2019 IEEE World Congress on Services (SERVICES) 2019
DOI: 10.1109/services.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…A malformed data attack aims to generate and send to the broker several malformed packets, trying to raise exceptions on the targeted service [ 48 ]. Considering MQTTset, in order to perpetrate a malformed data attack, we adopted the MQTTSA tool [ 49 ], sending a sequence of malformed or packets to the victim in order to raise exceptions on the MQTT broker.…”
Section: Mqttset Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…A malformed data attack aims to generate and send to the broker several malformed packets, trying to raise exceptions on the targeted service [ 48 ]. Considering MQTTset, in order to perpetrate a malformed data attack, we adopted the MQTTSA tool [ 49 ], sending a sequence of malformed or packets to the victim in order to raise exceptions on the MQTT broker.…”
Section: Mqttset Datasetmentioning
confidence: 99%
“…Regarding MQTTset, the attacker’s aim is to crack users’ credentials (username and password) adopted during the authentication phase. Also in this case, we used the MQTTSA tool [ 49 ]. Particularly, in order to recall to a real scenario, we adopted the rockyou.txt word list, that is considered a popular list, widely adopted for brute force and cracking attacks [ 51 ].…”
Section: Mqttset Datasetmentioning
confidence: 99%
“…Similarly, we also used two stress testing tools to send flooding traffic on port 1883 that the MQTT protocol uses for communication. These tools include MQTTSA [19] and hping3 (https://linux.die.net/man/8/hping3, accessed on 12 December 2021). We used these tools in order to check the behavior of MQTT clients (i.e., publishers and subscribers) upon receiving the flooding attack.…”
Section: Vulnerabilities Assessmentmentioning
confidence: 99%
“…In order to test the effectiveness of the rule-based engine for detecting and stopping the DDoS attacks, we used an MQTT DDoS attacking tool, i.e., MQTTSA [19]. The MQTTSA [19] tool is capable of generating MQTT protocol-based DDoS attack by sending the MQTT connection requests, and MQTT publishes messages through port switching, i.e., sending flooding packets through multiple source ports of an underlying attacking device to disturb the normal working of the target device (i.e., the MQTT broker).…”
Section: Experiments 8: Mqtt Ddos Attack Testingmentioning
confidence: 99%
See 1 more Smart Citation