DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol

被引:10
|
作者
Alatram, Alaa [1 ]
Sikos, Leslie F. [1 ]
Johnstone, Mike [2 ]
Szewczyk, Patryk [1 ]
Kang, James Jin [1 ]
机构
[1] Edith Cowan Univ, Joondalup, WA, Australia
[2] Edith Cowan Univ, Sch Sci, Network Secur & Mobile App Dev, Joondalup, WA, Australia
关键词
MQTT; DDoS; Cybersecurity Dataset; Machine learning; CHALLENGES;
D O I
10.1016/j.comnet.2023.109809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices themselves, or using the devices to perform the attacks. These attacks are often successful due to the nature of the protocols used in the IoT. One popular protocol used for machine-to-machine IoT communications is the Message Queueing Telemetry Protocol (MQTT). Countermeasures for attacks against MQTT include testing defenses with existing datasets. However, there is a lack of real-world test datasets in this area. For this reason, this paper introduces a DoS/DDoS-MQTT-IoT dataset-that contains various DoS/DDoS attack scenarios using MQTT traffic-to help develop and test countermeasures against such attacks. To this end, a physical IoT testbed was constructed and a large volume of IoT data was generated that included standard MQTT traffic as well as 10 DoS scenarios. The usability of the dataset has been evaluated via machine learning.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Castaneda, Angel Luis Munoz
    Mata, Jose Antonio Aveleira
    Alaiz-Moreton, Hector
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) : 5281 - 5296
  • [2] IoT Applications based on MQTT Protocol
    Salagean, Maria
    Zinca, Daniel
    [J]. 2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2020, : 375 - 378
  • [3] Characterization of threats in IoT from an MQTT protocol-oriented dataset
    Ángel Luis Muñoz Castañeda
    José Antonio Aveleira Mata
    Héctor Aláiz-Moretón
    [J]. Complex & Intelligent Systems, 2023, 9 : 5281 - 5296
  • [4] Development of the IoT module using MQTT Protocol and AES
    Guo, Jr-Hung
    Yuan, Lin Tzu
    Hsia, Kuo-Hsien
    [J]. PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB 2021), 2021, : 56 - 60
  • [5] Development of the IoT Module using MQTT Protocol and AES
    Guo, Jr-Hung
    Lin, Tzu-Yuan
    Hsia, Kuo-Hsien
    [J]. PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB 2021), 2021, : P59 - P59
  • [6] Handling Mobility in IoT applications using the MQTT protocol
    Luzuriaga, Jorge E.
    Carlos Cano, Juan
    Calafate, Carlos
    Manzoni, Pietro
    Perez, Miguel
    Boronat, Pablo
    [J]. 2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 245 - 250
  • [7] IoT real time data acquisition using MQTT protocol
    Atmoko, R. A.
    Riantini, R.
    Hasin, M. K.
    [J]. INTERNATIONAL CONFERENCE ON PHYSICAL INSTRUMENTATION AND ADVANCED MATERIALS, 2017, 853
  • [8] Privacy-Enhanced MQTT Protocol for Massive IoT
    Hue, Axelle
    Sharma, Gaurav
    Dricot, Jean-Michel
    [J]. ELECTRONICS, 2022, 11 (01)
  • [9] Intelligent Parking Cloud Services based on IoT using MQTT Protocol
    Dhar, Prarna
    Gupta, Poonam
    [J]. 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 30 - 34
  • [10] Using the MQTT Protocol in Real Time for Synchronizing IoT Device State
    Shaout, Adnan
    Crispin, Brennan
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (3A) : 515 - 521