{"title":"使用不同机器学习算法对基于MQTT的物联网设备进行中间人攻击检测","authors":"Ali Bin Mazhar Sultan, S. Mehmood, Hamza Zahid","doi":"10.1109/ICAI55435.2022.9773590","DOIUrl":null,"url":null,"abstract":"The usage of appropriate data communication protocols is critical for long-term Internet of Things (IoT) implementation and operation. The publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is widely used in the IoT world. Cyber threats on devices and networks using MQTT protocols are expected to rise with the protocol's growing popularity among IoT manufacturers. Among these threats is the man in the middle (MiTM) threat, in which an attacker listens in on or modifies traffic between two parties by intercepting conversations between them. In this paper we have implemented five different machine learning model on an open-source dataset and evaluated different parameters like accuracy, precision, recall, F1 score and most importantly training time and test time because most of IoT network are hosted on resource constrained devices like Raspberry Pi.","PeriodicalId":146842,"journal":{"name":"2022 2nd International Conference on Artificial Intelligence (ICAI)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Man in the Middle Attack Detection for MQTT based IoT devices using different Machine Learning Algorithms\",\"authors\":\"Ali Bin Mazhar Sultan, S. Mehmood, Hamza Zahid\",\"doi\":\"10.1109/ICAI55435.2022.9773590\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The usage of appropriate data communication protocols is critical for long-term Internet of Things (IoT) implementation and operation. The publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is widely used in the IoT world. Cyber threats on devices and networks using MQTT protocols are expected to rise with the protocol's growing popularity among IoT manufacturers. Among these threats is the man in the middle (MiTM) threat, in which an attacker listens in on or modifies traffic between two parties by intercepting conversations between them. In this paper we have implemented five different machine learning model on an open-source dataset and evaluated different parameters like accuracy, precision, recall, F1 score and most importantly training time and test time because most of IoT network are hosted on resource constrained devices like Raspberry Pi.\",\"PeriodicalId\":146842,\"journal\":{\"name\":\"2022 2nd International Conference on Artificial Intelligence (ICAI)\",\"volume\":\"302 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Artificial Intelligence (ICAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAI55435.2022.9773590\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Artificial Intelligence (ICAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAI55435.2022.9773590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Man in the Middle Attack Detection for MQTT based IoT devices using different Machine Learning Algorithms
The usage of appropriate data communication protocols is critical for long-term Internet of Things (IoT) implementation and operation. The publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is widely used in the IoT world. Cyber threats on devices and networks using MQTT protocols are expected to rise with the protocol's growing popularity among IoT manufacturers. Among these threats is the man in the middle (MiTM) threat, in which an attacker listens in on or modifies traffic between two parties by intercepting conversations between them. In this paper we have implemented five different machine learning model on an open-source dataset and evaluated different parameters like accuracy, precision, recall, F1 score and most importantly training time and test time because most of IoT network are hosted on resource constrained devices like Raspberry Pi.