Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches

被引:20
|
作者
Kotenko, Igor [1 ]
Izrailov, Konstantin [2 ]
Buinevich, Mikhail [3 ]
机构
[1] Russian Acad Sci, St Petersburg Fed Res Ctr, Comp Secur Problems Lab, St Petersburg 199178, Russia
[2] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Secure Commun Syst, St Petersburg 193232, Russia
[3] St Petersburg Univ State Fire Serv EMERCOM, Dept Appl Math & Informat Technol, St Petersburg 196105, Russia
基金
俄罗斯科学基金会;
关键词
IoT systems; cyber security; static analysis; machine learning; analytic model; survey model; formalization; SOFTWARE; CODE; CLASSIFICATION; INTELLIGENCE; INTERNET; THINGS; IDENTIFICATION; BINARIES;
D O I
10.3390/s22041335
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be effective is static analysis. However, the progressive complication of the connections in IoT systems, the increase in their scale, and the heterogeneity of elements requires the automation and intellectualization of manual experts' work. A hypothesis to this end is posed that assumes the applicability of machine-learning solutions for IoT system static analysis. A scheme of this research, which is aimed at confirming the hypothesis and reflecting the ontology of the study, is given. The main contributions to the work are as follows: systematization of static analysis stages for IoT systems and decisions of machine-learning problems in the form of formalized models; review of the entire subject area publications with analysis of the results; confirmation of the machine-learning instrumentaries applicability for each static analysis stage; and the proposal of an intelligent framework concept for the static analysis of IoT systems. The novelty of the results obtained is a consideration of the entire process of static analysis (from the beginning of IoT system research to the final delivery of the results), consideration of each stage from the entirely given set of machine-learning solutions perspective, as well as formalization of the stages and solutions in the form of "Form and Content" data transformations.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] IOT-BASED cyber security identification model through machine learning technique
    Lal B.
    Ravichandran S.
    Kavin R.
    Anil Kumar N.
    Bordoloi D.
    Ganesh Kumar R.
    Measurement: Sensors, 2023, 27
  • [22] A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers
    Harahsheh K.
    Chen C.-H.
    Informatica (Slovenia), 2023, 47 (06): : 1 - 54
  • [23] Machine learning based solutions for security of Internet of Things (IoT): A survey
    Tahsien, Syeda Manjia
    Karimipour, Hadis
    Spachos, Petros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161
  • [24] A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
    Al-Garadi, Mohammed Ali
    Mohamed, Amr
    Al-Ali, Abdulla Khalid
    Du, Xiaojiang
    Ali, Ihsan
    Guizani, Mohsen
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1646 - 1685
  • [25] AI security and cyber risk in IoT systems
    Radanliev, Petar
    De Roure, David
    Maple, Carsten
    Nurse, Jason R. C.
    Nicolescu, Razvan
    Ani, Uchenna
    FRONTIERS IN BIG DATA, 2024, 7
  • [26] Implications of Machine learning in Cyber Security
    Mangalraj, P.
    2019 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WI 2019 COMPANION), 2019, : 142 - 143
  • [27] Machine Learning Used In Cyber Security
    Attila, Nagy
    Szilvia, Acs
    Aniko, Horvath-Kiss
    Beatrix, Fregan
    Zoltan, Rajnai
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 297 - 302
  • [28] A Bibliometric Analysis of Recent Research on Machine Learning for Cyber Security
    Makawana, Pooja R.
    Jhaveri, Rutvij H.
    INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, 2018, 19 : 213 - 226
  • [29] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [30] Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey
    Dritsas, Elias
    Trigka, Maria
    FUTURE INTERNET, 2024, 16 (09)