Skip to main content
Log in

An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) networks are becoming increasingly popular for monitoring critical environments of various types. For the communication of IoT devices, several lightweight protocols have been developed. MQTT (message queuing telemetry transport) is a widely used messaging protocol in IoT using the publish–subscribe technique. The openness of publish–subscribe model and the limited built-in authentication capabilities makes it vulnerable to intruders. Hence, an intrusion detection system (IDS) has a vital role in MQTT-IoT security. This paper proposes an efficient intrusion detection mechanism for the MQTT-IoT networks using an enhanced chaotic salp swarm optimization algorithm (ECSSA) and LightGBM classifier. Traditional IDS uses a lot of irrelevant data and undesirable attributes, resulting in long detection times and low performance. To overcome the limitations, the proposed IDS uses ECSSA for feature selection and LightGBM classifier for better detection accuracy. The experimental verification on MC-IoT, MQTT-IoT-IDS2020, and MQTTset datasets demonstrates that ECSSA and LightGBM improve the overall accuracy rate. The proposed technique outperforms the existing approaches with an accuracy of 99.38%, 98.91%, and 98.35% in the three test sets, MC-IoT, MQTT-IoT-IDS2020, and MQTTset, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

The data that support the findings of this study are available on request from the corresponding author. The data are not publicly available due to privacy or ethical restrictions.

References

  1. Li, S., Li, X., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17, 04 (2014)

    Google Scholar 

  2. Nebbione, G., Calzarossa, M.C.: Security of IoT application layer protocols: challenges and findings. Futur. Internet 12(3), 55 (2020)

    Article  Google Scholar 

  3. Ajdani, M., Ghaffary, H.: Introduced a new method for enhancement of intrusion detection with random forest and pso algorithm. Securi. Priv. 4, 01 (2021)

    Google Scholar 

  4. Chen, F., Ye, Z., Wang, C., Yan, L., Wang, R.: A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor. 68–72 (2018)

  5. Panda, M., Patra, M.: Network intrusion detection using naive bayes. 7, 12 (2007)

  6. Amor, N.B., Salem, Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. 1, 420–424 (2004)

  7. Gu, J., Wang, L., Chung, Y., Wang, S.: A novel approach to intrusion detection using svm ensemble with feature augmentation. 06 (2019)

  8. Elbasiony, R., Sallam, E., Eltobely, T., Fahmy, M.: A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng. J. 4(12), 753–762 (2013)

    Article  Google Scholar 

  9. Ramaiah, M., Chandrasekaran, V., Ravi, V., Kumar, N.: An intrusion detection system using optimized deep neural network architecture. Trans. Emerg. Telecommun. Technol. 32, 02 (2021)

    Google Scholar 

  10. Liu, H., Lang, B., Liu, Ming, Yan, H.: Cnn and rnn based payload classification methods for attack detection. Knowledge-Based Syst. 163, 09 (2018)

    Google Scholar 

  11. Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. 1–6 (2017)

  12. Heinrich, C.: Transport layer security (TLS). Springer, Boston (2005)

    Book  Google Scholar 

  13. Perrone, G., Vecchio, M., Pecori, R., Giaffreda, R.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of iot devices. In IoTBDS, (2017)

  14. Syed, N.F., Baig, Z., Ibrahim, A., Valli, C.: Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 4(4), 482–503 (2020)

    Google Scholar 

  15. Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-iot). Computing 101(7), 791–818 (2019)

    Article  MathSciNet  Google Scholar 

  16. Haripriya, A.P., Kanagasabai, K.: Secure-mqtt: an efficient fuzzy logic-based approach to detect dos attack in mqtt protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019, 04 (2019)

    Google Scholar 

  17. Zahra, S.R., Chishti, M.A.: Fuzzy logic and fog based secure architecture for internet of things (flfsiot). J. Ambient Intell. Hum. Comput. 1–25, (2020)

  18. Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–6. IEEE, (2018)

  19. Da, Xu., L., Lu, Y., Li, L.: Embedding blockchain technology into iot for security: a survey. IEEE Int. Things J. (2021)

  20. Katende, M.: Combining mqtt and blockchain to improve data security. In: 3rd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), (2020)

  21. Buccafurri, F., Romolo, C.: A blockchain-based otp-authentication scheme for constrainded iot devices using mqtt. In: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control, pp. 1–5, (2019)

  22. Buccafurri, F., De Angelis, V., Nardone, R.: Securing mqtt by blockchain-based otp authentication. Sensors 20(7), 2002 (2020)

    Article  Google Scholar 

  23. Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., Takacs, A.: Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors 20(10), 2798 (2020)

    Article  Google Scholar 

  24. ABDELRAZIG, ABUBAKAR, M.W.R.W.A.N., Jaroucheh, Z., Al-Dubai, A., Liu, X.: Blockchain-based identity and authentication scheme for mqtt protocol. In: 2021 The 3rd International Conference on Blockchain Technology, pp. 73–81, (2021)

  25. Alaiz-Moreton, H., Aveleira-Mata, J., Ondicol-Garcia, J., Muñoz-Castañeda, A.L., García, I., Benavides, C.: Multiclass classification procedure for detecting attacks on mqtt-iot protocol. Complexity, 2019, (2019)

  26. Ciklabakkal, E., Donmez, A., Erdemir, M., Suren, E., Yilmaz, M.K., Angin, P.: Artemis: an intrusion detection system for mqtt attacks in internet of things. In: 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp. 369–3692. IEEE, (2019)

  27. Hindy, H., Bayne, E, Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an mqtt case study (mqtt-iot-ids2020 dataset). In: International Networking Conference, pp. 73–84. Springer, (2020)

  28. Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on MQTT. Sensors 20, 11 (2020)

    Article  Google Scholar 

  29. Dikii, D., Arustamov, Sergey, Grishentsev, A.: Dos attacks detection in MQTT networks. Indones. J. Electr. Eng. Comput. Sci. 21, 601 (2021)

    Google Scholar 

  30. Khan, M.A., Khan, M.A., Jan, S.U., Ahmad, J., Jamal, S.S., Shah, A.A., Pitropakis, N., Buchanan, W.J.: A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors 21(21), 7016 (2021)

    Article  Google Scholar 

  31. Attota, D.C., Mothukuri, V., Parizi, Reza M., Pouriyeh, S.: An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9, 117734–117745 (2021)

    Article  Google Scholar 

  32. Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access 9, 138509–138542 (2021)

    Article  Google Scholar 

  33. Makhija, J., Shetty, A.A., Bangera, A.: Classification of attacks on MQTT-based IoT system using machine learning techniques. In: International Conference on Innovative Computing and Communications, pp. 217–224. Springer, (2022)

  34. Ullah, I., Mahmoud, Q.H.: A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9, 165907–165931 (2021)

    Article  Google Scholar 

  35. Gao, Z., Cao, J., Wang, W., Zhang, H., Xu, Z.: Online-semisupervised neural anomaly detector to identify MQTT-based attacks in real time. Secur. Commun. Netw. 2021, (2021)

  36. Hintaw, A.J., Manickam, S., Aboalmaaly, M.F., Karuppayah, S.: MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT). IETE J. Res. 1–30, (2021)

  37. Alsaleh, A., Binsaeedan, W.: The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEE Access 9, 112466–112477 (2021)

    Article  Google Scholar 

  38. Mirjalili, S., Gandomi, A.H., Mirjalili, S.Z., Saremi, S., Faris, H., Mirjalili, S.M.: Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 114, 163–191 (2017)

    Article  Google Scholar 

  39. Tizhoosh, H.R.: Opposition-based learning: a new scheme for machine intelligence. In: International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), 1, 695–701. IEEE, (2005)

  40. Sayed, G.I., Hassanien, A.E., Azar, A.T.: Feature selection via a novel chaotic crow search algorithm. Neural Comput. Appl. 31(1), 171–188 (2019)

    Article  Google Scholar 

  41. Hegazy, Ah.E., Makhlouf, M.A., El-Tawel, Gh.S.: Feature selection using chaotic salp swarm algorithm for data classification. Arab. J. Sci. Eng. 44(4), 3801–3816 (2019)

    Article  Google Scholar 

  42. Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)

    Article  MathSciNet  Google Scholar 

  43. Tubishat, M., Idris, N., Shuib, L., Abushariah, M.A.M., Mirjalili, S.: Improved salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020)

    Article  Google Scholar 

  44. Yin, Y., Qiang, T., Chen, X.: Enhanced salp swarm algorithm based on random walk and its application to training feedforward neural networks. Soft Comput. 24(19), 14791–14807 (2020)

    Article  Google Scholar 

  45. Popoola, S.I., Adebisi, B., Ande, R., Hammoudeh, M., Anoh, K., Atayero, A.A.: Smote-drnn: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21(9), 2985 (2021)

    Article  Google Scholar 

  46. Meng, Q.: Lightgbm: a highly efficient gradient boosting decision tree. 04 (2018)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Prajisha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prajisha, C., Vasudevan, A.R. An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM. Int. J. Inf. Secur. 21, 1263–1282 (2022). https://doi.org/10.1007/s10207-022-00611-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-022-00611-9

Keywords

Navigation