Research Article

A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques

Volume: 10 Number: 4 December 31, 2024
EN

A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques

Abstract

The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have grown significantly in the last decade, underlining the increasing need for effective, secure, and reliable data communication protocols. The widely accepted Message Queuing Telemetry Transport (MQTT) protocol, with its structure that meets the needs of welding-oriented devices in IoT and IIoT applications, is a prime example. However, its user-friendly simplicity also makes it susceptible to threats such as Dispersed Services Rejection (DDOS), Brete-Force, and incorrectly shaped package attacks. This article introduces a robust and reliable framework for preventing and defending against such attacks in MQTT-based IIoT systems based on the theory of merging attacks. The expert system incorporates the Adaboost model and can detect anomalies by processing network traffic in a closed setting and identifying impending threats. With its robust design, the system was subjected to various attack scenarios during testing, and it consistently detected interventions with an average accuracy of 92.7%, demonstrating its potential for use in intervention detection systems. The research findings not only contribute to the theoretical and practical concerns about the effective protection of IIoT systems but also offer hope for the future of cybersecurity in these systems.

Keywords

References

  1. M. Al-Fayoumi, Q. A. Al-Haija, Capturing low-rate DDoS attack based on MQTT protocol in software defined-IoT environment, Array 19 (2023) 100316 10 pages.
  2. M. I. Fikriansyah, S. A. Karimah, F. Setiadi, Detection of DDOS attacks in IIoT case using machine learning algorithms, International Conference on Data Science and Its Applications (ICoDSA), 2024 IEEE, pp. 117–121.
  3. E. Shahri, P. Pedreiras, L. Almeida, A scalable real-time SDN-based MQTT framework for industrial applications, IEEE Open Journal of the Industrial Electronics Society 5 (2024) (2024) 215–235.
  4. R. A. Mahajan, R. G. Mahajan, M. Tatiya, U. H. Mandekar, M. Shahakar, Y. Patil, Enhancing MQTT security in the internet of things with an enhanced symmetric algorithm, Journal of Electrical Systems 20 (1s) (2024) 126–137.
  5. Y. Kombate, P. Houngue, O. Samuel, Securing MQTT: unveiling vulnerabilities and innovating cyber range solutions, Procedia Computer Science 241 (2024) 69–76.
  6. F. Buccafurri, V. De Angelis, R. Nardone, Securing mqtt by blockchain-based otp authentication, Sensor 20 (7) (2020) 2002 14 pages.
  7. Z. Liu, T. Liang, J. Lyu, D. Lang, A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm, Computer Communications 221 (2024) (2024) 1–9.
  8. M. Saqib, A. H. Moon, A novel lightweight multi-factor authentication scheme for MQTT-based IoT applications, Microprocessors and Microsystems 110 (2024) (2024) 105088 20 pages.

Details

Primary Language

English

Subjects

Hardware Security, Data and Information Privacy

Journal Section

Research Article

Publication Date

December 31, 2024

Submission Date

October 1, 2024

Acceptance Date

November 28, 2024

Published in Issue

Year 2024 Volume: 10 Number: 4

APA
Gönen, S. (2024). A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques. Journal of Advanced Research in Natural and Applied Sciences, 10(4), 899-912. https://doi.org/10.28979/jarnas.1559652
AMA
1.Gönen S. A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques. JARNAS. 2024;10(4):899-912. doi:10.28979/jarnas.1559652
Chicago
Gönen, Serkan. 2024. “A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques”. Journal of Advanced Research in Natural and Applied Sciences 10 (4): 899-912. https://doi.org/10.28979/jarnas.1559652.
EndNote
Gönen S (December 1, 2024) A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques. Journal of Advanced Research in Natural and Applied Sciences 10 4 899–912.
IEEE
[1]S. Gönen, “A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques”, JARNAS, vol. 10, no. 4, pp. 899–912, Dec. 2024, doi: 10.28979/jarnas.1559652.
ISNAD
Gönen, Serkan. “A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques”. Journal of Advanced Research in Natural and Applied Sciences 10/4 (December 1, 2024): 899-912. https://doi.org/10.28979/jarnas.1559652.
JAMA
1.Gönen S. A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques. JARNAS. 2024;10:899–912.
MLA
Gönen, Serkan. “A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques”. Journal of Advanced Research in Natural and Applied Sciences, vol. 10, no. 4, Dec. 2024, pp. 899-12, doi:10.28979/jarnas.1559652.
Vancouver
1.Serkan Gönen. A Novel Approach for Detection of Cyber Attacks in MQTT-Based IIoT Systems Using Machine Learning Techniques. JARNAS. 2024 Dec. 1;10(4):899-912. doi:10.28979/jarnas.1559652

 

 

 

TR Dizin 20466
 

 

SAO/NASA Astrophysics Data System (ADS)    34270

                                                   American Chemical Society-Chemical Abstracts Service CAS    34922 

 

DOAJ 32869

EBSCO 32870

Scilit 30371                        

SOBİAD 20460

 

29804 JARNAS is licensed under a Creative Commons Attribution-NonCommercial 4.0 International Licence (CC BY-NC).