2023
DOI: 10.1111/exsy.13263
|View full text |Cite
|
Sign up to set email alerts
|

A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport

Abstract: One of the most common attacks is man‐in‐the‐middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber‐attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work, an intrusion detection system (IDS), where intelligent models can be deployed, is the approach to detect this type of attack considering network alterations. Theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 52 publications
(56 reference statements)
0
3
0
Order By: Relevance
“…By intercepting and relaying the messages back to the intending receiver, the attacker makes the sender and the receiver believe they are directly communicating with each other. It is a sort of eavesdropping where the attacker connects with the victim's network to relay incoming and outgoing messages which could be altered by the attacker before relaying back to the receiver [3]. Man-in-the-browser is the most common MITM attack where the attacker could inject malicious proxy malware into the victim's device through browser infection.…”
Section: Man In the Middle (Mitm) Attackmentioning
confidence: 99%
“…By intercepting and relaying the messages back to the intending receiver, the attacker makes the sender and the receiver believe they are directly communicating with each other. It is a sort of eavesdropping where the attacker connects with the victim's network to relay incoming and outgoing messages which could be altered by the attacker before relaying back to the receiver [3]. Man-in-the-browser is the most common MITM attack where the attacker could inject malicious proxy malware into the victim's device through browser infection.…”
Section: Man In the Middle (Mitm) Attackmentioning
confidence: 99%
“…The public key is used for encryption, while the private key, held exclusively by the receiver, is used for decryption. Notable ciphers for Asymmetric Encryption encompass RSA, Diffie-Hellman, and defence against potential threats like Man-in-the-Middle attacks [95], [96].…”
Section: Secure Shell (Ssh)mentioning
confidence: 99%
“…Aveleira‐Mata et al (2023) discuss how to detect man‐in‐the‐middle attacks in MQTT IoT environments using supervised machine learning models. The approach uses an MQTT dataset with man‐in‐the‐middle attacks compiled by the authors.…”
Section: Summary Of Contributionsmentioning
confidence: 99%