Mostrar el registro sencillo del ítem

dc.contributorEscuela de Ingenierias Industrial, Informática y Aeroespaciales_ES
dc.contributor.authorMichelena, Álvaro
dc.contributor.authorAveleira Mata, José Antonio 
dc.contributor.authorJove, Esteban
dc.contributor.authorBayón-Gutiérrez, Martín
dc.contributor.authorNovais, Paulo
dc.contributor.authorRomero, Oscar Fontenla
dc.contributor.authorCalvo‐Rolle, José Luis
dc.contributor.authorAlaiz Moretón, Héctor 
dc.contributor.otherIngenieria de Sistemas y Automaticaes_ES
dc.date2023
dc.date.accessioned2023-04-25T10:44:19Z
dc.date.available2023-04-25T10:44:19Z
dc.identifier.citationMichelena, Á., Aveleira-Mata, J., Jove, E., Bayón-Gutiérrez, M., Novais, P., Romero, O. F., Calvo-Rolle, J. L., & Aláiz-Moretón, H. (2023). A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert Systems. https://doi.org/10.1111/exsy.13263es_ES
dc.identifier.issn0266-4720
dc.identifier.urihttp://hdl.handle.net/10612/16164
dc.description.abstract[EN] One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, is difficult to detect by traditional cyber-attack detection systems. MitM attacks on internet of things systems take advantage of special features of the protocols and cause system disruptions, making them invisible to legitimate elements. In this work, an intrusion detection system (IDS), where intelligent models can be deployed, is the approach to detect this type of attack considering network alterations. Therefore, this paper presents a novel method to develop the intelligent model used by the IDS, being this method based on a hybrid process. The first stage of the process implements a feature extraction method, while the second one applies different supervised classification techniques, both over a message queuing telemetry transport (MQTT) dataset compiled by authors in previous works. The contribution shows excellent performance for any compared classification methods. Likewise, the best results are obtained using the method with the highest computational cost. Thanks to this, a functional IDS will be able to prevent MQTT attacks.es_ES
dc.languageenges_ES
dc.publisherWiley-Blackwelles_ES
dc.rightsAtribución-NoComercial 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/*
dc.subjectIngeniería de sistemases_ES
dc.subject.otherArtificial neural networkses_ES
dc.subject.otherCybersecurityes_ES
dc.subject.otherDecision treeses_ES
dc.subject.otherIntrusion detection systemes_ES
dc.subject.otherK-nearest-neighbourses_ES
dc.subject.otherMan-in-the-middlees_ES
dc.subject.otherMessage queuing telemetry transportes_ES
dc.subject.otherPrincipal component analysises_ES
dc.subject.otherRandom forestes_ES
dc.titleA novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transportes_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.identifier.doi10.1111/exsy.13263
dc.description.peerreviewedSIes_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/Universidad de León/2021/00145/001es_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.identifier.essn1468-0394
dc.journal.titleExpert Systemses_ES
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones_ES
dc.description.projectPublicación en abierto financiada por el Consorcio de Bibliotecas Universitarias de Castilla y León (BUCLE), con cargo al Programa Operativo 2014ES16RFOP009 FEDER 2014-2020 DE CASTILLA Y LEÓN, Actuación:20007-CL - Apoyo Consorcio BUCLEes_ES


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial 4.0 Internacional