Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches

被引:20
|
作者
Kotenko, Igor [1 ]
Izrailov, Konstantin [2 ]
Buinevich, Mikhail [3 ]
机构
[1] Russian Acad Sci, St Petersburg Fed Res Ctr, Comp Secur Problems Lab, St Petersburg 199178, Russia
[2] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Secure Commun Syst, St Petersburg 193232, Russia
[3] St Petersburg Univ State Fire Serv EMERCOM, Dept Appl Math & Informat Technol, St Petersburg 196105, Russia
基金
俄罗斯科学基金会;
关键词
IoT systems; cyber security; static analysis; machine learning; analytic model; survey model; formalization; SOFTWARE; CODE; CLASSIFICATION; INTELLIGENCE; INTERNET; THINGS; IDENTIFICATION; BINARIES;
D O I
10.3390/s22041335
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be effective is static analysis. However, the progressive complication of the connections in IoT systems, the increase in their scale, and the heterogeneity of elements requires the automation and intellectualization of manual experts' work. A hypothesis to this end is posed that assumes the applicability of machine-learning solutions for IoT system static analysis. A scheme of this research, which is aimed at confirming the hypothesis and reflecting the ontology of the study, is given. The main contributions to the work are as follows: systematization of static analysis stages for IoT systems and decisions of machine-learning problems in the form of formalized models; review of the entire subject area publications with analysis of the results; confirmation of the machine-learning instrumentaries applicability for each static analysis stage; and the proposal of an intelligent framework concept for the static analysis of IoT systems. The novelty of the results obtained is a consideration of the entire process of static analysis (from the beginning of IoT system research to the final delivery of the results), consideration of each stage from the entirely given set of machine-learning solutions perspective, as well as formalization of the stages and solutions in the form of "Form and Content" data transformations.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] Evaluating Machine Learning approaches for Cyber and Physical anomalies in SCADA systems
    Faramondi, L.
    Flammini, F.
    Guarino, S.
    Setola, R.
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 412 - 417
  • [32] Machine Learning Security Allocation in IoT
    Karthika, P.
    Babu, R. Ganesh
    Nedumaran, A.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 474 - 478
  • [33] Analysis of Machine Learning and Deep Learning in Cyber-Physical System Security
    Ankita
    Zaguia, Atef
    Rani, Shalli
    Bashir, Ali Kashif
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 355 - 363
  • [34] Deep Learning Models for Cyber Security in IoT Networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 452 - 457
  • [35] Machine learning and deep learning approaches in IoT
    Javed A.
    Awais M.
    Shoaib M.
    Khurshid K.S.
    Othman M.
    PeerJ Computer Science, 2023, 9
  • [36] Analysis of information flow security in cyber-physical systems
    Akella, Ravi
    Tang, Han
    McMillin, Bruce M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) : 157 - 173
  • [37] Machine learning and deep learning approaches in IoT
    Javed, Abqa
    Awais, Muhammad
    Shoaib, Muhammad
    Khurshid, Khaldoon S.
    Othman, Mahmoud
    PEERJ COMPUTER SCIENCE, 2023, 9 : 1 - 30
  • [38] On Cyber-Security of Information Systems
    Sneps-Sneppe, Manfred
    Sukhomlin, Vladimir
    Namiot, Dmitry
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
  • [39] A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
    Alex, Christin
    Creado, Giselle
    Almobaideen, Wesam
    Abu Alghanam, Orieb
    Saadeh, Maha
    COMPUTERS & SECURITY, 2023, 132
  • [40] A survey on IoT security: challenges and their solutions using machine learning and blockchain technology
    Neha Sharma
    Pankaj Dhiman
    Cluster Computing, 2025, 28 (5)