Skip to main content

A Forensic Analysis on the Availability of MQTT Network Traffic

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2020)

Abstract

IoT is a diversified technology which have large scalability integrating hardware and software components. IoT comprises of protocols that are light weight, sensors which are attached to field components and finally software that integrates all the above. These light weight protocols are prone to have many security issues which among one is MQTT protocol that operates with client/server architecture. Our work focuses on showcasing the poor impact of security measures on the protocol by attacking MQTT brokers which act like servers. We have performed intrusion and denial of service attack on publicly available MQTT test brokers to obtain sensitive information and validate it’s security implications. We also have mentioned our observations in machine learning built random forest algorithm to detect the attack logs and the reasons to shift for a forensic approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Butun, I., Österberg, P., Song, H.: Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 22(1), 616–644 (2019)

    Article  Google Scholar 

  2. Yassein, M.B., et al.: Internet of things: survey and open issues of MQTT protocol. In: 2017 International Conference on Engineering & MIS (ICEMIS). IEEE (2017)

    Google Scholar 

  3. Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE (2017)

    Google Scholar 

  4. Rahman, A., et al.: A lightweight multi-tier S-MQTT framework to secure communication between low-end IoT nodes. In: 2018 5th International Conference on Networking, Systems and Security (NSysS). IEEE (2018)

    Google Scholar 

  5. Cruz-Piris, L., et al.: Access control mechanism for IoT environments based on modelling communication procedures as resources. Sensors 18(3), 917 (2018)

    Article  Google Scholar 

  6. Palmieri, A., et al.: MQTTSA: a tool for automatically assisting the secure deployments of MQTT brokers. In: 2019 IEEE World Congress on Services (SERVICES), vol. 2642. IEEE (2019)

    Google Scholar 

  7. Dinculeană, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol used between IoT devices. Appl. Sci. 9(5), 848 (2019)

    Article  Google Scholar 

  8. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  9. Haripriya, A.P., Kulothungan, K.: Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–15 (2019). https://doi.org/10.1186/s13638-019-1402-8

    Article  Google Scholar 

  10. Alaiz-Moreton, H., et al.: Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity (2019)

    Google Scholar 

  11. Shah, A., Rajdev, P., Kotak, J.: Memory Forensic Analysis of MQTT Devices. arXiv preprint arXiv:1908.07835 (2019)

  12. Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India (2019)

    Google Scholar 

  13. Avast Blog. https://blog.avast.com/mqtt-vulnerabilities-hacking-smart-home

  14. Rondeau, C.M., Temple, M.A., Lopez, J.: Industrial IoT cross-layer forensic investigation. Wiley Interdisc. Rev. Forensic Sci. 1(1), e1322 (2019)

    Article  Google Scholar 

  15. Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing (2017)

    Google Scholar 

  16. Understanding Random Forest. https://towardsdatascience.com/understanding-random-forest-58381e0602d2

  17. Perrone, G., et al.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of IoT devices. In: IoTBDS (2017)

    Google Scholar 

  18. Available MQTT Brokers. https://github.com/mqtt/mqtt.github.io/wiki/public_brokers

  19. Bali, R.S., Jaafar, F., Zavarasky, P.: Lightweight authentication for MQTT to improve the security of IoT communication. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (2019)

    Google Scholar 

  20. Paul, S., Sarath, T.V.: End to end IoT based hazard monitoring system. In: 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE (2018)

    Google Scholar 

  21. Sharad, S., Sivakumar, P.B., Narayanan, V.A.: The smart bus for a smart city–a real-time implementation. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE (2016)

    Google Scholar 

  22. MQTT.FX. https://mqttfx.jensd.de/index.php/download

  23. [mqtt-v5.0]. https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html

  24. Servida, F., Casey, E.: IoT forensic challenges and opportunities for digital traces. Digit. Investig. 28, S22–S29 (2019)

    Article  Google Scholar 

  25. Halabi, T., Bellaiche, M.: How to evaluate the defense against dos and DDoS attacks in cloud computing: a survey and taxonomy. Int. J. Comput. Sci. Inf. Secur. 14(12), 1 (2016)

    Google Scholar 

  26. Testing the scalability and load behaviour of MQTT environments. https://github.com/etactica/mqtt-malaria

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Naga Venkata Hrushikesh Chunduri or Ashok Kumar Mohan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chunduri, N.V.H., Mohan, A.K. (2021). A Forensic Analysis on the Availability of MQTT Network Traffic. In: Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., Fan, CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore. https://doi.org/10.1007/978-981-16-0422-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0422-5_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0421-8

  • Online ISBN: 978-981-16-0422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics