2021
DOI: 10.3390/s21217016
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

Abstract: A large number of smart devices in Internet of Things (IoT) environments communicate via different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely used publish–subscribe-based protocol for the communication of sensor or event data. The publish–subscribe strategy makes it more attractive for intruders and thus increases the number of possible attacks over MQTT. In this paper, we proposed a Deep Neural Network (DNN) for intrusion detection in the MQTT-based protocol and also compared … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 84 publications
(53 citation statements)
references
References 52 publications
0
52
0
1
Order By: Relevance
“…The rapid development in the fields of the Internet of Things (IoT) and artificial intelligence (AI) has paved the way for improvements in various fields of life [ 3 , 4 ]. Over the past few decades, these technologies have also transformed the healthcare sector by lowering costs and increasing efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development in the fields of the Internet of Things (IoT) and artificial intelligence (AI) has paved the way for improvements in various fields of life [ 3 , 4 ]. Over the past few decades, these technologies have also transformed the healthcare sector by lowering costs and increasing efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…The CNN allows the model both time and space correlations for better performance. NSL-KDD 86.00 [25] UNSW-NB 15 88.00 [17] KDD Cup 99, CIC IDS-2017 92.5 [29] BoT-IoT 94.00 [30] MQTT-IoT-IDS2020 97.…”
Section: Resultsmentioning
confidence: 99%
“…It was trained using the training dataset, and its hyperparameters were adjusted using the Adam optimizer and the validation dataset. The CNN-LSTM model was next implemented on the test dataset, including features of each testing record to its real class: normal or a particular class of attack [ 67 ]. The training and optimization processes of the CNN-LSTM model consisted of two one-dimensional convolution layers that cross the input vectors with 32 filters and a kernel size of 4, two fully connected dense layers composed of 256 hidden neurons, and an output layer that applies the nonlinear SoftMax activation function used for multiclass classification tasks.…”
Section: Methodsmentioning
confidence: 99%