Research on Vulnerability Mining Method Based on Artificial Intelligence in Internet of Things

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, with the continuous development of computer technology, Internet of Things (IoT) technology has been widely used in various fields and has played an important role in various industries. The Internet of Things is responsible for information transmission and storage, and once there are network security issues, it will bring huge disasters to various industries. Detecting vulnerabilities in the Internet of Things is an urgent problem that needs to be addressed. In order to improve the efficiency of IoT vulnerability detection, this paper designs an IoT vulnerability mining solution based on the LSTM algorithm. The designed artificial intelligence IoT vulnerability mining algorithm uses deep learning for identification, and this framework includes steps such as data collection, data learning, and data detection. The results show that after comparing three models: LSTM, SeqGAN, and WGAN, the LSTM algorithm exhibits the highest accuracy.

Original languageEnglish
Title of host publication2024 IEEE 2nd International Conference on Image Processing and Computer Applications, ICIPCA 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1470-1473
Number of pages4
ISBN (Electronic)9798350360240
DOIs
Publication statusPublished - 2024
Event2nd IEEE International Conference on Image Processing and Computer Applications, ICIPCA 2024 - Shenyang, China
Duration: 28 Jun 202430 Jun 2024

Publication series

Name2024 IEEE 2nd International Conference on Image Processing and Computer Applications, ICIPCA 2024

Conference

Conference2nd IEEE International Conference on Image Processing and Computer Applications, ICIPCA 2024
Country/TerritoryChina
CityShenyang
Period28/06/2430/06/24

Keywords

  • Artificial Intelligence
  • Internet of Things Vulnerability
  • LSTM Algorithm
  • Mining

Cite this