{"id":"https://openalex.org/W4407783440","doi":"https://doi.org/10.1109/comsnets63942.2025.10885615","title":"Leveraging Benford\u2019s Law for Effective Intrusion Detection in MQTT-IoT Networks","display_name":"Leveraging Benford\u2019s Law for Effective Intrusion Detection in MQTT-IoT Networks","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4407783440","doi":"https://doi.org/10.1109/comsnets63942.2025.10885615"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets63942.2025.10885615","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885615","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Munmun Swain","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Munmun Swain","raw_affiliation_strings":["Indian Institute of Information Technology Sri City,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Sri City,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116346472","display_name":"Charugundla Lakshmi Nishitha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Charugundla Lakshmi Nishitha","raw_affiliation_strings":["Indian Institute of Information Technology Sri City,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Sri City,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Meghana Maganti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meghana Maganti","raw_affiliation_strings":["Indian Institute of Information Technology Sri City,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Sri City,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026959916","display_name":"Kamalakanta Sethi","orcid":"https://orcid.org/0000-0003-4986-243X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kamalakanta Sethi","raw_affiliation_strings":["Indian Institute of Information Technology Sri City,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Sri City,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031486539","display_name":"Nikhil Tripathi","orcid":"https://orcid.org/0000-0001-8944-8044"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nikhil Tripathi","raw_affiliation_strings":["Indian Institute of Information Technology Sri City,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology Sri City,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03433676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"348","last_page":"355"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mqtt","display_name":"MQTT","score":0.818611204624176},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7474453449249268},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7192946672439575},{"id":"https://openalex.org/keywords/benfords-law","display_name":"Benford's law","score":0.6673128604888916},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5597547292709351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46468472480773926},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43872225284576416},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4237339496612549},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12570396065711975},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08316725492477417}],"concepts":[{"id":"https://openalex.org/C132868160","wikidata":"https://www.wikidata.org/wiki/Q10322548","display_name":"MQTT","level":3,"score":0.818611204624176},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7474453449249268},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7192946672439575},{"id":"https://openalex.org/C152636012","wikidata":"https://www.wikidata.org/wiki/Q817168","display_name":"Benford's law","level":2,"score":0.6673128604888916},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5597547292709351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46468472480773926},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43872225284576416},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4237339496612549},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12570396065711975},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08316725492477417},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets63942.2025.10885615","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885615","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1835421862","https://openalex.org/W1980147927","https://openalex.org/W2027281287","https://openalex.org/W2114952587","https://openalex.org/W2122646361","https://openalex.org/W2147384283","https://openalex.org/W2410685830","https://openalex.org/W2768696376","https://openalex.org/W2787701431","https://openalex.org/W2892556724","https://openalex.org/W2904850375","https://openalex.org/W2913497771","https://openalex.org/W3011003588","https://openalex.org/W3012094546","https://openalex.org/W3043579230","https://openalex.org/W3096448935","https://openalex.org/W3123719686","https://openalex.org/W3155354435","https://openalex.org/W3164531790","https://openalex.org/W3166711963","https://openalex.org/W3186890950","https://openalex.org/W3195514317","https://openalex.org/W3217284878","https://openalex.org/W4206171084","https://openalex.org/W4281553771","https://openalex.org/W4281749754","https://openalex.org/W4285157251","https://openalex.org/W4296771116","https://openalex.org/W4400908323","https://openalex.org/W6721266297","https://openalex.org/W6726789191"],"related_works":["https://openalex.org/W3188283133","https://openalex.org/W2967645615","https://openalex.org/W4296174532","https://openalex.org/W3096163214","https://openalex.org/W3201170624","https://openalex.org/W4379616043","https://openalex.org/W2936457350","https://openalex.org/W4295036342","https://openalex.org/W2769489861","https://openalex.org/W2802923594"],"abstract_inverted_index":{"Heterogeneous":[0],"smart":[1],"devices":[2],"communicate":[3],"through":[4],"different":[5,136],"messaging":[6],"protocols":[7],"in":[8,55],"IoT":[9,57,150],"networks.":[10],"Among":[11],"them,":[12],"Message":[13],"Queuing":[14],"Telemetry":[15],"Transport":[16],"(MQTT)":[17],"is":[18],"a":[19,82,154],"widely":[20],"used":[21],"communication":[22],"protocol":[23],"due":[24],"to":[25,38,51,60,73],"its":[26,61],"lightweight":[27,83],"and":[28,64,96,123,139,152,156],"publish-subscribe":[29],"architecture.":[30],"However,":[31],"these":[32,53,78,164],"features":[33],"make":[34],"it":[35],"more":[36],"vulnerable":[37],"various":[39],"types":[40],"of":[41,120,131,149],"cyber-attacks.":[42],"Therefore,":[43],"effective":[44],"intrusion":[45],"detection":[46],"systems":[47],"must":[48],"be":[49],"designed":[50,86],"detect":[52],"threats":[54],"the":[56,109,146],"environment.":[58],"Due":[59],"limited":[62],"memory":[63],"computational":[65],"power,":[66],"existing":[67],"IDS":[68,92,133],"models":[69],"require":[70],"significant":[71],"modifications":[72],"work":[74],"efficiently.":[75],"To":[76],"overcome":[77],"challenges,":[79],"we":[80],"proposed":[81,91],"IDS,":[84],"specifically":[85],"for":[87,159],"resource-constrained":[88],"devices.":[89],"Our":[90,103],"utilizes":[93],"Benford\u2019s":[94],"Law":[95],"linear":[97],"regression":[98],"on":[99],"MQTT":[100,125],"network":[101,126,137],"flows.":[102,127],"extensive":[104],"experiments":[105],"conducted":[106],"by":[107],"using":[108],"MQTT-IoT-IDS2020":[110],"dataset":[111,117],"have":[112],"demonstrated":[113],"promising":[114],"results.":[115],"The":[116],"supports":[118],"analysis":[119],"both":[121],"bidirectional":[122],"unidirectional":[124],"It":[128],"allows":[129],"validation":[130],"our":[132],"model":[134],"under":[135],"conditions":[138],"attack":[140],"scenarios.":[141],"This":[142],"approach":[143],"effectively":[144],"meets":[145],"unique":[147],"demands":[148],"networks":[151],"offers":[153],"practical":[155],"efficient":[157],"solution":[158],"detecting":[160],"malicious":[161],"activities":[162],"within":[163],"environments.":[165]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
