Show simple item record

dc.contributorEscuela de Ingenierias Industrial, Informática y Aeroespaciales_ES
dc.contributor.authorMuñoz Castañeda, Ángel Luis 
dc.contributor.authorAveleira Mata, José Antonio 
dc.contributor.authorAlaiz Moretón, Héctor 
dc.contributor.otherAlgebraes_ES
dc.date2023-03-17
dc.date.accessioned2024-03-22T08:13:58Z
dc.date.available2024-03-22T08:13:58Z
dc.identifier.citationMuñoz Castañeda, Á. L., Mata, J. A. A., & Aláiz-Moretón, H. (2023). Characterization of threats in IoT from an MQTT protocol-oriented dataset. Complex and Intelligent Systems, 9(5), 5281-5296. https://doi.org/10.1007/S40747-023-01000-Yes_ES
dc.identifier.issn2199-4536
dc.identifier.otherhttps://link.springer.com/article/10.1007/s40747-023-01000-yes_ES
dc.identifier.urihttps://hdl.handle.net/10612/19281
dc.description.abstract[EN] Nowadays, the cybersecurity of Internet of Thing (IoT) environments is a big challenge. The analysis of network traffic and the use of automated estimators built up with machine learning techniques have been useful in detecting intrusions in traditional networks. Since the IoT networks require new and particular protocols to control the communications between the different devices involved in the networks, the knowledge acquired in the study of general networks may be unuseful some times. The goal of this paper is twofold. On the one hand, we aim to obtain a consistent dataset of the network traffic of an IoT system based on the Message Queue Telemetry Transport protocol (MQTT) and undergoing certain type of attacks. On the other hand, we want to characterize each of these attacks in terms of the minimum possible number of significant variables allowed by this protocol. Obtaining the data set has been achieved by studying the MQTT protocol in depth, while its characterization has been addressed through a hybrid (filter/wrapper) feature selection algorithm based on the idea behind the minimum-redundancy maximum-relevance (mRMR) algorithm. The dataset, together with the feature selection algorithm, carries out a characterization of the different attacks which is optimal in terms of the accuracy of the machine learning models trained on it as well as in terms of the capability of explaining their underlying nature. This confirms the consistency of the datasetes_ES
dc.languageenges_ES
dc.publisherSpringeres_ES
dc.rightsAtribución 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectInformáticaes_ES
dc.subjectIngeniería de sistemases_ES
dc.subject.otherIoTes_ES
dc.subject.otherMQTTes_ES
dc.subject.otherMachine learninges_ES
dc.subject.otherFeatures selectiones_ES
dc.titleCharacterization of threats in IoT from an MQTT protocol-oriented datasetes_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.identifier.doi10.1007/S40747-023-01000-Y
dc.description.peerreviewedSIes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.identifier.essn2198-6053
dc.journal.titleComplex & Intelligent Systemses_ES
dc.volume.number9es_ES
dc.issue.number5es_ES
dc.page.initial5281es_ES
dc.page.final5296es_ES
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones_ES
dc.subject.unesco1203.12 Bancos de Datoses_ES
dc.subject.unesco1203.17 Informáticaes_ES
dc.subject.unesco1203.04 Inteligencia Artificiales_ES
dc.description.projectThis work is partially supported by Instituto Nacional de Ciberseguridad (INCIBE), Junta de Castilla y Leon–Consejería de Educación (LE078G18, UXXI2018/000149, U-220), powered by NVIDIA GPU Grant Program and developed in Research Institute of Applied Sciences in Cybersecurity (RIASC).es_ES
dc.description.projectJunta de Castilla y Leon–Consejería de Educación (LE078G18, UXXI2018/000149, U-220)es_ES


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución 4.0 Internacional
Except where otherwise noted, this item's license is described as Atribución 4.0 Internacional