Cargando…

Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System

The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable...

Descripción completa

Detalles Bibliográficos
Autores principales: Husnain, Muhammad, Hayat, Khizar, Cambiaso, Enrico, Fayyaz, Ubaid U., Mongelli, Maurizio, Akram, Habiba, Ghazanfar Abbas, Syed, Shah, Ghalib A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779830/
https://www.ncbi.nlm.nih.gov/pubmed/35062536
http://dx.doi.org/10.3390/s22020567
_version_ 1784637673453912064
author Husnain, Muhammad
Hayat, Khizar
Cambiaso, Enrico
Fayyaz, Ubaid U.
Mongelli, Maurizio
Akram, Habiba
Ghazanfar Abbas, Syed
Shah, Ghalib A.
author_facet Husnain, Muhammad
Hayat, Khizar
Cambiaso, Enrico
Fayyaz, Ubaid U.
Mongelli, Maurizio
Akram, Habiba
Ghazanfar Abbas, Syed
Shah, Ghalib A.
author_sort Husnain, Muhammad
collection PubMed
description The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.
format Online
Article
Text
id pubmed-8779830
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87798302022-01-22 Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System Husnain, Muhammad Hayat, Khizar Cambiaso, Enrico Fayyaz, Ubaid U. Mongelli, Maurizio Akram, Habiba Ghazanfar Abbas, Syed Shah, Ghalib A. Sensors (Basel) Article The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols. MDPI 2022-01-12 /pmc/articles/PMC8779830/ /pubmed/35062536 http://dx.doi.org/10.3390/s22020567 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Husnain, Muhammad
Hayat, Khizar
Cambiaso, Enrico
Fayyaz, Ubaid U.
Mongelli, Maurizio
Akram, Habiba
Ghazanfar Abbas, Syed
Shah, Ghalib A.
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title_full Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title_fullStr Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title_full_unstemmed Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title_short Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System
title_sort preventing mqtt vulnerabilities using iot-enabled intrusion detection system
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8779830/
https://www.ncbi.nlm.nih.gov/pubmed/35062536
http://dx.doi.org/10.3390/s22020567
work_keys_str_mv AT husnainmuhammad preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT hayatkhizar preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT cambiasoenrico preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT fayyazubaidu preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT mongellimaurizio preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT akramhabiba preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT ghazanfarabbassyed preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem
AT shahghaliba preventingmqttvulnerabilitiesusingiotenabledintrusiondetectionsystem