Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks
Abstract
:1. Introduction
1.1. Objectives
- To propose a system that would allow MUD to consider additional aspects of network traffic besides considering each packet based on pre-defined ACL rules in MUD.
- To design and implement a set of algorithms to support the grouping of network traffic and identify malicious traffic.
- To evaluate the detection accuracy of the proposed algorithms.
1.2. Scope
1.3. Research Method
1.4. Contribution
1.5. Paper Structure
2. Background
2.1. Manufacturer Usage Description (MUD)
2.1.1. Overview of MUD
- Name: The name of the ACL and the associated access control entity (ACE).
- Type: Specifies the IP address version (IPv4 or IPv6).
- Protocol: Indicates the protocol usage, represented by its protocol number.
- Destination: The address of the destination host to be connected.
- Direction-initiate: Specifies the direction of connection initiation for TCP-based communication (e.g., from device or to device).
- Forwarding: Indicates whether a specific communication behaviour is allowed or denied (accept or deny).
2.1.2. Limitations of MUD for Attack Mitigation
- MUD relies solely on pre-defined ACL rules with a scope limited to certain layer 3 and layer 4 header fields.
- Behaviours and trends are not identified. The ACL rules that are implemented in the firewall from the MUD profile simply block or allow traffic on a packet-by-packet basis.
- Traffic that is otherwise allowed by MUD may still be malicious. For example, the MUD profile may allow communication to occur between a device and a server for the purposes of software updates. If that server were to be compromised by a threat actor, MUD would be unable to identify the traffic as problematic, as it still may comply with the ACL rules.
2.2. Enhance Profiling Assurance (EPA) Architecture and Network Behaviour Analysis (NBA) System
2.3. Transport Control Protocol (TCP)
2.4. Message Query Telemetry Transport (MQTT)
2.5. DoS/DDoS Attacks
2.5.1. SYN Flood
2.5.2. FIN Flood
2.5.3. FIN-ACK Flood
2.5.4. ACK Flood
2.5.5. RST Flood
2.5.6. MQTT CONNECT Attack
2.5.7. MQTT PUBLISH Attack
3. Related Work
- Machine learning (ML)-based methods.
- Non-ML-based methods.
3.1. Machine Learning-Based Methods
3.2. Non-ML-Based Method
3.3. Summary of Related Studies on Attack Detection and Mitigation in MUD-Based IoT Networks
4. Proposal of the Implementation of the NBA System
4.1. Overview of the NBA System
- A complete TCP three-way handshake process.
- MQTT broker connection.
- MQTT data publish.
- MQTT broker disconnection
- A TCP session termination (via a complete four-way handshake or reset).
4.2. Session Grouping Algorithm (Algorithm 1)
- Initialisation.
- Session grouping.
- Session categorisation.
- Complete three-way handshake session: Sessions that completed the handshake process (three_way = True).
- Incomplete three-way handshake session: Session that did not complete the handshake process (three_way = False).
Algorithm 1 Session grouping |
Input: Capture network packets from a pcap file Output: Categorised TCP sessions (complete and incomplete three-way handshake sessions) 1. Begin 2. Import packets from pcap file 3. Create complete3way, incomplete3way to store categorised sessions 4. Define session tracking variables: three_way = False, four_way = False, terminate = False 5. 6. For each packet p in packets sequence do: 7. If (p.tcp_flag = SYN) then 8. Create empty list newsession 9. Add packet to newsession 10. If (p.tcp_flag = SYN-ACK) then 11. Proceed to the next packet 12. If (p.tcp_flag = ACK) and (three_way = False) then 13. Set three_way = True 14. If (p.tcp_flag = FIN-ACK) then 15. Proceed to the next packet 16. If (p.tcp_flag = ACK) and (four_way = False) then 17. Set four_way = True 18. If (p.tcp_flag = RST) or (p.tcp_flag = RST-ACK) then 19. Set terminated = True 20. 21. For each session in newsession do 22. If three_way = False then: 23. Store session in incomplete3way 24. Else: 25. Store session in complete3way 26. End algorithm |
4.3. TCP-Based DoS/DDoS Attack Detection Algorithm (Algorithm 2)
- Initialisation: Variable generation and incomplete three-way handshake sessions importing from Algorithm 1 (Section 4.2).
- Batch processing: Analyses a set of recently received packets while filtering outdated packets. This ensures that outdated packets will not affect the attack detection process.
- TCP attack classification: Detects and classifies TCP-based attacks based on TCP flag values.
Algorithm 2 TCP-based DoS/DDoS attack detection |
Input: Incomplete three-way handshake sessions (incomplete3way) from Algorithm 1 Output: Lists of detected TCP attack packets 1. Begin 2. Import incomplete3way from Algorithm 1 3. Define current_batch, syn_attack, fin_attack, finack_attack, ack_attack, rst_attack, uncategorised 4. Define max_time (time threshold), max_packet (packet threshold) 5. 6. For each packet p in incomplete3way do 7. Create new_batch to store recent packets 8. 9. //Retain only packets within the time threshold 10. For each packet pb in current_batch do 11. If (p.time-pb.time) ≤ max_time then 12. Include pb in new_batch 13. Update current_batch with new_batch 14. Add p to current_batch 15. 16. //Detect Flood Attacks 17. If size of current_batch ≥ max_packet then 18. Categorize p based on TCP flag 19. - SYN → Store p to syn_attack 20. - FIN → Store p to fin_attack 21. - FIN-ACK → Store p to finack_attack 22. - ACK → Store p to ack_attack 23. - RST → Store p to rst_attack 24. - Otherwise → Store p to uncategorised 25. Return syn_attack, fin_attack, finack_attack, ack_attack, rst_attack, uncategorised 26. End Algorithm |
4.4. MQTT CONNECT DoS/DDoS Attack Detection Algorithm (Algorithm 3)
- Single-session attack detection: Examines each session individually to identify unusually high volumes of connect packets.
- Multiple-session attack detection: Analyses multiple sessions from the same client to detect excessive reconnection attempts.
- connect: Store the extracted CONNECT packets from the imported sessions.
- client_timestamp: Store the timestamp of packets for inter-arrival time calculation.
- connect_attack: Store packets identified as CONNECT attack packets.
- uncategorised: Store packets that cannot be definitively classified as attacks.
- client_count: Record the number of CONNECT packets across sessions per client.
- max_single: The maximum number of connect packets threshold in a single session. it is used to detect potential CONNECT attacks on individual sessions.
- max_multiple: The maximum number of connect packets threshold across multiple sessions. This threshold is for detecting CONNECT attacks on multiple sessions transmitted from the same client.
- min_time: The minimum inter-arrival time threshold for detecting malicious activity. This threshold is used to compare against the packet inter-arrival time to detect potential attacks.
Algorithm 3 MQTT CONNECT DoS/DDoS attack detection |
Input: complete3way (set of sessions with completed three-way handshakes) Output: connect_attack, uncategorised packets 1. Begin 2. //Initialization 3. Import complete3way from Algorithm 1 4. Create storage for: connect, client_timestamps, connect_attack, uncategorised, client_connect_count 5. Define max_single, max_multi, min_time 6. 7. //Extract MQTT packets & track timestamps 8. For each session in complete3way do 9. For each packet p in session do 10. If p is CONNECT then 11. Store p in connect, client_timestamps[p.src_ip] 12. client_count[p.src_ip] = client_count[p.src_ip] + 1 13. 14. //Single-session and multiple-session attack detection 15. For each client do 16. Compute deltatime (inter-arrival time) for CONNECT packets 17. 18. If size of connect > max_single OR client_count[client] > max_multiple then: 19. If any deltatime in CONNECT < min_time then 20. Append CONNECT packets to connect_attack 21. Else 22. Append CONNECT packets to uncategorised 23. 24. Return connect_attack, uncategorised 25. End Algorithm |
4.5. MQTT PUBLISH DoS/DDoS Attack Detection Algorithm (Algorithm 4)
- max_packet: The maximum number of packets threshold. It is used to detect unusually high volumes of PUBLISH packets.
- min_time: The minimum packet inter-arrival time threshold. It is introduced to detect suspicious activity that indicates potential PUBLISH attacks.
Algorithm 4 MQTT PUBLISH DoS/DDoS attack detection |
Input: complete3way (sessions with completed three-way handshakes) Output: publish_attack, uncategorised 1. Begin 2. Import complete3way from Algorithm 1 3. Create storage for publish, publish_attack, uncategorised 4. Define max_packet (packet thresholds) and min_time (inter-arrival threshold) 5. //Extract MQTT PUBLISH packets 6. For each session in complete3way do: 7. For each packet p in session do: 8. If p is PUBLISH then Store p in publish 9. 10. //Compute inter-arrival times 11. Compute deltatime (inter-arrival time) for PUBLISH packets 12. 13. //Detect PUBLISH and SUBSCRIBE attacks 14. For each client do: 15. If size of publish > max_packet OR any deltatime < min_time then: 16. Add publish to publish_attack 17. Else: 18. Add publish to uncategorised 19. Return publish_attack, uncategorised 20. End Algorithm |
5. Evaluation
5.1. Testbed Setup
5.2. Detection Accuracy Evaluation
- : False-negative rate of the proposed algorithm (percentage).
- : Number of attack packets that were not detected by the proposed algorithm.
- : Total injected attack packets in the original pcap file.
- : Detection accuracy rate of the proposed algorithm (percentage).
5.3. TCP Attack Detection and Identification Performance Analysis
- max_time: 1 s.
- max_packet: 5 packets.
5.4. MQTT Attack Detection and Identification Performance Analysis
- max_single: 3 packets.
- max_multiple: 10 packets.
- min_time: 1 s.
- max_packet: 10 packets
- min_time: 1 s
5.5. Evaluation with Publicly Published Datasets
- max_time: 1 s.
- max_packet: 5 packets.
- max_single: 2 packets.
- max_multiple: 10 packets.
- min_time: 1 s.
- max_packet: 10 packets.
- min_time: 1 s.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Pranav, S.A.; Sathya Priya, S.; HariHaran, B. DDoS and Botnet Attacks: A Survey of Detection and Prevention Techniques. In Proceedings of the 2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS), Chennai, India, 18–19 April 2024; pp. 1–7. [Google Scholar]
- Kadri, M.R.; Abdelli, A.; Ben Othman, J.; Mokdad, L. Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments. Internet Things 2024, 25, 101021. [Google Scholar] [CrossRef]
- Lear, E.; Droms, R.; Romascanu, D. RFC 8520: Manufacturer Usage Description Specification. Available online: https://datatracker.ietf.org/doc/html/rfc8520 (accessed on 15 March 2024).
- Aroon, N.; Liu, V.; Kane, L.; Li, Y.; Tesfamicael, A.D.; McKague, M. An Architecture of Enhanced Profiling Assurance for IoT Networks. Electronics 2024, 13, 2832. [Google Scholar] [CrossRef]
- Manufacturer Usage Description (MUD). Available online: https://csrc.nist.gov/glossary/term/manufacturer_usage_description_mud (accessed on 10 March 2025).
- Souppaya, M.; Montgomery, D.; Polk, T.; Ranganathan, M.; Dodson, D.; Barker, W.; Johnson, S.; Kadam, A.; Pratt, C.; Thakore, D.; et al. Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021.
- What is MUD? Available online: https://developer.cisco.com/docs/mud/what-is-mud/#what-is-mud (accessed on 16 May 2024).
- US Patent Issued to CISCO TECHNOLOGY on 13 February for “Secure modification of manufacturer usage description files based on device applications” (American, Swiss Inventors). US Fed News Service, Including US State News, 14 February 2024.
- US Patent Issued to CISCO TECHNOLOGY on 12 March for “Manufacturer usage description (MUD) extensions for secure access service edge (SASE) services” (Canadian, American, German Inventors). US Fed News Service, Including US State News, 13 March 2024.
- Huawei Technologies Co., Ltd. Method for Obtaining Manufacturer Usage Description Mud File, Device, and System. News Bites—Private Companies, 8 February 2024. [Google Scholar]
- Jethanandani, M.; Agarwal, S.; Huang, L.; Blair, D. YANG Data Model for Network Access Control Lists (ACLs). Available online: https://datatracker.ietf.org/doc/html/rfc8519 (accessed on 15 March 2024).
- International Society of Automation, ISA/IEC 62443 Series of Standards. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 9 April 2025).
- Gaggero, G.B.; Armellin, A.; Girdinio, P.; Marchese, M. An IEC 62443-Based Framework for Secure-by-Design Energy Communities. IEEE Access 2024, 12, 166320–166332. [Google Scholar] [CrossRef]
- Heeb, Z.; Kalinagac, O.; Soussi, W.; Gur, G. The Impact of Manufacturer Usage Description (MUD) on IoT Security. In Proceedings of the 2022 1st International Conference on 6G Networking (6GNet), Paris, France, 6–8 July 2022. [Google Scholar]
- Postel, J. RFC793: Transmission Control Protocol. Available online: https://www.rfc-editor.org/info/rfc793 (accessed on 19 December 2024).
- Comer, D.E. Internetworking with TCP/IP Vol 1: Principle, Protocols, and Architecture; Pearson Education, Inc.: New Jersey, NJ, USA, 2014. [Google Scholar]
- Forouzan, B.A. Data Communication and Networking; The McGraw-Hill Companies: New York, NY, USA, 2013. [Google Scholar]
- MQTT: The Standard for IoT Messaging. Available online: https://mqtt.org/ (accessed on 19 December 2024).
- OASIS Message Queuing Telemetry Transport (MQTT) TC. Available online: https://groups.oasis-open.org/communities/tc-community-home2?CommunityKey=99c86e3a-593c-4448-b7c5-018dc7d3f2f6 (accessed on 4 January 2025).
- International Organization for Standardization. Information Technology—Message Queuing Telemetry Transport (MQTT) v3.1.1; International Organization for Standardization: Geneva, Switzerland, 2016; p. 81. [Google Scholar]
- Cotton, M.; Eggert, L.; Touch, J.D.; Westerlund, M.; Cheshire, S. RFC6335: Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry. Available online: https://www.rfc-editor.org/info/rfc6335 (accessed on 20 December 2024).
- Cloudflare. What is a DDoS Attack? Available online: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ (accessed on 21 February 2025).
- Zangrandi, L.M.; Ede, T.V.; Booij, T.; Sciancalepore, S.; Allodi, L.; Continella, A. Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. In Proceedings of the 38th Annual Computer Security Applications Conference, Austin, TX, USA, 5–9 December 2022. [Google Scholar]
- Kang, H.; Ahn, D.H.; Lee, G.M.; Yoo, J.D.; Park, K.H.; Kim, H.K. IoT Network Intrusion Dataset. IEEE Dataport. 2019. Available online: https://ieee-dataport.org/open-access/iot-network-intrusion-dataset (accessed on 13 February 2025).
- Morgese Zangrandi, L.; van Ede, T.; Booij, T.; Sciancalepore, S.; Allodi, L.; Continella, A. MUDscope dataset. In Proceedings of the Annual Computer Security Applications Conference 2022 (ACSAC22), Austin, TX, USA, 5–9 December 2022. [Google Scholar]
- Singh, S.; Atrey, A.; Sichitiu, M.L.; Viniotis, Y. Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 43–57. [Google Scholar]
- Hamza, A.; Gharakheili, H.H.; Benson, T.A.; Sivaraman, V. Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity. In Proceedings of the 2019 ACM Symposium on SDN Research, San Jose, CA, USA, 3–4 April 2019; pp. 36–48. [Google Scholar]
- Hamza, A.; Gharakheili, H.H.; Benson, T.A.; Batista, G.; Sivaraman, V. Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity. arXiv 2023, arXiv:2304.04987. [Google Scholar]
- Krishnan, P.; Jain, K.; Buyya, R.; Vijayakumar, P.; Nayyar, A.; Bilal, M.; Song, H. MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks. IEEE Internet Things J. 2022, 9, 6611–6622. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, Portugal, January 22–24 2018; pp. 108–166. [Google Scholar]
- Resende, P.A.A.; Drummond, A.C. The Hogzilla Dataset. Available online: https://ids-hogzilla.org/dataset/ (accessed on 24 December 2024).
- Kitnet Dataset. Available online: https://goo.gl/iShM7E (accessed on 19 February 2025).
- Mirdula, S.; Roopa, M. MUD Enabled Deep Learning Framework for Anomaly Detection in IoT Integrated Smart Building. e-Prime—Adv. Electr. Eng. Electron. Energy 2023, 5, 100186. [Google Scholar] [CrossRef]
- Hamza, A.; Ranathunga, D.; Gharakheili, H.H.; Roughan, M.; Sivaraman, V. Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles. In Proceedings of the 2018 Workshop on IoT Security and Privacy; Association for Computing Machinery: New York, NY, USA, 2018. [Google Scholar]
- Feraudo, A.; Yadav, P.; Safronov, V.; Popescu, D.A.; Mortier, R.; Wang, S.; Bellavista, P.; Crowcroft, J. CoLearn: Enabling Federated Learning in MUD-compliant IoT Edge Networks. In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking (EdgeSys ’20), New York, NY, USA, 27 April 2020; pp. 25–30. [Google Scholar]
- Matheu, S.N.; Marmol, E.; Hernandez-Ramos, J.L.; Skarmeta, A.; Baldini, G. Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities. Computer 2022, 55, 65–73. [Google Scholar] [CrossRef]
- Datta, S.; Bhattacharya, A.; Rana, R.; Venkanna, U. iDAM: A Distributed MUD Framework for Mitigation of Volumetric Attacks in IoT Networks. In Proceedings of the 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, 20–22 July 2022; pp. 326–331. [Google Scholar]
- Bikila, D.D.; Čapek, J. Machine Learning-Based Attack Detection for the Internet of Things. Future Gener. Comput. Syst. 2025, 166, 107630. [Google Scholar] [CrossRef]
- Aamir, M.; Zaidi, S.M.A. DDoS attack detection with feature engineering and machine learning: The framework and performance evaluation. Int. J. Inf. Secur. 2019, 18, 761–785. [Google Scholar] [CrossRef]
- Feraudo, A.; Popescu, D.A.; Yadav, P.; Mortier, R.; Bellavista, P. Mitigating IoT Botnet DDoS Attacks through MUD and eBPF based Traffic Filtering. In Proceedings of the 25th International Conference on Distributed Computing and Networking, Chennai, India, 4–7 January 2024; pp. 164–173. [Google Scholar]
- Moustafa, N. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 2021, 72, 102994. [Google Scholar] [CrossRef]
- Andalibi, V.; Kim, D.; Camp, J. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In Proceedings of the 2nd USENIX Workshop on Hot Topics in Edge Computing, HotEdge 2019, Co-located with USENIX ATC 2019, Renton, WA, USA, 9 July 2019. [Google Scholar]
- Hanes, D.; Jeuk, S.; Salgueiro, G. Manufacturer Usage Description (Mud) Layer 2 (L2) Support for Enhanced Security and Functionality for Multiple Network Interfaces. Available online: https://www.tdcommons.org/dpubs_series/4567/ (accessed on 3 February 2025).
- Houben, L.; Terhoeve, T.; Sciancalepore, S. MUDThread: Securing Constrained IoT Networks via Manufacturer Usage Descriptions. IEEE Commun. Mag. 2024, 63, 128–134. [Google Scholar] [CrossRef]
- Matheu García, S.N.; Sánchez-Cabrera, A.; Schiavone, E.; Skarmeta, A. Integrating the manufacturer usage description standard in the modelling of cyber–physical systems. Comput. Stand. Interfaces 2024, 87, 103777. [Google Scholar] [CrossRef]
- Datta, S.; Kotha, A.; Manohar, K.; Venkanna, U. DNS<i>guard</i>: A Raspberry Pi-Based DDoS Mitigation on DNS Server in IoT Networks. IEEE Netw. Lett. 2022, 4, 212–216. [Google Scholar] [CrossRef]
- Hadi, H.J.; Sajjad, S.M.; Nisa, K.u. BoDMitM: Botnet Detection and Mitigation System for Home Router Base on MUD. In Proceedings of the 2019 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 16–18 December 2019; pp. 139–1394. [Google Scholar]
- Cisco. Snort—Network Intrusion Detection & Prevention System. Available online: https://www.snort.org/ (accessed on 20 December 2024).
- Rao, S.; Kulkarni, R.R. Custom Trust Attribute for Iot and Iiot Devices in Manufacturer Usage Description (Mud) Profile to Mitigate Advance Persistent Threats (APTS). Available online: https://www.tdcommons.org/dpubs_series/7127 (accessed on 3 January 2025).
- Dadkhah, S.; Neto, E.C.P.; Ferreira, R.; Molokwu, R.C.; Sadeghi, S.; Ghorbani, A.A. CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet Things 2024, 28, 101351. [Google Scholar] [CrossRef]
- Vaccari, I.; Chiola, G.; Aiello, M.; Mongelli, M.; Cambiaso, E. MQTTset, a New Dataset for Machine Learning Techniques on MQTT. Sensors 2020, 20, 6578. [Google Scholar] [CrossRef] [PubMed]
Reference | Advantages | Limitations | Description |
---|---|---|---|
Zangrandi et al. [23] | High detection accuracy, few false positives | Only analyses MUD-rejected traffic, no MQTT attack detection | Development of a tool for attack detection in MUD-rejected traffic using HBDSCAN clustering and signature matching. |
Singh et al. [26] | Real-time behavioural learning for MUD profile update | Not focused on attack detection | A learning-based approach to dynamically update MUD profiles based on extracted normal behaviour data using hierarchical clustering. |
Hamza et al. [27] | Scalable, reduced false negative filtering | No MQTT-based attack detection, TCP-based attack limit to SYN, high computational resources | ML-based multistage anomaly detection with MUD for SDN-based network using One-class classification, X-means clustering. |
Hamza et al. [28] | Scalable, finer granularity on attack detection | No MQTT-based attack detection, TCP-based attack limit to SYN, high computational resources | Extension of [27] to include microflow rules for inspecting packet header in the flow if an attack has been detected. |
Krishnan et al. [29] | Scalable, high accuracy, fast attack detection | High computational resources, no MQTT-based attack detection | SDN-based MUD architecture for attack detection with digital twinning for updating MUD policies using non-symmetric deep autoencoder, random forest, and hierarchical clustering. |
S and M [34] | Scalable, high-accuracy, fast attack detection | Relies on pre-defined ACL rules, no MQTT-based attack detection | MUD-enabled deep learning framework with digital twinning for updating MUD policies using non-symmetric deep autoencoder, random forest. |
Feraudo et al. [36] | Reduces single-point failure, can be deployed in edge devices | Not focused on attack detection or mitigation | Proposal of FL-based MUD network architecture deployment using PySyft FL framework, deep neural network. |
Matheu et al. [37] | Reduces single-point failure, high-accuracy attack detection | No MQTT-specific analysis, high computational overhead | Proposal of FL-based approach for attack mitigation in MUD-based smart city networks using FL, multilayer perceptron (MLP). |
Datta et al. [38] | Reduces single-point failure, multilayered protection | No MQTT-specific analysis, high computational overhead, risk of model poisoning | FL-based multilayer MUD architecture for volumetric attack mitigation using FL, OC-SVM. |
Feraudo et al. [41] | Lightweight, high-speed packet filtering | Relies solely on pre-defined ACL rules, no MQTT attack detection | Proposal for a rate-limit extension for MUD profile and integration with eBPF for high-speed traffic filtering. |
Andalibi et al. [43] | Lightweight DDoS mitigation, secure fog layer | Relies solely on pre-defined ACL rules, no TCP- or MQTT-based attack detection | Proposal for a rate-limit extension in MUD profiles for fog computing-based MUD deployment. |
Hanes et al. [44] | Ability to manage devices with multiple interfaces | Relies solely on pre-defined ACL rules, does not directly detect or mitigate attack | Extension of MUD profile to include layer 2 details for managing multiple interfaces. |
Houben et al. [45] | Ability to deploy in low-power IoT networks | Relies solely on pre-defined ACL rules, no TCP- or MQTT-based attack detection | Extension of MUD functionality for deployment on a low-power IoT network. |
García et al. [46] | Security and risk assessment for threat notification to users | Relies solely on pre-defined ACL rules, no TCP- or MQTT-based attack detection | Extension of MUD profile for describing potential vulnerabilities to assess the risk in CPS. |
Datta et al. [47] | Lightweight, low DNS response time during attack | No TCP or MQTT attack detection | Proposal of Raspberry Pi-based MUD-enabled DDoS attack mitigation system on DNS server. |
Hadi et al. [48] | Lightweight, real-time attack detection, high detection accuracy | Limited to MUD-rejected traffic, no protocol-specific analysis | MUD deployment with Snort IDS for botnet attack detection in MUD-rejected traffic. |
Rao and Kulkarni [50] | Real-time trust adjustment | Not focused on attack detection | Proposal of dynamic ‘trust-status’ extension in MUD profile based on network behaviour analysis to automatically adjust trust level. |
Sensor 1 | Sensor 2 | ||
---|---|---|---|
IP address | 192.168.10.5 | IP address | 192.168.10.6 |
Protocol usage | TCP and MQTT | Protocol usage | TCP and MQTT |
MQTT port | 1883 | MQTT port | 1883 |
Measuring range | Measuring range | ||
Publish topic | test/tempvalue_1 | Publish topic | test/tempvalue_2 |
Publish Interval | Every 60 s | Publish Interval | Every 70 s |
Sensor 1 (192.168.10.5) | Sensor 2 (192.168.10.6) | ||||
---|---|---|---|---|---|
Attack Type | Total Packets (pcap) | Total Detected Packets | Attack Type | Total Packets (pcap) | Total Detected Packets |
SYN | 9416 | 9416 | SYN | 5306 | 5306 |
FIN | 9124 | 9124 | FIN | 9217 | 9217 |
FIN-ACK | 14,379 | 14,379 | FIN-ACK | 10,917 | 10,917 |
ACK | 27,203 | 27,203 | ACK | 3770 | 3770 |
RST | 8611 | 8611 | RST | 11,495 | 11,495 |
Sensor 1 (192.168.10.5) | Sensor 2 (192.168.10.6) | ||||
Attack Type | Total Packets (pcap) | Total Detected Packets | Attack Type | Total Packets (pcap) | Total Detected Packets |
CONNECT | 1000 | 999 | CONNECT | 1000 | 999 |
PUBLISH | 66,274 | 66,274 | PUBLISH | 33,628 | 33,628 |
BoT-IoT (TCP-Based) | ||
---|---|---|
Attack Type | Total Packets (pcap) | Total Detected Packets |
SYN | 4960 | 4953 |
CICIoMT2024 | MQTTSet | ||||
---|---|---|---|---|---|
Attack Type | Total Packets (pcap) | Total Detected Packets | Attack Type | Total Packets (pcap) | Total Detected Packets |
CONNECT | 144,390 | 143,041 | PUBLISH | 54,431 | 54,431 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aroon, N.; Kane, L.; Liu, V.; Li, Y. Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks. Electronics 2025, 14, 1653. https://doi.org/10.3390/electronics14081653
Aroon N, Kane L, Liu V, Li Y. Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks. Electronics. 2025; 14(8):1653. https://doi.org/10.3390/electronics14081653
Chicago/Turabian StyleAroon, Nut, Luke Kane, Vicky Liu, and Yuefeng Li. 2025. "Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks" Electronics 14, no. 8: 1653. https://doi.org/10.3390/electronics14081653
APA StyleAroon, N., Kane, L., Liu, V., & Li, Y. (2025). Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks. Electronics, 14(8), 1653. https://doi.org/10.3390/electronics14081653