Denial of Service (DOS) Attack Detection on MQTT Protocol Using the Random Forest Method
DOI:
https://doi.org/10.15575/join.v11i1.1784Keywords:
Attack detection, Denial of servive (DoS), IoT security, MQTT, Random forestAbstract
References
[1] X. Xie, Z. Jin, J. Wang, L. Yang, Y. Lu, and T. Li, “Confidence guided anomaly detection model for anti-concept drift in dynamic logs,” Journal of Network and Computer Applications, vol. 162, p. 102659, Jul. 2020, doi: 10.1016/j.jnca.2020.102659.
[2] S. Megawati and A. Lawi, “Pengembangan Sistem Teknologi Internet of Things Yang Perlu Dikembangkan Negara Indonesia,” 2021.
[3] C. B. V. Ilea and E. M. Carlini, Optimal Computation of Network Indicators for Electricity Market Bidding Zones Configuration. IEEE, 2020.
[4] N. Kamiya, “Corrections to ‘Learning-Based Signal Detection for Wireless OAM-MIMO Systems With Uniform Circular Array Antennas,’” IEEE Access, vol. 9, pp. 19818–19818, 2021, doi: 10.1109/ACCESS.2021.3054567.
[5] E. Bertino, “Data Security and Privacy in the IoT.,” EDBT, 2016, [Online]. Available: https://www.cs.purdue.edu/homes/bertino/paper-a.pdf0.pdf
[6] J. Su, S. He, and Y. Wu, “Features selection and prediction for IoT attacks,” High-Confidence Computing, vol. 2, no. 2, Jun. 2022, doi: 10.1016/j.hcc.2021.100047.
[7] F. Antony and R. Gustriansyah, “Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Automata,” MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 21, no. 1, pp. 43–52, Nov. 2021, doi: 10.30812/matrik.v21i1.1078.
[8] G. M. I. Akbar, M. A. Hariyadi, and A. Hanani, “Detection of Bruteforce Attacks on the MQTT Protocol Using Random Forest Algorithm,” Internet of Things and Artificial Intelligence Journal, vol. 3, no. 3, pp. 250–272, Aug. 2023, doi: 10.31763/iota.v3i3.630.
[9] N. F. Syed, Z. Baig, A. Ibrahim, and C. Valli, “Denial of service attack detection through machine learning for the IoT,” Journal of Information and Telecommunication, vol. 4, no. 4, pp. 482–503, 2020, doi: 10.1080/24751839.2020.1767484.
[10] N. D. Primadya, A. Nugraha, A. Luthfiarta, and S. Y. Fahrezi, “Optimasi Logistic Regression untuk Deteksi Serangan DoS pada Keamanan IoT,” Jurnal Eksplora Informatika, vol. 13, no. 2, pp. 245–252, Mar. 2024, doi: 10.30864/eksplora.v13i2.1065.
[11] A. Alabdulatif, N. N. Thilakarathne, and M. Aashiq, “Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System,” Computers, Materials and Continua, vol. 80, no. 3, pp. 3655–3683, 2024, doi: 10.32604/cmc.2024.054610.
[12] F. F. Setiadi, M. W. A. Kesiman, and K. Y. E. Aryanto, “Detection of dos attacks using naive bayes method based on internet of things (iot),” in Journal of Physics: Conference Series, IOP Publishing Ltd, Mar. 2021. doi: 10.1088/1742-6596/1810/1/012013.
[13] K. J. Harnanta, A. Bhawiyuga, and A. Basuki, “Implementasi MQTT Broker dengan Kemampuan Auto Scaling pada Internet of Things,” 2020. [Online]. Available: http://j-ptiik.ub.ac.id
[14] R. A. Khairulah, R. Herdianto, and M. A. Setiawan, “Klasifikasi Serangan Pada Jaringan Internet of Thing (IoT): Tinjauan Literatur Komparatif,” Jurnal Inovasi Teknik dan Edukasi Teknologi, vol. 3, no. 1, pp. 47–53, doi: 10.17977/um068v3i12023p47-53.
[15] F. T. Kurdi, “Random Forest Machine Learning Technique for Automatic Vegetation Detection and Modelling in LiDAR Data,” International Journal of Environmental Sciences & Natural Resources, vol. 28, no. 2, Jun. 2021, doi: 10.19080/ijesnr.2021.28.556234.
[16] A. Zilham Fadillah and R. Gunawan, “POTENSI IOT DALAM INDUSTRI 4.0,” 2024.
[17] I. Latin and A. Transactions, “MQTT Protocol: Fundamentals, Tools and Future Directions,” 2019.
[18] R. A. Radouan Ait Mouha, “Internet of Things (IoT),” Journal of Data Analysis and Information Processing, vol. 09, no. 02, pp. 77–101, 2021, doi: 10.4236/jdaip.2021.92006.
[19] A. Mcewen and H. Cassimally, “Designing the Internet of Things.”
[20] E. Longo, A. E. C. Redondi, and M. Casana, MQTT-ST: a Spanning Tree Protocol for Distributed MQTT Brokers. IEEE, 2020.
[21] Al Hanif and R. Amri, “Implementasi Internet Of Things Pada Protokol MQTT Dan HTTP Dalam Sistem Pendeteksi Banjir,” JURNAL INOVTEK POLBENG, vol. 8, no. 2, 2023.
[22] R. Poorzare and A. C. Augé, “Challenges on the way of implementing TCP over 5G networks,” IEEE Access, vol. 8, pp. 176393–176415, 2020, doi: 10.1109/ACCESS.2020.3026540.
[23] R. Tandon, “A Survey of Distributed Denial of Service Attacks and Defenses,” Aug. 2020, [Online]. Available: http://arxiv.org/abs/2008.01345
[24] I. Wijayana and M. Ardiansyah, “Optimizing Qur’an Recitation Monitoring with Random Forest Algorithm,” Khazanah Journal of Religion and Technology, vol. 2, no. 1, pp. 1–5, Jun. 2024, doi: 10.15575/kjrt.v2i1.227.
[25] P. Kumala Sari and R. Randy Suryono, “KOMPARASI ALGORITMA SUPPORT VECTOR MACHINE DAN RANDOM FOREST UNTUK ANALISIS SENTIMEN METAVERSE,” 2024.
[26] R. Tri Novita, I. Gunawan, I. Marleni, O. Gregarius Grasia, and M. Nanda Valentika abcde Teknik Elektro Sekolah Tinggi Teknologi Ronggolawe Cepu Penulis Korenspondensi, “Analisis Keamanan Wifi Menggunakan Wireshark,” 2021. [Online]. Available: https://www.researchgate.net/publication/316464159_Analisis_Keama
[27] J. Lorincz, Z. Klarin, and J. Ožegović, “A comprehensive overview of tcp congestion control in 5g networks: Research challenges and future perspectives,” Jul. 01, 2021, MDPI AG. doi: 10.3390/s21134510.
[28] A. Primajaya and B. N. Sari, “Random Forest Algorithm for Prediction of Precipitation,” Indonesian Journal of Artificial Intelligence and Data Mining (IJAIDM), vol. 1, no. 1, pp. 27–31, 2018.
[29] A. Primajaya and B. N. Sari, “Random Forest Algorithm for Prediction of Precipitation,” Indonesian Journal of Artificial Intelligence and Data Mining (IJAIDM), vol. 1, no. 1, pp. 27–31, 2018.
[30] L. Qadrini, “Undersampling dan K-Fold Random Forest Untuk Klasifikasi Kelas Tidak Seimbang,” Building of Informatics, Technology and Science (BITS), vol. 4, no. 4, Mar. 2023, doi: 10.47065/bits.v4i4.3141.
[31] M. Arief, P. Hari Trisnawan, and M. Data, “IMPLEMENTASI SISTEM DETEKSI SERANGAN SLOWLORIS PADA ARSITEKTUR JARINGAN SOFTWARE-DEFINED NETWORK MENGGUNAKAN RANDOM FOREST,” 2017. [Online]. Available: http://j-ptiik.ub.ac.id
[32] S. A. Laghari, S. Manickam, and S. Karuppayah, “A Review on SECS/GEM: A Machine-to-Machine (M2M) Communication Protocol for Industry 4.0,” International Journal of Electrical and Electronic Engineering and Telecommunications, vol. 10, no. 2, pp. 105–114, Mar. 2021, doi: 10.18178/ijeetc.10.2.105-114.
[33] D. Silva, L. I. Carvalho, J. Soares, and R. C. Sofia, “A performance analysis of internet of things networking protocols: Evaluating MQTT, CoAP, OPC UA,” Applied Sciences (Switzerland), vol. 11, no. 11, Jun. 2021, doi: 10.3390/app11114879.
[34] H. Zi Rui, T. Ying Chien, L. Xin Ee, C. Wei San, and L. Teng Yi, “Comparison of the Use of Support Vector Machine (SVM) & Random Forest Algorithms (RF) for DDOS Attack Detection”, doi: 10.47772/IJRISS.
[35] Y. Irawan, R. Pramitasari, W. M. Ashari, A. Nur, and H. Yansyah, “Support Vector Machine Classification Algorithm for Detecting DDoS Attacks on Network Traffic,” 2025. [Online]. Available: http://jurnal.polibatam.ac.id/index.php/JAIC
[36] A. Hakeem and A. Attiah, “Machine Learning-based Approach for Detecting DDoS Attacks in Software Defined Networks,” 2024.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2026 Kharisma Monika Dian Pertiwi, Nurul Azizi Hasibuan, Dyah Putri Rahmawati

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License








