2020
DOI: 10.3390/s20226578
|View full text |Cite
|
Sign up to set email alerts
|

MQTTset, a New Dataset for Machine Learning Techniques on MQTT

Abstract: IoT networks are increasingly popular nowadays to monitor critical environments of different nature, significantly increasing the amount of data exchanged. Due to the huge number of connected IoT devices, security of such networks and devices is therefore a critical issue. Detection systems assume a crucial role in the cyber-security field: based on innovative algorithms such as machine learning, they are able to identify or predict cyber-attacks, hence to protect the underlying system. Nevertheless, specific … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
88
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 170 publications
(119 citation statements)
references
References 55 publications
1
88
0
2
Order By: Relevance
“…After the normal network started generating the IoT traffic, we created an invader network. The invader network includes ten attacking devices that are generating four types of attacks, including an MQTT distributed denial-of-service, MQTT publish flood, brute force, and SlowITE [ 37 ] attack. The following sections describe the types of attack that IoT-Flock [ 16 , 24 ] supports.…”
Section: Proposed Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…After the normal network started generating the IoT traffic, we created an invader network. The invader network includes ten attacking devices that are generating four types of attacks, including an MQTT distributed denial-of-service, MQTT publish flood, brute force, and SlowITE [ 37 ] attack. The following sections describe the types of attack that IoT-Flock [ 16 , 24 ] supports.…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…Using the LR algorithm, we selected the ten most significant features to train and test the machine learning models: [’frame.time_delta’, ’tcp.time_delta’, ’tcp.flags.ack’, ’tcp.flags.push’, ’tcp.flags.reset’, ’mqtt.hdrflags’, ’mqtt.msgtype’, ’mqtt.qos’, ’mqtt.retain’, ’mqtt.ver’]. The details of these features are given in [ 37 ].…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…It has both common network scanning attacks and brute-force attacks. MQTT protocol communication datasets are widely adopted [33], [34] for building an effective Intrusion Detection model for IoT devices.…”
Section: B Datasetmentioning
confidence: 99%
“…The data set was developed on a realistic testbed, and it contains simulated and legitimate IoT network traffic with different types of attacks. The authors in [ 44 ] presented a data set named as MQTTset, which is related to the MQTT protocol. The authors implemented different machine learning algorithms to validate the data set.…”
Section: Related Workmentioning
confidence: 99%