systems can be attacked by Denial of Service attacks. This paper presents a framework for detecting MQTT protocol attacks based on automatic learning, using a dataset formed by all the network traffic generated in an environment that uses an IoT system with the MQTT protocol on which several DoS attacks are performed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. MQTT Dataset LE-229-18 (2019). https://joseaveleira.es/dataset

  2. Aversano, L., Bernardi, M.L., Cimitile, M., Pecori, R.: A systematic review on Deep Learning approaches for IoT security (2021)

    Google Scholar 

  3. Casado-Vara, R., Sittón-Candanedo, I., la Prieta, F.D., Rodríguez, S., Calvo-Rolle, J.L., Venayagamoorthy, G.K., Vega, P., Prieto, J.: Edge computing and adaptive fault-tolerant tracking control algorithm for smart buildings: a case study. Cybernet. Syst. 51(7), 685–697 (2020)

    Google Scholar 

  4. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    Article  Google Scholar 

  5. Fernandez-Serantes, L.A., Casteleiro-Roca, J.L., Berger, H., Calvo-Rolle, J.L.: Hybrid intelligent system for a synchronous rectifier converter control and soft switching ensurement. Eng. Sci. Technol. Int. J. 101189 (2022)

    Google Scholar 

  6. Fernandez-Serantes, L.A., Casteleiro-Roca, J.L., Calvo-Rolle, J.L.: Hybrid intelligent system for a half-bridge converter control and soft switching ensurement. Revista Iberoamericana de Automática e Informática industrial (2022)

    Google Scholar 

  7. García-Ordás, M.T., Alaiz-Moretón, H., Casteleiro-Roca, J.L., Jove, E., Benítez-Andrades, J.A., García-Rodríguez, I., Quintián, H., Calvo-Rolle, J.L.: Clustering techniques selection for a hybrid regression model: a case study based on a solar thermal system. Cybernet. Syst. 0(0), 1–20 (2022)

    Google Scholar 

  8. Gonzalez-Cava, J.M., Arnay, R., Mendez-Perez, J.A., León, A., Martín, M., Reboso, J.A., Jove-Perez, E., Calvo-Rolle, J.L.: Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery. Log. J. IGPL 29(2), 236–250 (2020)

    Article  MathSciNet  Google Scholar 

  9. Hamza, A., Gharakheili, H.H., Benson, T.A., Sivaraman, V.: Detecting volumetric attacks on IoT devices via SDN-based monitoring of MUD activity. In: SOSR 2019 - Proceedings of the 2019 ACM Symposium on SDN Research, pp. 36–48. Association for Computing Machinery, Inc (2019)

    Google Scholar 

  10. Jove, E., Casteleiro-Roca, J.L., Casado-Vara, R., Quintián, H., Pérez, J.A.M., Mohamad, M.S., Calvo-Rolle, J.L.: Comparative study of one-class based anomaly detection techniques for a bicomponent mixing machine monitoring. Cybernet. Syst. 51(7), 649–667 (2020)

    Google Scholar 

  11. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: A new method for anomaly detection based on non-convex boundaries with random two-dimensional projections. Inf. Fusion 65, 50–57 (2021)

    Google Scholar 

  12. Jove, E., Gonzalez-Cava, J.M., Casteleiro-Roca, J.L., Quintián, H., Méndez Pérez, J.A., Vega Vega, R., Zayas-Gato, F., de Cos Juez, F.J., León, A., MartÍn, M., Reboso, J.A., Wozniak, M., Luis Calvo-Rolle, J.: Hybrid intelligent model to predict the remifentanil infusion rate in patients under general anesthesia. Logic J. IGPL 29(2), 193–206 (2020)

    Google Scholar 

  13. Khalid, M.H., Murtaza, M., Habbal, M.: Study of security and privacy issues in internet of things. In: 2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA), pp. 1–5. IEEE (2020)

    Google Scholar 

  14. Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Commun. Surveys Tutor. 18(1), 184–208 (2016)

    Google Scholar 

  15. Leira, A., Jove, E., Gonzalez-Cava, J.M., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Álvarez, S.T., Simic, S., Méndez-Pérez, J.A., Luis Calvo-Rolle, J.: One-class-based intelligent classifier for detecting anomalous situations during the anesthetic process. Log. J, IGPL (2020)

    Google Scholar 

  16. Liu, J., Kantarci, B., Adams, C.: Machine learning-driven intrusion detection for contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning. ACM, New York, NY, USA (2020)

    Google Scholar 

  17. Pearson, K.: Liii. on lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magaz. J. Sci. 2(11), 559–572 (1901)

    Google Scholar 

  18. Wilson, D.R.: Towards effective wireless intrusion detection using AWID dataset. Theses (2021)

    Google Scholar 

Download references

Acknowledgements

Spanish National Cybersecurity Institute (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC).

CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Álvaro Michelana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Michelana, Á., Aveleira-Mata, J., Jove, E., Alaiz-Moretón, H., Quintián, H., Calvo-Rolle, J.L. (2023). Denial of Service Attack Detection Based on Feature Extraction and Supervised Techniques. In: Machado, J.M., et al. Distributed Computing and Artificial Intelligence, Special Sessions, 19th International Conference. DCAI 2022. Lecture Notes in Networks and Systems, vol 585. Springer, Cham. https://doi.org/10.1007/978-3-031-23210-7_6

Download citation

Publish with us

Policies and ethics