Openly accessible

Denial of service attack detection through machine learning for the IoT

Syed, Naeem Firdous, Baig, Zubair, Ibrahim, Ahmed and Valli, Craig 2020, Denial of service attack detection through machine learning for the IoT, Journal of Information and Telecommunication, doi: 10.1080/24751839.2020.1767484.


Title Denial of service attack detection through machine learning for the IoT
Author(s) Syed, Naeem FirdousORCID iD for Syed, Naeem Firdous orcid.org/0000-0003-2450-4337
Baig, ZubairORCID iD for Baig, Zubair orcid.org/0000-0002-9245-2703
Ibrahim, Ahmed
Valli, Craig
Journal name Journal of Information and Telecommunication
Total pages 22
Publisher Taylor & Francis
Place of publication Abingdon, Eng.
Publication date 2020
ISSN 2475-1839
2475-1847
Keyword(s) IoT
network security
MQTT
DoS
Summary Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular. Cyber security threats against the MQTT protocol are anticipated to increase at par with its increasing use by IoT manufacturers. In particular, IoT is vulnerable to protocol-based Application layer Denial of Service (DoS) attacks, which have been known to cause widespread service disruption in legacy systems. In this paper, we propose an Application layer DoS attack detection framework for the MQTT protocol and test the scheme on legitimate and protocol compliant DoS attack scenarios. To protect the MQTT message brokers from such attacks, we propose a machine learning-based detection framework developed for the MQTT protocol. Through experiments, we demonstrate the impact of such attacks on various MQTT brokers and evaluate the effectiveness of the proposed framework to detect these malicious attacks. The results obtained indicate that the attackers can overwhelm the server resources even when legitimate access was denied to MQTT brokers and resources have been restricted. In addition, the MQTT features we have identified showed high attack detection accuracy. The field size and length-based features drastically reduced the false-positive rates and are suitable in detecting IoT based attacks.
Notes Article in Press
Language eng
DOI 10.1080/24751839.2020.1767484
Indigenous content off
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2020, The Authors
Free to Read? Yes
Persistent URL http://hdl.handle.net/10536/DRO/DU:30143777

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 20 Abstract Views  -  Detailed Statistics
Created: Fri, 09 Oct 2020, 13:55:55 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.