{"id":5412,"date":"2025-12-01T00:59:38","date_gmt":"2025-12-01T00:59:38","guid":{"rendered":"http:\/\/localhost:8082\/?p=5412"},"modified":"2026-01-26T08:39:51","modified_gmt":"2026-01-26T08:39:51","slug":"mqtteeb-d","status":"publish","type":"post","link":"https:\/\/eeb.uir.ac.ma\/index.php\/2025\/12\/01\/mqtteeb-d\/","title":{"rendered":"MQTTEEB-D"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5412\" class=\"elementor elementor-5412\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f2bd7c e-flex e-con-boxed e-con e-parent\" data-id=\"4f2bd7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0180981 elementor-widget elementor-widget-text-editor\" data-id=\"0180981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recent advances in pervasive technologies, such as wireless ad hoc networks and wearable sensor devices, allow the connection of everyday things to the Internet, commonly denoted as IoT (Internet of Things). IoT together with Big data technologies are seen as enablers to the development of intelligent and context-aware services and applications, e.g., healthcare, agriculture, and industrial systems. However, despite the efficiency of\u00a0 lightweight communication protocols (e.g., MQTT), they are highly vulnerable to cyber-attacks, such as <em>Distributed Denial of Service<\/em>, <em>Brute force<\/em>, and <em>SlowITe<\/em> attacks. Recently, AI-driven solutions, particularly ML and DL, have shown significant potential in enhancing IoT security, especially for MQTT-based systems. However, datasets are required for evaluating those models in IoT-based attack detection. This work aims to provide such a dataset, named MQTTEEB-D, using a deployed IoT \u00a0Lab testbed, \u00a0with monitoring and processing capabilities. MQTTEEB-D is available both in its original form, allowing users to perform data preprocessing, and in a pre-processed format, for being used to further investigate the effectiveness of AI-driven predictive analytics for IoT security and attack prevention.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d025385 e-flex e-con-boxed e-con e-parent\" data-id=\"d025385\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e7cd651 e-con-full e-flex e-con e-child\" data-id=\"e7cd651\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b64e2 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"f6b64e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"> source<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-125e011 elementor-widget elementor-widget-text-editor\" data-id=\"125e011\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left;\">Institution:\u00a0 International University of Rabat<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94408fe e-con-full e-flex e-con e-child\" data-id=\"94408fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3632b33 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"3632b33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Location   <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c7b091 elementor-widget elementor-widget-text-editor\" data-id=\"5c7b091\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"text-align: left;\"><strong>City\/Region<\/strong>: Sala Al Jadida\/Rabat-Sal\u00e9-Kenitra<\/li><li><strong>Country:<\/strong> Morocco<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bdd71a e-con-full e-flex e-con e-child\" data-id=\"3bdd71a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a0fcf4 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"1a0fcf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">accessibility<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb3f657 elementor-widget elementor-widget-text-editor\" data-id=\"eb3f657\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><ul><li>Identification number:<a href=\"https:\/\/doi.org\/10.5281\/zenodo.12820831\"> https:\/\/doi.org\/10.17632\/jfttfjn6tr.1<\/a><\/li><li>Direct URL: <a href=\"https:\/\/data.mendeley.com\/datasets\/jfttfjn6tr\/1\">https:\/\/data.mendeley.com\/datasets\/jfttfjn6tr\/1<\/a><\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-288be6b e-con-full e-flex e-con e-child\" data-id=\"288be6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54cc2e6 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"54cc2e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Reference<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70571b0 elementor-widget elementor-widget-text-editor\" data-id=\"70571b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>A. Aqachtoul et al. <a href=\"https:\/\/doi.org\/10.1016\/j.dib.2025.111897\"><em>MQTTEEB-D: A Real-World IoT Cybersecurity Dataset for AI-Powered Threat Detection in MQTT Networks<\/em><\/a>, Data in Brief Journal, 2025.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01864a1 e-flex e-con-boxed e-con e-parent\" data-id=\"01864a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efc8c0c elementor-widget-tablet__width-initial elementor-widget elementor-widget-heading\" data-id=\"efc8c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RELATED PUBLICATIONS<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2881ef1 elementor-widget elementor-widget-text-editor\" data-id=\"2881ef1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>K. Karam et al., <em><a href=\"https:\/\/www.nature.com\/articles\/s41598-025-28516-2\">ISAAF: IoT Security and Attack Prevention Framework using AI-driven Predictive Analytics<\/a>,<\/em> Scientific Reports, 15 (1), 2025.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Recent advances in pervasive technologies, such as wireless ad hoc networks and wearable sensor devices, allow the connection of everyday things to the Internet, commonly denoted as IoT (Internet of Things). IoT together with Big data technologies are seen as enablers to the development of intelligent and context-aware services and applications, e.g., healthcare, agriculture, and industrial systems. However, despite the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5452,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","footnotes":""},"categories":[69],"tags":[],"class_list":["post-5412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-datasets"],"jetpack_featured_media_url":"https:\/\/eeb.uir.ac.ma\/wp-content\/uploads\/2025\/03\/ch3-1-3.png","_links":{"self":[{"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/posts\/5412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/comments?post=5412"}],"version-history":[{"count":61,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/posts\/5412\/revisions"}],"predecessor-version":[{"id":5992,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/posts\/5412\/revisions\/5992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/media\/5452"}],"wp:attachment":[{"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/media?parent=5412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/categories?post=5412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eeb.uir.ac.ma\/index.php\/wp-json\/wp\/v2\/tags?post=5412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}