TY - GEN
T1 - Research on Vulnerability Mining Method Based on Artificial Intelligence in Internet of Things
AU - Ma, Peiyue
AU - Zhu, Liehuang
AU - Zhang, Chuan
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - In recent years, with the continuous development of computer technology, Internet of Things (IoT) technology has been widely used in various fields and has played an important role in various industries. The Internet of Things is responsible for information transmission and storage, and once there are network security issues, it will bring huge disasters to various industries. Detecting vulnerabilities in the Internet of Things is an urgent problem that needs to be addressed. In order to improve the efficiency of IoT vulnerability detection, this paper designs an IoT vulnerability mining solution based on the LSTM algorithm. The designed artificial intelligence IoT vulnerability mining algorithm uses deep learning for identification, and this framework includes steps such as data collection, data learning, and data detection. The results show that after comparing three models: LSTM, SeqGAN, and WGAN, the LSTM algorithm exhibits the highest accuracy.
AB - In recent years, with the continuous development of computer technology, Internet of Things (IoT) technology has been widely used in various fields and has played an important role in various industries. The Internet of Things is responsible for information transmission and storage, and once there are network security issues, it will bring huge disasters to various industries. Detecting vulnerabilities in the Internet of Things is an urgent problem that needs to be addressed. In order to improve the efficiency of IoT vulnerability detection, this paper designs an IoT vulnerability mining solution based on the LSTM algorithm. The designed artificial intelligence IoT vulnerability mining algorithm uses deep learning for identification, and this framework includes steps such as data collection, data learning, and data detection. The results show that after comparing three models: LSTM, SeqGAN, and WGAN, the LSTM algorithm exhibits the highest accuracy.
KW - Artificial Intelligence
KW - Internet of Things Vulnerability
KW - LSTM Algorithm
KW - Mining
UR - http://www.scopus.com/inward/record.url?scp=85207916069&partnerID=8YFLogxK
U2 - 10.1109/ICIPCA61593.2024.10709035
DO - 10.1109/ICIPCA61593.2024.10709035
M3 - Conference contribution
AN - SCOPUS:85207916069
T3 - 2024 IEEE 2nd International Conference on Image Processing and Computer Applications, ICIPCA 2024
SP - 1470
EP - 1473
BT - 2024 IEEE 2nd International Conference on Image Processing and Computer Applications, ICIPCA 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd IEEE International Conference on Image Processing and Computer Applications, ICIPCA 2024
Y2 - 28 June 2024 through 30 June 2024
ER -