IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS

被引:0
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Dept Informat Network & Commun, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
关键词
Intrusion detection; DoS attack; Message Queuing Telemetry Transport (MQTT); Vulnerability; Machine learning; Immune system; INTRUSION; SYSTEM;
D O I
10.24507/ijicic.20.02.617
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In smart cities, public services face the risk of cyberattacks, with the most significant threat being denial -of -service attacks targeting unknown vulnerabilities. To bolster defence mechanisms, we previously introduced a method known as "immunity -based attack detection". This approach dynamically develops immunity against both known and unknown cyberattacks without the need for prior training on attack data. This paper focuses on a disaster prevention service utilizing Message Queuing Telemetry Transport (MQTT) brokers. We propose implementing immunity -based Attack Detection (ibAD) specifically for the Mosquitto broker, to enhance the resilience of the MQTT broker. In performance evaluations, the ibAD method successfully detected and prevented attack messages with an accuracy of 99.72% against actual vulnerabilities. Furthermore, our assessments revealed that ibAD imposed minimal overhead, especially when the MQTT message size remained below approximately 4,000 bytes within our experimental environment.
引用
收藏
页码:617 / 634
页数:18
相关论文
共 50 条
  • [1] A Novel Immunity-Based Anomaly Detection Method
    Zeng, Jie
    Zeng, Jinquan
    FBIE: 2008 INTERNATIONAL SEMINAR ON FUTURE BIOMEDICAL INFORMATION ENGINEERING, PROCEEDINGS, 2008, : 195 - +
  • [2] A model of immunity-based network intrusion detection
    Sun, ZX
    Mao, ZX
    Gong, J
    Xu, HX
    Wang, RC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 417 - 420
  • [3] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [4] An immunity-based model for network intrusion detection
    Zhang, YC
    Que, XR
    Wang, WD
    Cheng, SD
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E24 - E29
  • [5] Artificial immunity-based spam detection system
    Sirisanyalak, B.
    Sornil, O.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3392 - 3398
  • [6] An immunity-based model for dynamic distributed intrusion detection
    Qiao, Peili
    Wang, Tong
    Su, Jie
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [7] A dynamic immunity-based model for computer virus detection
    Zhang, Yu
    Li, Tao
    Qin, Renchao
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 515 - 519
  • [8] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [9] Artificial immunity-based feature extraction for spam detection
    Sirisanyalak, Burim
    Sornil, Ohm
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 359 - +
  • [10] An Immunity-Based Anomaly Detection System with Sensor Agents
    Okamoto, Takeshi
    Ishida, Yoshiteru
    SENSORS, 2009, 9 (11) : 9175 - 9195