2020
DOI: 10.1080/24751839.2020.1767484
|View full text |Cite
|
Sign up to set email alerts
|

Denial of service attack detection through machine learning for the IoT

Abstract: Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular. Cyber security threats against the MQTT protocol are anticipated to increase at par with its increasing use by IoT manufacturers. In particular, IoT is vulnerable to protocol-based Application layer Denial of Service (DoS) attacks, which have been known to cause wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 87 publications
(43 citation statements)
references
References 36 publications
0
39
0
4
Order By: Relevance
“…Syed et al [48] applied an ML-based application layer DoS attack detection framework for the detection of DoS attack on Message Queuing Telemetry Transport (MQTT) data communication protocol. The ML models applied for the detection of attack were Decision Trees (C4.5), Multi-Layer Perceptron (MLP) and Average One-Dependence Estimator (AODE).…”
Section: Related Workmentioning
confidence: 99%
“…Syed et al [48] applied an ML-based application layer DoS attack detection framework for the detection of DoS attack on Message Queuing Telemetry Transport (MQTT) data communication protocol. The ML models applied for the detection of attack were Decision Trees (C4.5), Multi-Layer Perceptron (MLP) and Average One-Dependence Estimator (AODE).…”
Section: Related Workmentioning
confidence: 99%
“…This makes distinguishing between natural and malicious traffic impossible [49,50]. In recent years, a specific IoT botnet virus known as Mirai has been responsible for initiating disruptive DDoS attacks, causing thousands of IoT computers to malfunction due to interferences [30,51].  Spoofing and Sybil attacks: these types of attacks are mainly used to gain unauthorized access to IoT systems by targeting user identification (RFID and MAC address), as seen in Fig.…”
Section: Active Iot Attacksmentioning
confidence: 99%
“…5 [51].  Data Tampering: Data tampering is a severe threat not just to corporations but also to people's lives and property.…”
Section: Active Iot Attacksmentioning
confidence: 99%
“…Syed et al [23], the authors proposed a machine learning framework for detecting and evaluating the denial-of-service attacks on the MQTT protocol. They designed and tested the attack to capture normal, offensive traffic, and statistical flow features based on dimension.…”
Section: Introductionmentioning
confidence: 99%