2022
DOI: 10.3390/s22041335
|View full text |Cite
|
Sign up to set email alerts
|

Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches

Abstract: Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be effective is static analysis. However, the progressive complication of the connections in IoT systems, the increase in their scale, and the heterogeneity of elements requires the automation and intellectualization of manual experts’ work. A hypothesis to this end is posed that assumes the applicability of machine-learning solutions for I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(11 citation statements)
references
References 133 publications
(199 reference statements)
0
10
0
1
Order By: Relevance
“…As criteria Cr (abbr. for criterion), the following were reasonably chosen and assessed on a point scale: "−"-does not correspond (0 points), "+/−"-corresponds partially or potentially (0.5 points), "+"-corresponds completely (1 point): Cr 5 -simulation accuracy; if the accuracy is insufficient, the development process will contain system errors, and the identification of vulnerabilities will have errors of I and/or II types; • Cr 6 -applicability for the entire software complex; energy networks consist of a whole set of programs and require specialized modeling; • Cr 7 -the possibility of using machine learning; this is a modern trend that increases the efficiency of solving problems for various purposes [58]; • Cr 8 -reducing the influence of the human factor; this is one of the main reasons for the violation of the correctness of software engineering and the appearance of vulnerabilities in SW [59].…”
Section: Discussionmentioning
confidence: 99%
“…As criteria Cr (abbr. for criterion), the following were reasonably chosen and assessed on a point scale: "−"-does not correspond (0 points), "+/−"-corresponds partially or potentially (0.5 points), "+"-corresponds completely (1 point): Cr 5 -simulation accuracy; if the accuracy is insufficient, the development process will contain system errors, and the identification of vulnerabilities will have errors of I and/or II types; • Cr 6 -applicability for the entire software complex; energy networks consist of a whole set of programs and require specialized modeling; • Cr 7 -the possibility of using machine learning; this is a modern trend that increases the efficiency of solving problems for various purposes [58]; • Cr 8 -reducing the influence of the human factor; this is one of the main reasons for the violation of the correctness of software engineering and the appearance of vulnerabilities in SW [59].…”
Section: Discussionmentioning
confidence: 99%
“…The generated amounts of data meet the demand for careful authentication and encryption techniques. Artificial intelligence (AI) techniques are considered one of the most promising methods for addressing cyber security threats and providing security [9], [10]. Figure 1 presents the serious security risks and their mitigation scenarios in radiation monitoring systems.…”
Section: Security Risks and Mitigation Scenariosmentioning
confidence: 99%
“…The study explores the challenges and opportunities in integrating drones into various applications, including industrial automation and logistics. Addressing the scalability and security issues in IoT-based systems, authors in [12] systemizes the implementation of various static analysis stages using machine learning algorithms. The study focuses on overcoming performance bottlenecks and security threats in IoT systems.…”
Section: B Ml-based Idsmentioning
confidence: 99%