IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities

Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities
View Sample PDF
Author(s): Aissa Ben Yahya (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco), Hicham El Akhal (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco)and Abdelbaki El Belrhiti El Alaoui (Faculty of Sciences, Moulay Ismail University of Meknes, Morocco)
Copyright: 2024
Pages: 20
Source title: Enhancing Performance, Efficiency, and Security Through Complex Systems Control
Source Author(s)/Editor(s): Idriss Chana (ESTM, Moulay Ismail University of Meknès, Morocco), Aziz Bouazi (ESTM, Moulay Ismail University of Meknès, Morocco)and Hussain Ben-azza (ENSAM, Moulay Ismail University of Meknes, Morocco)
DOI: 10.4018/979-8-3693-0497-6.ch014

Purchase

View Machine Learning-Based Collection and Analysis of Embedded Systems Vulnerabilities on the publisher's website for pricing and purchasing information.

Abstract

The security of embedded systems is deteriorating in comparison to conventional systems due to resource limitations in memory, processing, and power. Daily publications highlight various vulnerabilities associated with these systems. While significant efforts have been made to systematize and analyze these vulnerabilities, most studies focus on specific areas within embedded systems and lack the implementation of artificial intelligence (AI). This research aims to address these gaps by utilizing support vector machine (SVM) to classify vulnerabilities sourced from the national vulnerabilities database (NVD) and specifically targeting embedded system vulnerabilities. Results indicate that seven of the top 10 common weakness enumeration (CWE) vulnerabilities in embedded systems are also present in the 2022 CWE Top 25 Most Dangerous Software Weaknesses. The findings of this study will facilitate security researchers and companies in comprehensively analyzing embedded system vulnerabilities and developing tailored solutions.

Related Content

Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar. © 2025. 30 pages.
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala. © 2025. 28 pages.
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh. © 2025. 20 pages.
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian. © 2025. 28 pages.
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain. © 2025. 28 pages.
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur. © 2025. 22 pages.
Djamel Saba, Abdelkader Hadidi. © 2025. 28 pages.
Body Bottom