Abstract
Internet of Things (IoT) networks are becoming increasingly popular for monitoring critical environments of various types. For the communication of IoT devices, several lightweight protocols have been developed. MQTT (message queuing telemetry transport) is a widely used messaging protocol in IoT using the publish–subscribe technique. The openness of publish–subscribe model and the limited built-in authentication capabilities makes it vulnerable to intruders. Hence, an intrusion detection system (IDS) has a vital role in MQTT-IoT security. This paper proposes an efficient intrusion detection mechanism for the MQTT-IoT networks using an enhanced chaotic salp swarm optimization algorithm (ECSSA) and LightGBM classifier. Traditional IDS uses a lot of irrelevant data and undesirable attributes, resulting in long detection times and low performance. To overcome the limitations, the proposed IDS uses ECSSA for feature selection and LightGBM classifier for better detection accuracy. The experimental verification on MC-IoT, MQTT-IoT-IDS2020, and MQTTset datasets demonstrates that ECSSA and LightGBM improve the overall accuracy rate. The proposed technique outperforms the existing approaches with an accuracy of 99.38%, 98.91%, and 98.35% in the three test sets, MC-IoT, MQTT-IoT-IDS2020, and MQTTset, respectively.














Similar content being viewed by others
Data Availability
The data that support the findings of this study are available on request from the corresponding author. The data are not publicly available due to privacy or ethical restrictions.
References
Li, S., Li, X., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17, 04 (2014)
Nebbione, G., Calzarossa, M.C.: Security of IoT application layer protocols: challenges and findings. Futur. Internet 12(3), 55 (2020)
Ajdani, M., Ghaffary, H.: Introduced a new method for enhancement of intrusion detection with random forest and pso algorithm. Securi. Priv. 4, 01 (2021)
Chen, F., Ye, Z., Wang, C., Yan, L., Wang, R.: A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor. 68–72 (2018)
Panda, M., Patra, M.: Network intrusion detection using naive bayes. 7, 12 (2007)
Amor, N.B., Salem, Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. 1, 420–424 (2004)
Gu, J., Wang, L., Chung, Y., Wang, S.: A novel approach to intrusion detection using svm ensemble with feature augmentation. 06 (2019)
Elbasiony, R., Sallam, E., Eltobely, T., Fahmy, M.: A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng. J. 4(12), 753–762 (2013)
Ramaiah, M., Chandrasekaran, V., Ravi, V., Kumar, N.: An intrusion detection system using optimized deep neural network architecture. Trans. Emerg. Telecommun. Technol. 32, 02 (2021)
Liu, H., Lang, B., Liu, Ming, Yan, H.: Cnn and rnn based payload classification methods for attack detection. Knowledge-Based Syst. 163, 09 (2018)
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. 1–6 (2017)
Heinrich, C.: Transport layer security (TLS). Springer, Boston (2005)
Perrone, G., Vecchio, M., Pecori, R., Giaffreda, R.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of iot devices. In IoTBDS, (2017)
Syed, N.F., Baig, Z., Ibrahim, A., Valli, C.: Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 4(4), 482–503 (2020)
Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-iot). Computing 101(7), 791–818 (2019)
Haripriya, A.P., Kanagasabai, K.: Secure-mqtt: an efficient fuzzy logic-based approach to detect dos attack in mqtt protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019, 04 (2019)
Zahra, S.R., Chishti, M.A.: Fuzzy logic and fog based secure architecture for internet of things (flfsiot). J. Ambient Intell. Hum. Comput. 1–25, (2020)
Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–6. IEEE, (2018)
Da, Xu., L., Lu, Y., Li, L.: Embedding blockchain technology into iot for security: a survey. IEEE Int. Things J. (2021)
Katende, M.: Combining mqtt and blockchain to improve data security. In: 3rd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), (2020)
Buccafurri, F., Romolo, C.: A blockchain-based otp-authentication scheme for constrainded iot devices using mqtt. In: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control, pp. 1–5, (2019)
Buccafurri, F., De Angelis, V., Nardone, R.: Securing mqtt by blockchain-based otp authentication. Sensors 20(7), 2002 (2020)
Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., Takacs, A.: Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors 20(10), 2798 (2020)
ABDELRAZIG, ABUBAKAR, M.W.R.W.A.N., Jaroucheh, Z., Al-Dubai, A., Liu, X.: Blockchain-based identity and authentication scheme for mqtt protocol. In: 2021 The 3rd International Conference on Blockchain Technology, pp. 73–81, (2021)
Alaiz-Moreton, H., Aveleira-Mata, J., Ondicol-Garcia, J., Muñoz-Castañeda, A.L., García, I., Benavides, C.: Multiclass classification procedure for detecting attacks on mqtt-iot protocol. Complexity, 2019, (2019)
Ciklabakkal, E., Donmez, A., Erdemir, M., Suren, E., Yilmaz, M.K., Angin, P.: Artemis: an intrusion detection system for mqtt attacks in internet of things. In: 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp. 369–3692. IEEE, (2019)
Hindy, H., Bayne, E, Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an mqtt case study (mqtt-iot-ids2020 dataset). In: International Networking Conference, pp. 73–84. Springer, (2020)
Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on MQTT. Sensors 20, 11 (2020)
Dikii, D., Arustamov, Sergey, Grishentsev, A.: Dos attacks detection in MQTT networks. Indones. J. Electr. Eng. Comput. Sci. 21, 601 (2021)
Khan, M.A., Khan, M.A., Jan, S.U., Ahmad, J., Jamal, S.S., Shah, A.A., Pitropakis, N., Buchanan, W.J.: A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors 21(21), 7016 (2021)
Attota, D.C., Mothukuri, V., Parizi, Reza M., Pouriyeh, S.: An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9, 117734–117745 (2021)
Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access 9, 138509–138542 (2021)
Makhija, J., Shetty, A.A., Bangera, A.: Classification of attacks on MQTT-based IoT system using machine learning techniques. In: International Conference on Innovative Computing and Communications, pp. 217–224. Springer, (2022)
Ullah, I., Mahmoud, Q.H.: A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9, 165907–165931 (2021)
Gao, Z., Cao, J., Wang, W., Zhang, H., Xu, Z.: Online-semisupervised neural anomaly detector to identify MQTT-based attacks in real time. Secur. Commun. Netw. 2021, (2021)
Hintaw, A.J., Manickam, S., Aboalmaaly, M.F., Karuppayah, S.: MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT). IETE J. Res. 1–30, (2021)
Alsaleh, A., Binsaeedan, W.: The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEE Access 9, 112466–112477 (2021)
Mirjalili, S., Gandomi, A.H., Mirjalili, S.Z., Saremi, S., Faris, H., Mirjalili, S.M.: Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 114, 163–191 (2017)
Tizhoosh, H.R.: Opposition-based learning: a new scheme for machine intelligence. In: International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), 1, 695–701. IEEE, (2005)
Sayed, G.I., Hassanien, A.E., Azar, A.T.: Feature selection via a novel chaotic crow search algorithm. Neural Comput. Appl. 31(1), 171–188 (2019)
Hegazy, Ah.E., Makhlouf, M.A., El-Tawel, Gh.S.: Feature selection using chaotic salp swarm algorithm for data classification. Arab. J. Sci. Eng. 44(4), 3801–3816 (2019)
Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62 (2020)
Tubishat, M., Idris, N., Shuib, L., Abushariah, M.A.M., Mirjalili, S.: Improved salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020)
Yin, Y., Qiang, T., Chen, X.: Enhanced salp swarm algorithm based on random walk and its application to training feedforward neural networks. Soft Comput. 24(19), 14791–14807 (2020)
Popoola, S.I., Adebisi, B., Ande, R., Hammoudeh, M., Anoh, K., Atayero, A.A.: Smote-drnn: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21(9), 2985 (2021)
Meng, Q.: Lightgbm: a highly efficient gradient boosting decision tree. 04 (2018)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Prajisha, C., Vasudevan, A.R. An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM. Int. J. Inf. Secur. 21, 1263–1282 (2022). https://doi.org/10.1007/s10207-022-00611-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-022-00611-9