IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS

被引:0
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Dept Informat Network & Commun, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2024年 / 20卷 / 02期
关键词
Intrusion detection; DoS attack; Message Queuing Telemetry Transport (MQTT); Vulnerability; Machine learning; Immune system; INTRUSION; SYSTEM;
D O I
10.24507/ijicic.20.02.617
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In smart cities, public services face the risk of cyberattacks, with the most significant threat being denial -of -service attacks targeting unknown vulnerabilities. To bolster defence mechanisms, we previously introduced a method known as "immunity -based attack detection". This approach dynamically develops immunity against both known and unknown cyberattacks without the need for prior training on attack data. This paper focuses on a disaster prevention service utilizing Message Queuing Telemetry Transport (MQTT) brokers. We propose implementing immunity -based Attack Detection (ibAD) specifically for the Mosquitto broker, to enhance the resilience of the MQTT broker. In performance evaluations, the ibAD method successfully detected and prevented attack messages with an accuracy of 99.72% against actual vulnerabilities. Furthermore, our assessments revealed that ibAD imposed minimal overhead, especially when the MQTT message size remained below approximately 4,000 bytes within our experimental environment.
引用
收藏
页码:617 / 634
页数:18
相关论文
共 50 条
  • [21] Evaluations for immunity-based anomaly detection with dynamic updating of profiles
    Okamoto, Takeshi
    Ishida, Yoshiteru
    ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (02) : 225 - 228
  • [22] Immunity-based systems: A survey
    Dasgupta, D
    AttohOkine, N
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 369 - 374
  • [23] Immunity-based clonal selection algorithm for intrusion detection systems
    Wu, Zejun
    Qian, Lijin
    Liang, Yiwen
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (06):
  • [24] Comparison of immunity-based schemes for aircraft failure detection and identification
    Al Azzawi, Dia
    Moncayo, Hever
    Perhinschi, Mario G.
    Perez, Andres
    Togayev, Adil
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 52 : 181 - 193
  • [25] Anomaly detection system for network security: Immunity-based approach
    Seredynski, F
    Bouvry, P
    Rutkowski, DR
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 486 - 490
  • [26] An artificial immunity based intrusion detection system for unknown cyberattacks
    Huang, Hanyuan
    Li, Tao
    Ding, Yong
    Li, Beibei
    Liu, Ao
    APPLIED SOFT COMPUTING, 2023, 148
  • [27] Immunity-Based Diagnosis for a Motherboard
    Shida, Haruki
    Okamoto, Takeshi
    Ishida, Yoshiteru
    SENSORS, 2011, 11 (04): : 4462 - 4473
  • [28] Artificial immunity-based energy theft detection for advanced metering infrastructures
    Fu, Jie
    Yang, Chengxi
    Liu, Yuxuan
    Zhang, Kunsan
    Li, Jiaqi
    Li, Beibei
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2025, 48
  • [29] Immunity-based Detection for Large-scale Behavior of Denial of Service
    Zhang, Yan
    Liu, Caiming
    Li, Zhonghua
    Qin, Hongying
    Li, Qin
    Zeng, Jinquan
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 437 - 440
  • [30] Improvement of Immunity-Based Diagnosis for a Motherboard
    Shida, Haruki
    Okamoto, Takeshi
    Ishida, Yoshiteru
    PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL SYMPOSIUM ON ARTIFICIAL LIFE AND ROBOTICS (AROB 16TH '11), 2011, : 475 - 478