A Novel Framework for Early Intelligent Vulnerability Detection Algorithm for IoT Technology Environments

Authors

  • T Virajitha  Assistant Professor, CSE(DS) Department, CMR Engineering College, Hyderabad, Telangana, India
  • Janga Rajendar  Assistant Professor, CSE(DS) Department, CMR Engineering College, Hyderabad, Telangana, India
  • Mangalampalli Sesha Sai Lakshmi Lavanya  Assistant Professor, CSE(DS) Department, CMR Engineering College, Hyderabad, Telangana, India
  • Kommu Anusha  Assistant Professor, CSE(AIML) Department, Sri Indu College of Engineering and Technology, Hyderabad, Telangana, India

Keywords:

Intelligent early warning, vulnerability mining detection, security measurement calculation model, IoT.

Abstract

This paper specifically studies the vulnerability intelligent early warning technology withinside the IoT environment, and studies the network protection assessment method based totally definitely on the attack graph affiliation assessment of the IoT environment, and analyzes the attack graph era set of policies. Firstly, it uses the attack graph technology to installation a network protection evaluation model based totally definitely on the vulnerability affiliation assessment withinside the IoT environment. The attack graph generation algorithm policies are improved. The key attack path of the attack graph withinside the IoT environment is searched constant with the node weight value. The key attack path of the network attack graph is used to diploma the complete network protection, and the protection of the IoT environment is given. The length calculation model is used to recognize the quantitative assessment of the protection recognition of the IoT environment thru manner of way of using the attack graph. Secondly, an intelligent early warning vulnerability detection algorithm based on the dynamic stain propagation model in the IoT environment is proposed, focusing on the introduction of stains and the inspection of stains. A static detection method for early warning vulnerabilities based on the counter-example of the IoT is proposed. Through the ow detection and context sensitive detection, a possible buffer early warning vulnerability is discovered. The driver crawler realizes automatic detection, and uses function hijacking to detect the execution of the stain data. In the experimental environment, compared with the existing tools, the experimental data shows that the algorithm improves the accuracy, recall rate and efficiency of the unfiltered vulnerability of intelligent early warning detection, and proves that the proposed algorithm can effectively detect the vulnerability.

References

  1. X. Jiang and M. Diao, "A new type double-threshold signal detection algorithm for satellite communication systems based on stochastic resonance technology," Wireless Netw., vol. 10, pp. 134-145, May 2019.
  2. S.Wen, Q. Meng, C. Feng, and C. Tang, "Protocol vulnerability detection based on network traffic analysis and binary reverse engineering," PLoS ONE, vol. 12, no. 10, Oct. 2017, Art. no. e0186188.
  3. S. M. Darwish and A. G. El-Shnawy, "An intelligent database proactive cache replacement policy for mobile communication system based on genetic programming," Int. J. Commun. Syst., vol. 31, no. 2, May 2018, Art. no. e3536.
  4. H. Xu, "Intelligent modulation algorithm of WMSN communication channel," J. Discrete Math. Sci. Cryptogr., vol. 20, nos. 6-7, pp. 1477-1481, 2017.
  5. J. Haitao, Y. Guo, H. Chen, J. Guo, C. Zhou, and J. Xu, "Unauthorized access vulnerability detection method based on finite state machines for mobile applications," J. Nanjing Univ. Sci. Technol., vol. 41, no. 4, pp. 434-441, 2017.
  6. Q.-Y. Zhang, S.-B. Qiao, Y.-B. Huang, and T. Zhang, "A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix," Multimedia Tools Appl., vol. 77, no. 16, pp. 21653-21669, 2018.
  7. J. J. Anaya, A. Ponz, F. García, and E. Talavera, "Motorcycle detection for ADAS through camera and V2V Communication, a comparative analysis of two modern technologies," Expert Syst. Appl., vol. 77, pp. 148-159, Jul. 2017.
  8. A. Pinto,W. R. Schwartz, H. Pedrini, and A. Rocha, "Using visual rhythms for detecting video-based facial spoof attacks," IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 1025-1038, May 2015.
  9. W. Xu and J. Leng, "Simulation of potential vulnerability spillover detection under network active protection," Comput. Simul., vol. 183, no. 993, pp. 190-202, Mar. 2018.
  10. M.Yasinzadeh and M. Akhbari, "Detection of PMU snooping in power grid based on phasor measurement analysis," IET Gener. Transmiss. Distrib., vol. 12, no. 9, pp. 1980-1987, May 2018.
  11. M. Kumar and A. Sharma, "An integrated framework for software vulnerability detection, analysis and mitigation: An autonomic system," S         adhan  a, vol. 42, no. 9, pp. 14811493, 2017.
  12. M.-C. Chen, S.-Q. Lu, and Q.-L. Liu, "Global regularity for a 2D model of electro-kinetic fluid in a bounded domain," Acta Mathematicae Applicatae Sinica-English, vol. 34, no. 2, pp. 398-403, 2018.
  13. W.Wei, J. Su, H. Song, H.Wang, and X. Fan, "CDMA-based anti-collision algorithm for EPC global C1 Gen2 systems," Telecommun. Syst., vol. 67, no. 1, pp. 6

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
T Virajitha, Janga Rajendar, Mangalampalli Sesha Sai Lakshmi Lavanya, Kommu Anusha, " A Novel Framework for Early Intelligent Vulnerability Detection Algorithm for IoT Technology Environments, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 6, pp.311-318, November-December-2022.