Abstract
Owing to their wide application, Internet of Things systems have been the target of malicious attacks. These attacks included DoS, flood, SlowITe, malformed, and brute-force attacks. A dataset that includes these attacks was recently released. However, the attack detection accuracy reported in previous studies has not been satisfactory because the studies used too many features that are not important in detecting malicious message queue telemetry transport (MQTT) traffic. Therefore, this study aims to analyze these attacks. Herein, a novel feature extraction method is proposed that includes the source port index, TCP length, MQTT message type, keep alive, and connection acknowledgment. The attacks were classified using the Seq2Seq model. During the experiment, the accuracy of the proposed method was 99.97%, which is 7.33% higher than that of previously reported methods.
Funder
Korean Government, Ministry of Science
Institute of Information and Communications Technology Planning and Evaluation
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference27 articles.
1. (2022, November 08). Electricity AMI. Available online: http://www.aitimes.com/news/articleView.html?idxno=141421.
2. (2022, November 08). Gas AMI. Available online: http://www.gasnews.com/news/articleView.html?idxno=104555.
3. (2022, November 08). Water AMI. Available online: https://www.boannews.com/media/view.asp?idx=85538.
4. (2022, November 08). IoT Malware Statistics. Available online: https://blog.sonicwall.com/en-us/2019/10/sonicwall-encrypted-attacks-iot-malware-surge-as-global-malware-volume-dips/.
5. Vaccari, I., Aiello, M., and Cambiaso, E. (2020). SlowITe, a Novel Denial of Service Attack Affecting MQTT. Sensors, 20.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献