dc.contributor | Escuela de Ingenierias Industrial, Informática y Aeroespacial | es_ES |
dc.contributor.author | Muñoz Castañeda, Ángel Luis | |
dc.contributor.author | Aveleira Mata, José Antonio | |
dc.contributor.author | Alaiz Moretón, Héctor | |
dc.contributor.other | Algebra | es_ES |
dc.date | 2023-03-17 | |
dc.date.accessioned | 2024-03-22T08:13:58Z | |
dc.date.available | 2024-03-22T08:13:58Z | |
dc.identifier.citation | Muñoz Castañeda, Á. L., Mata, J. A. A., & Aláiz-Moretón, H. (2023). Characterization of threats in IoT from an MQTT protocol-oriented dataset. Complex and Intelligent Systems, 9(5), 5281-5296. https://doi.org/10.1007/S40747-023-01000-Y | es_ES |
dc.identifier.issn | 2199-4536 | |
dc.identifier.other | https://link.springer.com/article/10.1007/s40747-023-01000-y | es_ES |
dc.identifier.uri | https://hdl.handle.net/10612/19281 | |
dc.description.abstract | [EN] Nowadays, the cybersecurity of Internet of Thing (IoT) environments is a big challenge. The analysis of network traffic and the use of automated estimators built up with machine learning techniques have been useful in detecting intrusions in traditional networks. Since the IoT networks require new and particular protocols to control the communications between the different devices involved in the networks, the knowledge acquired in the study of general networks may be unuseful some times. The goal of this paper is twofold. On the one hand, we aim to obtain a consistent dataset of the network traffic of an IoT system based on the Message Queue Telemetry Transport protocol (MQTT) and undergoing certain type of attacks. On the other hand, we want to characterize each of these attacks in terms of the minimum possible number of significant variables allowed by this protocol. Obtaining the data set has been achieved by studying the MQTT protocol in depth, while its characterization has been addressed through a hybrid (filter/wrapper) feature selection algorithm based on the idea behind the minimum-redundancy maximum-relevance (mRMR) algorithm. The dataset, together with the feature selection algorithm, carries out a characterization of the different attacks which is optimal in terms of the accuracy of the machine learning models trained on it as well as in terms of the capability of explaining their underlying nature. This confirms the consistency of the dataset | es_ES |
dc.language | eng | es_ES |
dc.publisher | Springer | es_ES |
dc.rights | Atribución 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.subject | Informática | es_ES |
dc.subject | Ingeniería de sistemas | es_ES |
dc.subject.other | IoT | es_ES |
dc.subject.other | MQTT | es_ES |
dc.subject.other | Machine learning | es_ES |
dc.subject.other | Features selection | es_ES |
dc.title | Characterization of threats in IoT from an MQTT protocol-oriented dataset | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.identifier.doi | 10.1007/S40747-023-01000-Y | |
dc.description.peerreviewed | SI | es_ES |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.identifier.essn | 2198-6053 | |
dc.journal.title | Complex & Intelligent Systems | es_ES |
dc.volume.number | 9 | es_ES |
dc.issue.number | 5 | es_ES |
dc.page.initial | 5281 | es_ES |
dc.page.final | 5296 | es_ES |
dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | es_ES |
dc.subject.unesco | 1203.12 Bancos de Datos | es_ES |
dc.subject.unesco | 1203.17 Informática | es_ES |
dc.subject.unesco | 1203.04 Inteligencia Artificial | es_ES |
dc.description.project | This work is partially supported by Instituto Nacional de Ciberseguridad (INCIBE), Junta de Castilla y Leon–Consejería de Educación (LE078G18, UXXI2018/000149, U-220), powered by NVIDIA GPU Grant Program and developed in Research Institute of Applied Sciences in Cybersecurity (RIASC). | es_ES |
dc.description.project | Junta de Castilla y Leon–Consejería de Educación (LE078G18, UXXI2018/000149, U-220) | es_ES |