Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches

被引:20
作者
Kotenko, Igor [1 ]
Izrailov, Konstantin [2 ]
Buinevich, Mikhail [3 ]
机构
[1] Russian Acad Sci, St Petersburg Fed Res Ctr, Comp Secur Problems Lab, St Petersburg 199178, Russia
[2] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Secure Commun Syst, St Petersburg 193232, Russia
[3] St Petersburg Univ State Fire Serv EMERCOM, Dept Appl Math & Informat Technol, St Petersburg 196105, Russia
基金
俄罗斯科学基金会;
关键词
IoT systems; cyber security; static analysis; machine learning; analytic model; survey model; formalization; SOFTWARE; CODE; CLASSIFICATION; INTELLIGENCE; INTERNET; THINGS; IDENTIFICATION; BINARIES;
D O I
10.3390/s22041335
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be effective is static analysis. However, the progressive complication of the connections in IoT systems, the increase in their scale, and the heterogeneity of elements requires the automation and intellectualization of manual experts' work. A hypothesis to this end is posed that assumes the applicability of machine-learning solutions for IoT system static analysis. A scheme of this research, which is aimed at confirming the hypothesis and reflecting the ontology of the study, is given. The main contributions to the work are as follows: systematization of static analysis stages for IoT systems and decisions of machine-learning problems in the form of formalized models; review of the entire subject area publications with analysis of the results; confirmation of the machine-learning instrumentaries applicability for each static analysis stage; and the proposal of an intelligent framework concept for the static analysis of IoT systems. The novelty of the results obtained is a consideration of the entire process of static analysis (from the beginning of IoT system research to the final delivery of the results), consideration of each stage from the entirely given set of machine-learning solutions perspective, as well as formalization of the stages and solutions in the form of "Form and Content" data transformations.
引用
收藏
页数:34
相关论文
共 50 条
  • [31] Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions
    Ni, Chunchun
    Li, Shan Cang
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 38
  • [32] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [33] Machine learning and deep learning approaches in IoT
    Javed, Abqa
    Awais, Muhammad
    Shoaib, Muhammad
    Khurshid, Khaldoon S.
    Othman, Mahmoud
    PEERJ COMPUTER SCIENCE, 2023, 9 : 1 - 30
  • [34] A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
    Inuwa, Muhammad Muhammad
    Das, Resul
    INTERNET OF THINGS, 2024, 26
  • [35] Machine and Deep Learning Approaches for IoT Attack Classification
    Nascita, Alfredo
    Cerasuolo, Francesco
    Di Monda, Davide
    Garcia, Jonas Thern Aberia
    Montieri, Antonio
    Pescape, Antonio
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [36] Advancements and Security Issues of IoT & Cyber Physical Systems
    Yadav, Preetesh K.
    Pareek, Sourav
    Shakeel, Saif
    Kumar, Jitendra
    Singh, Ashutosh Kumar
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 940 - 945
  • [37] How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) : 248 - 279
  • [38] Security and Machine Learning Adoption in IoT: A Preliminary Study of IoT Developer Discussions
    Uddin, Gias
    2021 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH AND PRACTICES FOR THE IOT (SERP4IOT), 2021, : 36 - 43
  • [39] On the Effectiveness of Machine and Deep Learning for Cyber Security
    Apruzzese, Giovanni
    Colajanni, Michele
    Ferretti, Luca
    Guido, Alessandro
    Marchetti, Mirco
    2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON X): MAXIMISING EFFECTS, 2018, : 371 - 389
  • [40] Machine Learning Approach to Cyber Security in Aviation
    Talegani, Ali Rahim
    Nygard, Kendall E.
    Bridgelall, Raj
    Hough, Jill
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 147 - 152