2022
DOI: 10.3390/electronics11030422
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent One-Class Classifiers for the Development of an Intrusion Detection System: The MQTT Case Study

Abstract: The ever-increasing number of smart devices connected to the internet poses an unprecedented security challenge. This article presents the implementation of an Intrusion Detection System (IDS) based on the deployment of different one-class classifiers to prevent attacks over the Internet of Things (IoT) protocol Message Queuing Telemetry Transport (MQTT). The utilization of real data sets has allowed us to train the one-class algorithms, showing a remarkable performance in detecting attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Another study [15] propose the implementation of an IDS that uses the Principal Component Analysis (PCA) classifier trained using a dataset created from the MQTTbased IoT network. The PCA revealed the best Area Under the Curve (AUC) of over 89% and the shortest training time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another study [15] propose the implementation of an IDS that uses the Principal Component Analysis (PCA) classifier trained using a dataset created from the MQTTbased IoT network. The PCA revealed the best Area Under the Curve (AUC) of over 89% and the shortest training time.…”
Section: Related Workmentioning
confidence: 99%
“…After training and testing the DT classifier and k-nearest neighbors algorithm (KNN), the results showed that DT's performance outperformed the other with an average Fmeasure of 93.81%. However, the imbalanced dataset issue was not addressed or resolved in either of the three previous papers [13], [15], [16].…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly-based identification, on the other hand, is used to detect unknown assaults or attacks with a lack of clearly established patterns. Machine learning algorithms have recently been shown to prevent many security vulnerabilities and improve the performance of anomaly-based detection methods [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the hand's positioning and posture in connection with its body are crucial to these manual expressions' foundation. All of these complementing primitives should be considered in a succession of frames in an efficient recognition system [4]. Although these frames are time-dependent, it is impossible to evaluate the blocks in Euclidean space because of this time dependency [5].…”
Section: Introductionmentioning
confidence: 99%