Digital Repository

Sec-IoT : Detection of Vulnerabilities in IoT Devices Using NER-Based Approach

Show simple item record

dc.contributor.author M.F.M. Sihad, Sihad
dc.date.accessioned 2024-04-22T07:29:21Z
dc.date.available 2024-04-22T07:29:21Z
dc.date.issued 2023
dc.identifier.citation M.F.M. Sihad, Sihad (2023) Sec-IoT : Detection of Vulnerabilities in IoT Devices Using NER-Based Approach. BSc. Dissertation, Informatics Institute of Technology en_US
dc.identifier.issn 20191089
dc.identifier.uri http://dlib.iit.ac.lk/xmlui/handle/123456789/2036
dc.description.abstract "In recent years, IoT (Internet of Things) gadgets have surged in popularity but with that popularity has come increased concern about their security. These gadgets frequently lack adequate security safeguards and are thus prone to assaults such as hacking, malware, and data breaches. Attackers can utilize these flaws to get access to sensitive information, seize control of the devices, or use them as a gateway to other systems. It is critical to periodically examine and monitor IoT devices for vulnerabilities to detect and prevent these types of assaults. Penetration testing, vulnerability scanning, and network monitoring are all methods for accomplishing this. Furthermore, it is critical to keep IoT devices' software and firmware up to date to safeguard them from newly identified vulnerabilities. The current study sought a better solution for detecting vulnerabilities in IoT devices. To do this, existing vulnerability detection approaches were thoroughly reviewed and analyzed. Based on their findings, the researchers decided to concentrate their efforts on vulnerability detection using CVE (Common Vulnerabilities and Exposures) , device classification and IoT device identification. To implement the classification and IoT device identification, the researcher uses custom NER model developed using Spacy . And testing was able to achieve accuracy of 76%. Due to the elimination of the iterative communication overhead, the system became more effective and quicker as a result. Additionally, the crowd source active learning method is used to advance the research." en_US
dc.language.iso en en_US
dc.subject Internet of Things en_US
dc.subject Common Vulnerability Enumeration en_US
dc.subject Data Science en_US
dc.title Sec-IoT : Detection of Vulnerabilities in IoT Devices Using NER-Based Approach en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account