Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/14961
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKushwaha, Sumit-
dc.contributor.authorAsha, V-
dc.contributor.authorKumar, B Santhosh-
dc.contributor.authorSingh, Navdeep-
dc.contributor.authorPrabagar, S-
dc.contributor.authorSupriya, B Yamini-
dc.date.accessioned2024-03-30T10:11:00Z-
dc.date.available2024-03-30T10:11:00Z-
dc.date.issued2023-
dc.identifier.isbn9.79835E+12-
dc.identifier.urihttps://doi.org/10.1109/ICERCS57948.2023.10433961-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/14961-
dc.description.abstractThis research addresses the security challenges arising from the widespread implementation of Internet of Things (IoT) networks in the industry, a situation exacerbated by the integration of artificial intelligence (AI) and 5G mobile communication technologies. While these IoT networks enhance industrial efficiency and convenience, their vulnerability to security breaches is heightened due to nonstandard protocol stacks and open-source software that lacks thorough vetting. Traditional AI-based vulnerability detection methods, with their high memory and computational demands, are unsuitable for IoT applications. In response, this study introduces a novel approach utilizing the Sampling Threshold Optimization Strategy. This method maximizes the training data size while preserving learning accuracy, enabling swift identification of software vulnerabilities in IoT systems. Experiments conducted on a software vulnerability classification dataset reveal that the effectiveness of the models is not significantly impacted by variations in ideal data sizes. Notably, the research establishes the minimum amount of data required to train a model without compromising performance. For instance, employing the random forest model with the sampling threshold optimization technique resulted in a 97.9% improvement in latency and conserved 85.2% of memory, 1% of the data while still achieving learning accuracy that is on par with 100% of the data. This innovative method provides a practical means to enhance the security of IoT networks without the need for extensive processing power. © 2023 IEEE.en_US
dc.language.isoenen_US
dc.publisher1st International Conference on Emerging Research in Computational Science, ICERCS 2023 - Proceedingsen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.subject5Gen_US
dc.subjectAI and Optimizationen_US
dc.subjectIot Networksen_US
dc.subjectSampling Ratioen_US
dc.subjectSoftware Vulnerabilitiesen_US
dc.titleEfficient Software Vulnerability Detection with Minimal Data Size in 5G-Ioten_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.