Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchrono...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/4587862 |
id |
doaj-23a95123747c478ab5df2e4299b285aa |
---|---|
record_format |
Article |
spelling |
doaj-23a95123747c478ab5df2e4299b285aa2021-09-27T00:52:04ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/4587862Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real TimeZhenyu Gao0Jian Cao1Wei Wang2Huayun Zhang3Zengrong Xu4Nari Group CorporationNari Group CorporationNari Group CorporationNari Group CorporationNari Group CorporationIndustry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.http://dx.doi.org/10.1155/2021/4587862 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhenyu Gao Jian Cao Wei Wang Huayun Zhang Zengrong Xu |
spellingShingle |
Zhenyu Gao Jian Cao Wei Wang Huayun Zhang Zengrong Xu Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time Security and Communication Networks |
author_facet |
Zhenyu Gao Jian Cao Wei Wang Huayun Zhang Zengrong Xu |
author_sort |
Zhenyu Gao |
title |
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time |
title_short |
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time |
title_full |
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time |
title_fullStr |
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time |
title_full_unstemmed |
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time |
title_sort |
online-semisupervised neural anomaly detector to identify mqtt-based attacks in real time |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0122 |
publishDate |
2021-01-01 |
description |
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems. |
url |
http://dx.doi.org/10.1155/2021/4587862 |
work_keys_str_mv |
AT zhenyugao onlinesemisupervisedneuralanomalydetectortoidentifymqttbasedattacksinrealtime AT jiancao onlinesemisupervisedneuralanomalydetectortoidentifymqttbasedattacksinrealtime AT weiwang onlinesemisupervisedneuralanomalydetectortoidentifymqttbasedattacksinrealtime AT huayunzhang onlinesemisupervisedneuralanomalydetectortoidentifymqttbasedattacksinrealtime AT zengrongxu onlinesemisupervisedneuralanomalydetectortoidentifymqttbasedattacksinrealtime |
_version_ |
1716867453471948800 |