{"title":"Man in the Middle Attack Detection for MQTT based IoT devices using different Machine Learning Algorithms","authors":"Ali Bin Mazhar Sultan, S. Mehmood, Hamza Zahid","doi":"10.1109/ICAI55435.2022.9773590","DOIUrl":null,"url":null,"abstract":"The usage of appropriate data communication protocols is critical for long-term Internet of Things (IoT) implementation and operation. The publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is widely used in the IoT world. Cyber threats on devices and networks using MQTT protocols are expected to rise with the protocol's growing popularity among IoT manufacturers. Among these threats is the man in the middle (MiTM) threat, in which an attacker listens in on or modifies traffic between two parties by intercepting conversations between them. In this paper we have implemented five different machine learning model on an open-source dataset and evaluated different parameters like accuracy, precision, recall, F1 score and most importantly training time and test time because most of IoT network are hosted on resource constrained devices like Raspberry Pi.","PeriodicalId":146842,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence (ICAI)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Artificial Intelligence (ICAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAI55435.2022.9773590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The usage of appropriate data communication protocols is critical for long-term Internet of Things (IoT) implementation and operation. The publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is widely used in the IoT world. Cyber threats on devices and networks using MQTT protocols are expected to rise with the protocol's growing popularity among IoT manufacturers. Among these threats is the man in the middle (MiTM) threat, in which an attacker listens in on or modifies traffic between two parties by intercepting conversations between them. In this paper we have implemented five different machine learning model on an open-source dataset and evaluated different parameters like accuracy, precision, recall, F1 score and most importantly training time and test time because most of IoT network are hosted on resource constrained devices like Raspberry Pi.