Machine learning based IoT Intrusion Detection System : an MQTT case study (MQTT-IoT-IDS2020 Dataset)
Hindy, Hanan and Bayne, Ethan and Bures, Miroslav and Atkinson, Robert and Tachtatzis, Christos and Bellekens, Xavier; Ghita, Bogdan and Shiaeles, Stavros, eds. (2021) Machine learning based IoT Intrusion Detection System : an MQTT case study (MQTT-IoT-IDS2020 Dataset). In: Selected Papers from the 12th International Networking Conference, INC 2020. Lecture Notes in Networks and Systems, LNNS . Springer, GRC, pp. 73-84. ISBN 9783030647582 (https://doi.org/10.1007/978-3-030-64758-2_6)
Preview |
Text.
Filename: Hindy_etal_INC2020_Machine_learning_based_IoT_Intrusion_Detection_System.pdf
Accepted Author Manuscript Download (416kB)| Preview |
Abstract
The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general-purpose Intrusion Detection Systems (IDS) to be deployed for special purpose networks usage. Numerous lightweight protocols are being proposed for IoT devices communication usage. One of the distinguishable IoT machine-to-machine communication protocols is Message Queuing Telemetry Transport (MQTT) protocol. However, as per the authors best knowledge, there are no available IDS datasets that include MQTT benign or attack instances and thus, no IDS experimental results available. In this paper, the effectiveness of six Machine Learning (ML) techniques to detect MQTT-based attacks is evaluated. Three abstraction levels of features are assessed, namely, packet-based, unidirectional flow, and bidirectional flow features. An MQTT simulated dataset is generated and used for the training and evaluation processes. The dataset is released with an open access licence to help the research community further analyse the accompanied challenges. The experimental results demonstrated the adequacy of the proposed ML models to suit MQTT-based networks IDS requirements. Moreover, the results emphasise on the importance of using flow-based features to discriminate MQTT-based attacks from benign traffic, while packet-based features are sufficient for traditional networking attacks.
ORCID iDs
Hindy, Hanan, Bayne, Ethan, Bures, Miroslav, Atkinson, Robert ORCID: https://orcid.org/0000-0002-6206-2229, Tachtatzis, Christos ORCID: https://orcid.org/0000-0001-9150-6805 and Bellekens, Xavier ORCID: https://orcid.org/0000-0003-1849-5788; Ghita, Bogdan and Shiaeles, Stavros-
-
Item type: Book Section ID code: 75251 Dates: DateEvent5 January 2021Published15 August 2020AcceptedSubjects: Technology > Electrical engineering. Electronics Nuclear engineering Department: Faculty of Engineering > Electronic and Electrical Engineering
Strategic Research Themes > Measurement Science and Enabling TechnologiesDepositing user: Pure Administrator Date deposited: 02 Feb 2021 16:19 Last modified: 20 Nov 2024 17:16 URI: https://strathprints.strath.ac.uk/id/eprint/75251