IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS

被引:0
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Dept Informat Network & Commun, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2024年 / 20卷 / 02期
关键词
Intrusion detection; DoS attack; Message Queuing Telemetry Transport (MQTT); Vulnerability; Machine learning; Immune system; INTRUSION; SYSTEM;
D O I
10.24507/ijicic.20.02.617
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In smart cities, public services face the risk of cyberattacks, with the most significant threat being denial -of -service attacks targeting unknown vulnerabilities. To bolster defence mechanisms, we previously introduced a method known as "immunity -based attack detection". This approach dynamically develops immunity against both known and unknown cyberattacks without the need for prior training on attack data. This paper focuses on a disaster prevention service utilizing Message Queuing Telemetry Transport (MQTT) brokers. We propose implementing immunity -based Attack Detection (ibAD) specifically for the Mosquitto broker, to enhance the resilience of the MQTT broker. In performance evaluations, the ibAD method successfully detected and prevented attack messages with an accuracy of 99.72% against actual vulnerabilities. Furthermore, our assessments revealed that ibAD imposed minimal overhead, especially when the MQTT message size remained below approximately 4,000 bytes within our experimental environment.
引用
收藏
页码:617 / 634
页数:18
相关论文
共 50 条
  • [41] Immunity-based autonomous guided vehicles control
    Lau, Henry Y. K.
    Wong, Vicky W. K.
    Lee, Ivan S. K.
    APPLIED SOFT COMPUTING, 2007, 7 (01) : 41 - 57
  • [42] Immunity-based approaches for self-monitoring in distributed intrusion detection system
    Watanabe, Y
    Ishida, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 503 - 510
  • [43] Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
    Dozier, G
    Brown, D
    Hurley, J
    Cain, K
    GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2004, PT 1, PROCEEDINGS, 2004, 3102 : 263 - 274
  • [44] Improving the performance of detection of simultaneous double faults on immunity-based system diagnosis
    Wada, Koji
    Toriu, Takashi
    Hama, Hiromitsu
    1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (05): : 83 - 88
  • [45] An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets
    Lin, Ping
    Lie, Tao
    Liu, Xiaojie
    Zhao, Hui
    Yang, Jin
    Zhu, Fangdong
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 601 - 611
  • [46] AN EFFICIENT ALGORITHM FOR SIMULTANEOUS MULTIPLE FAULT DETECTION IN IMMUNITY-BASED SYSTEM DIAGNOSIS
    Wada, Koji
    Toriu, Takashi
    Hama, Hiromitsu
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2014, 10 (05): : 1699 - 1714
  • [47] Towards an immunity-based system for detecting masqueraders
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2009, 13 (3-4) : 103 - 110
  • [48] Immunity-based technique to detect network intrusions
    Pan F.
    Ding Y.-F.
    Wang W.-N.
    Journal of Zhejiang University-SCIENCE A, 2005, 6 (5): : 371 - 377
  • [49] An Artificial Immunity-based Proactive Defense System
    Tan, Minsheng
    Yu, Hongxiao
    Zhao, Zhiguo
    Liu, Zhaohui
    Liu, Fangju
    2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, : 2239 - 2243
  • [50] An immunity-based technique to detect network intrusions
    潘峰
    丁云飞
    汪为农
    Journal of Zhejiang University Science A(Science in Engineering), 2005, (05) : 371 - 377