IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities

Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities
View Sample PDF
Author(s): Aissa Ben Yahya (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco), Hicham El Akhal (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco)and Abdelbaki El Belrhiti El Alaoui (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco)
Copyright: 2024
Pages: 20
Source title: Enhancing Performance, Efficiency, and Security Through Complex Systems Control
Source Author(s)/Editor(s): Idriss Chana (ESTM, Moulay Ismail University of Meknès, Morocco), Aziz Bouazi (ESTM, Moulay Ismail University of Meknès, Morocco)and Hussain Ben-azza (ENSAM, Moulay Ismail University of Meknes, Morocco)
DOI: 10.4018/979-8-3693-0497-6.ch014

Purchase

View Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities on the publisher's website for pricing and purchasing information.

Abstract

The security of embedded systems is deteriorating in comparison to conventional systems due to resource limitations in memory, processing, and power. Daily publications highlight various vulnerabilities associated with these systems. While significant efforts have been made to systematize and analyze these vulnerabilities, most studies focus on specific areas within embedded systems and lack the implementation of artificial intelligence (AI). This research aims to address these gaps by utilizing support vector machine (SVM) to classify vulnerabilities sourced from the national vulnerabilities database (NVD) and specifically targeting embedded system vulnerabilities. Results indicate that seven of the top 10 common weakness enumeration (CWE) vulnerabilities in embedded systems are also present in the 2022 CWE Top 25 Most Dangerous Software Weaknesses. The findings of this study will facilitate security researchers and companies in comprehensively analyzing embedded system vulnerabilities and developing tailored solutions.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom