Javascript must be enabled to continue!
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
View through CrossRef
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.
Title: Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
Description:
The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol.
Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow.
As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context.
Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices.
In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage.
In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities.
The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.
Related Results
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. ...
Perancangan dan Implementasi Sistem Peringatan Dini Banjir Berbasis IoT dengan ESP32, MQTT, dan Aplikasi Kodular
Perancangan dan Implementasi Sistem Peringatan Dini Banjir Berbasis IoT dengan ESP32, MQTT, dan Aplikasi Kodular
Floods are the most frequent natural disasters and cause material and non-material losses. One of the problems faced is the lack of early warning when floods occur. This problem ca...
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
Abstract
Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant mon...
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
A Novel Deep Learning-Based Intrusion Detection System for IoT Networks
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and intermed...
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
Stacking Ensemble and Federated Learning for IoT Intrusion Detection
The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As ...
Lightweight Security for MQTT-SN
Lightweight Security for MQTT-SN
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applic...
Lightweight Security for MQTT-SN
Lightweight Security for MQTT-SN
This study discusses a method to secure Message Queuing Telemetry Transport-Sensor network (MQTT-SN). MQTT-SN is a popular data communication protocol used in developing IoT applic...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

