entropy-logo

Journal Browser

Journal Browser

Machine Learning for Proactive and Reactive IoT Security

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Multidisciplinary Applications".

Deadline for manuscript submissions: closed (31 March 2022) | Viewed by 2626

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
Interests: Internet of Things (IoT); attack detection; software vulnerability prediction; Markovian modelling; internet traffic modelling

E-Mail Website
Guest Editor
Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland
Interests: sensor networks; Internet of things; mitigation of privacy threats; discrete event simulation; content-oriented networks

Special Issue Information

Internet trends analysis suggests that we are on the verge of entering a new era in which the Internet will no longer be dominated by traditional human to human interactions. The share of machine to machine (M2M) connections is predicted to reach 50 percent by 2023 and its popularity is growing fast. It is this shift that should be a sign to reconsider the analysis of Internet traffic. M2M communication is usually used by Internet of things devices.

IoT connects machines, people, data and processes using the Internet. Although its popularity and reliance put on these devices are constantly increasing, the nature of its traffic is still largely unknown. Although much effort is made to facilitate the security of the IoT devices and M2M connections by introducing new security standards and guidelines, many IoT manufacturers focus mainly on size, usability and cost of the IoT devices.

Because of their constraints (limited memory, computational power, battery supply), IoT devices are more prone to cyberattacks than the traditional ones. Therefore, it is crucial to create novel, efficient and accurate intrusion prevention systems and intrusion detection systems focused precisely on these vulnerable IoT devices.

Besides this reactive approach to security, effort should be made to improve the security of the IoT devices before their deployment. It can be done by delivering accurate software vulnerability prediction systems. Security vulnerabilities are often introduced during the coding stage of the software development life cycle (SDLC). Early detection of such issues can be used to remove or repair the vulnerabilities before they become apparent. Severe consequences of data breaches result in security being foundational and a top IT priority.

This Special Issue focuses on IoT data analysis, as well as new techniques, methodologies, and tools for software vulnerability prediction and attack detection, especially those using machine learning techniques, which exhibit the versatility and great power to recognise patterns in the heterogeneous data. Additionally, the contributions regarding the IoT standards and actual IoT deployment case studies are welcome. We also encourage the authors to provide novel, reliable IoT-specific datasets, which are necessary to accurately verify the security solutions, both the proactive and the reactive ones.

Dr. Joanna Domańska
Dr. Slawomir Nowak
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Machine learning
  • Internet of things
  • IoT data analysis
  • Cyberattack detection
  • Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
  • Malware mitigation
  • Botnet detection and mitigation
  • Security of artificial intelligence
  • Software vulnerability prediction
  • Software security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 899 KiB  
Article
Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction
by Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Alexandros Chatzigeorgiou and Apostolos Ampatzoglou
Entropy 2022, 24(5), 651; https://doi.org/10.3390/e24050651 - 5 May 2022
Cited by 8 | Viewed by 2113
Abstract
Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the [...] Read more.
Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the identification (and, in turn, the mitigation) of vulnerabilities early enough during the software development cycle. The scientific community has recently focused a lot of attention on developing Deep Learning models using text mining techniques for predicting the existence of vulnerabilities in software components. However, there are also studies that examine whether the utilization of statically extracted software metrics can lead to adequate Vulnerability Prediction Models. In this paper, both software metrics- and text mining-based Vulnerability Prediction Models are constructed and compared. A combination of software metrics and text tokens using deep-learning models is examined as well in order to investigate if a combined model can lead to more accurate vulnerability prediction. For the purposes of the present study, a vulnerability dataset containing vulnerabilities from real-world software products is utilized and extended. The results of our analysis indicate that text mining-based models outperform software metrics-based models with respect to their F2-score, whereas enriching the text mining-based models with software metrics was not found to provide any added value to their predictive performance. Full article
(This article belongs to the Special Issue Machine Learning for Proactive and Reactive IoT Security)
Show Figures

Figure 1

Back to TopTop