Abstract
As the Internet of Things (IoT), 5G, and Artificial intelligence (AI) continue to converge, the number of security incidents and occurrences on the networks has recently increased. Since more devices are connected to IoT networks, security is becoming a major concern. Conventional intrusion detection systems (IDS) are not well suited for use in the complex lightweight IoT environment. This research paper presented an IDS for the smart city environment based on IoT- Message queuing telemetry transport (MQTT) networks that could detect attacks using shallow learning algorithms. The proposed framework has four parts (i) a smart city network model with multiple MQTT clients (sensors and IoT devices) is created with the help of hardware. (ii) Injected a flooding attack on the MQTT broker to create the IDS dataset with normal and attack features, (iii) Based on the acute feature selection algorithm to select the optmized features from the raw dataset and validated with the Jaccard coefficient. (iv) The dataset is further trained and validated using shallow learning algorithms such as extreme gradient boosting (XGB), K-nearest Neighbors (KNN) and Random forest (RF). Experimental results outperform with better attack detection rate, attack prediction rate and improved accuracy over 97% with lower redundancy using selected features. Experimental results show that the proposed approach is more vulnerable to attacks in the IoT network.
Similar content being viewed by others
Data Availability
Data available on request from the authors
Code Availability
Not Applicable
References
Akhtar S, Zahoor E (2021) “Formal specification and verification of mqtt protocol in pluscal-2,” Wireless Personal Communications, pp. 1–18
Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-iiotid: A connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J 9(5):3962–3977
Conti M, Dehghantanha A, Franke K, Watson S (2018) “Internet of things security and forensics: Challenges and opportunities,” pp. 544–546
Dinculeană D, Cheng X (2019) Vulnerabilities and limitations of mqtt protocol used between iot devices. Appl Sci 9(5):848
Du P, Abe S (2007) “Detecting dos attacks using packet size distribution,” in 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems. IEEE, pp. 93–96
Gupta V, Khera S, Turk N (2021) Mqtt protocol employing iot based home safety system with abe encryption. Multimed Tools Appl 80(2):2931–2949
Haripriya A (2019) Kulothungan K (2019) “Secure-mqtt: an efficient fuzzy logic-based approach to detect dos attack in mqtt protocol for internet of things,’’. EURASIP J Wirel Commun Netw 1:1–15
Herrero R (2020) Mqtt-sn, coap, and rtp in wireless iot real-time communications. Multimedia Systems 26(6):643–654
Hintaw AJ, Manickam S, Aboalmaaly MF, Karuppayah S (2021) Mqtt vulnerabilities, attack vectors and solutions in the internet of things (iot). IETE J Res 0(0):1–30. https://doi.org/10.1080/03772063.2021.1912651
Hwang HC, Park J, Shon JG (2016) Design and implementation of a reliable message transmission system based on mqtt protocol in iot. Wirel Pers Commun 91(4):1765–1777
Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121
Kawaguchi R, Bandai M (2020) “Edge based mqtt broker architecture for geographical iot applications,” In: 2020 International Conference on Information Networking (ICOIN). IEEE, pp. 232–235
Khan R, Khan SU, Zaheer R, Khan S (2012) “Future internet: The internet of things architecture, possible applications and key challenges,” In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260
Kim G, Kang S, Park J, Chung K (2019) An mqtt-based context-aware autonomous system in onem2m architecture. IEEE Internet Things J 6(5):8519–8528
Kondoro A, Dhaou IB, Tenhunen H, Mvungi N (2021) Real time performance analysis of secure iot protocols for microgrid communication. Futur Gener Comput Syst 116:1–12
Kotak J, Shah A, Rajdev P (2019) “A comparative analysis on security of mqtt brokers”
Larriva-Novo X, Vega-Barbas M, Villagra VA, Rivera D, Alvarez-Campana M, Berrocal J (2020) Efficient distributed preprocessing model for machine learning-based anomaly detection over large-scale cybersecurity datasets. Appl Sci 10(10):3430
Layeghy S, Portmann M (2022) “On generalisability of machine learning-based network intrusion detection systems,” arXiv:2205.04112
Mishra B, Kertesz A (2020) “The use of mqtt in m2m and iot systems: A survey,” IEEE Access, vol. 8, pp. 201 071–201 086
MQTT, “MQTT: The Standard for IoT Messaging,” 2021. [Online]. Available: https://mqtt.org/
Muthukrishnan R, Rohini R (2016) “Lasso: A feature selection technique in predictive modeling for machine learning,” In: 2016 IEEE international conference on advances in computer applications (ICACA). IEEE, spp. 18–20s
Narote A, Zutshi V, Potdar A, Vichare R (2022) “D-dos attack prediction using machine learning algorithms.”
Nawandar NK, Satpute VR (2019) Iot based low cost and intelligent module for smart irrigation system. Comput Electron Agric 162:979–990
Park CS, Nam HM (2020) “Security architecture and protocols for secure mqtt-sn,” IEEE Access, vol. 8, pp. 226 422–226 436
Rathore MM, Ahmad A, Paul A, Rho S (2016) Urban planning and building smart cities based on the internet of things using big data analytics. Comput Netw 101:63–80
Sarker IH (2021) Cyberlearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things 14:100393
Seoane V, Garcia-Rubio C, Almenares F, Campo C (2021) Performance evaluation of coap and mqtt with security support for iot environments. Comput Netw vol 197:18–27
Syed NF, Baig Z, Ibrahim A, Valli C (2020) Denial of service attack detection through machine learning for the iot. J Inf Telecommun 4(4):482–503
Vaccari I, Aiello M, Cambiaso E (2020) Slowite, a novel denial of service attack affecting mqtt. Sensors 20(10):2932
Vaccari I, Chiola G, Aiello M, Mongelli M, Cambiaso E (2020) Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22):6578
Veeramanikandan M, Sankaranarayanan S (2019) Publish/subscribe based multi-tier edge computational model in internet of things for latency reduction. J Parallel Distrib Comput 127:18–27
Wang Z, Wu C, Zheng K, Niu X, Wang X (2019) “Smotetomek-based resampling for personality recognition,” IEEE Access, vol. 7, pp. 129 678–129 689
Whitmore A, Agarwal A, Da Xu L (2015) The internet of things-a survey of topics and trends. Inf Syst Front 17(2):261–274
Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) “Machine learning and deep learning methods for cybersecurity,” Ieee access, vol. 6, pp. 35 365–35 381
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Funding
This research received no external funding
Author information
Authors and Affiliations
Contributions
SH; Designed the study and implementation, draft and DT; Conceptualization, Investigation, Validation and Review.
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare no conflict of interest
Ethical Approval
Not Applicable
Informed consent
Not Applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
S, H., T, D. An Ensemble Intrusion Detection System based on Acute Feature Selection. Multimed Tools Appl 83, 8267–8280 (2024). https://doi.org/10.1007/s11042-023-15788-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15788-x