IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS

被引:0
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Dept Informat Network & Commun, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2024年 / 20卷 / 02期
关键词
Intrusion detection; DoS attack; Message Queuing Telemetry Transport (MQTT); Vulnerability; Machine learning; Immune system; INTRUSION; SYSTEM;
D O I
10.24507/ijicic.20.02.617
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In smart cities, public services face the risk of cyberattacks, with the most significant threat being denial -of -service attacks targeting unknown vulnerabilities. To bolster defence mechanisms, we previously introduced a method known as "immunity -based attack detection". This approach dynamically develops immunity against both known and unknown cyberattacks without the need for prior training on attack data. This paper focuses on a disaster prevention service utilizing Message Queuing Telemetry Transport (MQTT) brokers. We propose implementing immunity -based Attack Detection (ibAD) specifically for the Mosquitto broker, to enhance the resilience of the MQTT broker. In performance evaluations, the ibAD method successfully detected and prevented attack messages with an accuracy of 99.72% against actual vulnerabilities. Furthermore, our assessments revealed that ibAD imposed minimal overhead, especially when the MQTT message size remained below approximately 4,000 bytes within our experimental environment.
引用
收藏
页码:617 / 634
页数:18
相关论文
共 50 条
  • [31] Evaluations of Immunity-Based Diagnosis for a Motherboard
    Shida, Haruki
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT III, 2010, 6278 : 628 - +
  • [32] ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
    Suarez-Tangil, Guillermo
    Palomar, Esther
    Pastrana, Sergio
    Ribagorda, Arturo
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 422 - 425
  • [33] Controlling spam: Immunity-based approach
    Kawecki, Konrad
    Seredynski, Franciszek
    Pilski, Marek
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2006, : 31 - +
  • [34] Integrated Framework for Artificial Immunity-Based Aircraft Failure Detection, Identification, and Evaluation
    Perhinschi, Mario G.
    Moncayo, Hever
    Davis, Jennifer
    JOURNAL OF AIRCRAFT, 2010, 47 (06): : 1847 - 1859
  • [35] Artificial Dendritic Cell Mechanism for Aircraft Immunity-Based Failure Detection and Identification
    Al Azzawi, Dia
    Perhinschi, Mario G.
    Moncayo, Hever
    JOURNAL OF AEROSPACE INFORMATION SYSTEMS, 2014, 11 (07): : 467 - 481
  • [36] Editorial: Trained Immunity-Based Vaccines
    Subiza, Jose Luis
    Palomares, Oscar
    Quinti, Isabella
    Sanchez-Ramon, Silvia
    FRONTIERS IN IMMUNOLOGY, 2021, 12
  • [37] Interworking Layer of Distributed MQTT Brokers
    Banno, Ryohei
    Sun, Jingyu
    Takeuchi, Susumu
    Shudo, Kazuyuki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (12) : 2281 - 2294
  • [38] Multi-level immunity-based intrusion detection and risk evaluation model
    Liu, Caiming
    Li, Tao
    Peng, Lingxi
    Zeng, Jinquan
    Zhao, Hui
    Lu, Zhengtian
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2007, 4 (7-8) : 1344 - 1350
  • [39] MQTT-ST: a Spanning Tree Protocol for Distributed MQTT Brokers
    Longo, Eduardo
    Redondi, Alessandro E. C.
    Cesana, Matteo
    Arcia-More, Andrds
    Manzoni, Pietro
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [40] Towards an immunity-based system for detecting masqueraders
    Okamoto, T
    Watanabe, T
    Ishida, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 488 - 495