Abstract
IoT is a diversified technology which have large scalability integrating hardware and software components. IoT comprises of protocols that are light weight, sensors which are attached to field components and finally software that integrates all the above. These light weight protocols are prone to have many security issues which among one is MQTT protocol that operates with client/server architecture. Our work focuses on showcasing the poor impact of security measures on the protocol by attacking MQTT brokers which act like servers. We have performed intrusion and denial of service attack on publicly available MQTT test brokers to obtain sensitive information and validate it’s security implications. We also have mentioned our observations in machine learning built random forest algorithm to detect the attack logs and the reasons to shift for a forensic approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Butun, I., Österberg, P., Song, H.: Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 22(1), 616–644 (2019)
Yassein, M.B., et al.: Internet of things: survey and open issues of MQTT protocol. In: 2017 International Conference on Engineering & MIS (ICEMIS). IEEE (2017)
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE (2017)
Rahman, A., et al.: A lightweight multi-tier S-MQTT framework to secure communication between low-end IoT nodes. In: 2018 5th International Conference on Networking, Systems and Security (NSysS). IEEE (2018)
Cruz-Piris, L., et al.: Access control mechanism for IoT environments based on modelling communication procedures as resources. Sensors 18(3), 917 (2018)
Palmieri, A., et al.: MQTTSA: a tool for automatically assisting the secure deployments of MQTT brokers. In: 2019 IEEE World Congress on Services (SERVICES), vol. 2642. IEEE (2019)
Dinculeană, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol used between IoT devices. Appl. Sci. 9(5), 848 (2019)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Haripriya, A.P., Kulothungan, K.: Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–15 (2019). https://doi.org/10.1186/s13638-019-1402-8
Alaiz-Moreton, H., et al.: Multiclass classification procedure for detecting attacks on MQTT-IoT protocol. Complexity (2019)
Shah, A., Rajdev, P., Kotak, J.: Memory Forensic Analysis of MQTT Devices. arXiv preprint arXiv:1908.07835 (2019)
Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India (2019)
Avast Blog. https://blog.avast.com/mqtt-vulnerabilities-hacking-smart-home
Rondeau, C.M., Temple, M.A., Lopez, J.: Industrial IoT cross-layer forensic investigation. Wiley Interdisc. Rev. Forensic Sci. 1(1), e1322 (2019)
Meidan, Y., et al.: ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing (2017)
Understanding Random Forest. https://towardsdatascience.com/understanding-random-forest-58381e0602d2
Perrone, G., et al.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of IoT devices. In: IoTBDS (2017)
Available MQTT Brokers. https://github.com/mqtt/mqtt.github.io/wiki/public_brokers
Bali, R.S., Jaafar, F., Zavarasky, P.: Lightweight authentication for MQTT to improve the security of IoT communication. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (2019)
Paul, S., Sarath, T.V.: End to end IoT based hazard monitoring system. In: 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE (2018)
Sharad, S., Sivakumar, P.B., Narayanan, V.A.: The smart bus for a smart city–a real-time implementation. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE (2016)
[mqtt-v5.0]. https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html
Servida, F., Casey, E.: IoT forensic challenges and opportunities for digital traces. Digit. Investig. 28, S22–S29 (2019)
Halabi, T., Bellaiche, M.: How to evaluate the defense against dos and DDoS attacks in cloud computing: a survey and taxonomy. Int. J. Comput. Sci. Inf. Secur. 14(12), 1 (2016)
Testing the scalability and load behaviour of MQTT environments. https://github.com/etactica/mqtt-malaria
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chunduri, N.V.H., Mohan, A.K. (2021). A Forensic Analysis on the Availability of MQTT Network Traffic. In: Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., Fan, CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore. https://doi.org/10.1007/978-981-16-0422-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-16-0422-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0421-8
Online ISBN: 978-981-16-0422-5
eBook Packages: Computer ScienceComputer Science (R0)