2020
DOI: 10.3390/s20102932
|View full text |Cite
|
Sign up to set email alerts
|

SlowITe, a Novel Denial of Service Attack Affecting MQTT

Abstract: Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our research, allowing the client to configure the behavior of the server. In order to validate the possibility to exploit such vulnerability, we propose SlowITe, a novel l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 71 publications
(34 citation statements)
references
References 63 publications
1
33
0
Order By: Relevance
“…Considering the IoT security topic, several attacks against IoT networks are found in literature, starting from the evaluation of the impact of well-know attacks applied to IoT environments [ 13 ], up to the proposal of novel threats against IoT networks, protocols or nodes [ 14 , 15 , 16 ]. Protection of IoT networks and systems from cyber-threats is an open research challenge, due to the constant appearance of novel threats targeting such platforms.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Considering the IoT security topic, several attacks against IoT networks are found in literature, starting from the evaluation of the impact of well-know attacks applied to IoT environments [ 13 ], up to the proposal of novel threats against IoT networks, protocols or nodes [ 14 , 15 , 16 ]. Protection of IoT networks and systems from cyber-threats is an open research challenge, due to the constant appearance of novel threats targeting such platforms.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, MQTTset includes not only legitimate traffic, but also malicious one, we will now briefly introduce the considered threats. In this scenario, we integrated popular and easy to detect cyber-attacks against MQTT but it is possible to integrate more complex attacks such as zero-day [ 37 ] or innovative attacks against MQTT such as SlowITe [ 14 ] which is characterized by a particularly low attack band since it is a slow dos attack, the computational capabilities and bandwidth required to perform this attack are very low making it difficult to identify and mitigate. Being publicly accessible, researchers will be able to integrate their attacks with the dataset for analysis/detection/mitigation purposes.…”
Section: Mqttset Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, prevention to increase data authority is to use ACLs per topic, per method, or QoS. Ivan et al validated DoS attacks named SlowITe and SlowTT on the MQTT service [21,22]. The attack exploited a weakness in the Keep-Alive parameter setting which is used to keep the connection alive by avoiding connection closures by the server.…”
Section: Related Workmentioning
confidence: 99%
“…Mutual authentication between the client and the server can also be added [ 21 ]. Researchers also formally verified the protocols [ 47 ], studied the possible attacks [ 48 ], and proposed intrusion detection for them [ 49 ].…”
Section: An Introduction To Mqtt and Coapmentioning
confidence: 99%