Abstract
Nowadays, Internet of things (IoT) systems add connectivity to physical and common objects offering new possibilities, this systems have special features such as the low capacity of the devices and behaviour of the protocols used. These facts make cybersecurity in this kind of systems is critical. The current work uses a dataset is based on denial of service attacks over a traffic protocol used in IoT systems, called MQTT. In order to address the classification of new denial of service attacks, one-class technique is applied, obtaining good results using the Principal Component Analysis (PCA) algorithm as complement to this method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Change history
23 January 2022
In the original version of the chapters 9 and 31, the following belated corrections have been incorporated: The author name “Francico Zayas-Gato” has been changed to “Francisco Zayas-Gato”. The correction chapters and the book have been updated with the changes.
References
GitHub - moscajs/aedes: Barebone MQTT broker that can run on any stream server, the node way. https://github.com/moscajs/aedes
KDD Cup 99 Dataset (1999). http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6. IEEE (2017)
Blaauw, D., et al.: IoT design space challenges: circuits and systems. In: 2014 Symposium on VLSI Technology (VLSI-Technology): Digest of Technical Papers, pp. 1–2. IEEE (2014)
Bradley, A.P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145–1159 (1997). https://doi.org/10.1016/S0031-3203(96)00142-2
Casale, P., Pujol, O., Radeva, P.: Approximate convex hulls family for one-class classification. In: Sansone, C., Kittler, J., Roli, F. (eds.) MCS 2011. LNCS, vol. 6713, pp. 106–115. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21557-5_13
Casteleiro-Roca, J.L., Javier Barragan, A., Segura, F., Luis Calvo-Rolle, J., Manuel Andujar, J.: Intelligent hybrid system for the prediction of the voltage-current characteristic curve of a hydrogen-based fuel cell. Rev. Iberoamericana Autom. Inform. Ind. 16(4), 492–501 (2019)
Casteleiro-Roca, J.L., Jove, E., Gonzalez-Cava, J.M., Pérez, J.A.M., Calvo-Rolle, J.L., Alvarez, F.B.: Hybrid model for the ANI index prediction using remifentanil drug and EMG signal. Neural Comput. Appl. 32(5), 1249–1258 (2020). https://doi.org/10.1007/s00521-018-3605-z
Chen, F., Huo, Y., Zhu, J., Fan, D.: A review on the study on MQTT security challenge. Proceedings - 2020 IEEE International Conference on Smart Cloud, SmartCloud 2020, pp. 128–133 (2020). https://doi.org/10.1109/SmartCloud49737.2020.00032
Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18–28 (2009). https://doi.org/10.1016/j.cose.2008.08.003
Jove, E., et al.: Missing data imputation over academic records of electrical engineering students. Log. J. IGPL 28(4), 487–501 (2020)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: A fault detection system based on unsupervised techniques for industrial control loops. Expert Syst. 36(4), e12395 (2019)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: Virtual sensor for fault detection, isolation and data recovery for bicomponent mixing machine monitoring. Informatica 30(4), 671–687 (2019)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Méndez-Pérez, J.A., Calvo-Rolle, J.L.: A new method for anomaly detection based on non-convex boundaries with random two-dimensional projections. Inform. Fusion 65, 50–57 (2021)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Simić, D., Méndez-Pérez, J.A., Luis Calvo-Rolle, J.: Anomaly detection based on one-class intelligent techniques over a control level plant. Log. J. IGPL 28, 502–518 (2020)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Log. J. IGPL (2021)
Juwita, P.S., Fadhil, R., Damayanti, T.N., Ramadan, D.N.: Smart parking management system using SSGA MQTT and real-time database. Telkomnika (Telecommun. Comput. Electron. Control) 18(3), 1243–1251 (2020). https://doi.org/10.12928/TELKOMNIKA.v18i3.14869
Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184–208 (2015)
Lee, J., Kao, A.: Industry 4.0 factory in big data environment. tec. News HARTING’s Technol. Newsl. 26(Industry 4.0 Factory in Big Data Environment), 8–9 (2014)
Liu, J., Kantarci, B., Adams, C.: Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: WiseML 2020 - Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, pp. 25–30 (2020). https://doi.org/10.1145/3395352.3402621
Wollschlaeger, M., Sauter, T., Jasperneite, J.: The future of industrial communication. IEEE Ind. Electron. Mag. 11(4), 17–27 (2017). https://doi.org/10.1109/MIE.2017.2649104
Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017 (2017)
Shalabi, L.A., Shaaban, Z.: Normalization as a preprocessing engine for data mining and the approach of preference matrix. In: 2006 International Conference on Dependability of Computer Systems, pp. 207–214, May 2006. https://doi.org/10.1109/DEPCOS-RELCOMEX.2006.38
Vega Vega, R., Quintián, H., Calvo-Rolle, J.L., Herrero, Á., Corchado, E.: Gaining deep knowledge of android malware families through dimensionality reduction techniques. Log. J. IGPL 27(2), 160–176 (2019)
Wu, J., Zhang, X.: A PCA classifier and its application in vehicle detection. In: IJCNN 2001. International Joint Conference on Neural Networks. Proceedings (Cat. No. 01CH37222), vol. 1, pp. 600–604. IEEE (2001)
Zhang, X., Upton, O., Beebe, N.L., Choo, K.K.R.: IoT botnet forensics: a comprehensive digital forensic case study on Mirai botnet servers. Forensic Sci. Int.: Digit. Invest. 32, 300926 (2020). https://doi.org/10.1016/j.fsidi.2020.300926
Acknowledgements
Spanish National Cybersecurity Institute (INCIBE) and developed Research Institute of Applied Sciences in Cybersecurity (RIASC).
CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Aveleira-Mata, J. et al. (2022). Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach. In: Gude Prego, J.J., de la Puerta, J.G., García Bringas, P., Quintián, H., Corchado, E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400. Springer, Cham. https://doi.org/10.1007/978-3-030-87872-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-87872-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87871-9
Online ISBN: 978-3-030-87872-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)