Clustering and Analysis of Vulnerabilities Present in Different Robot Types

08/18/2020
by   Chinwe Ekenna, et al.
0

Due to the new advancements in automation using Artificial Intelligence, Robotics and Internet of Things it has become crucial to pay attention to possible vulnerabilities in order to avoid cyber attack and hijacking that can occur which can be catastrophic. There have been many consequences of disasters due to vulnerabilities in Robotics, these vulnerabilities need to be analyzed to target the severe ones before they cause cataclysm. This paper aims to highlight the areas and severity of each type of vulnerability by analyzing issues categorized under the type of vulnerability. This we achieve by careful analysis of the data and application of information retrieval techniques like Term Frequency - Inverse Document Frequency, dimension reduction techniques like Principal Component Analysis and Clustering using Machine Learning techniques like K-means. By performing this analysis, the severity of robotic issues in different domains and the severity of the issue based on type of issue is detected.

READ FULL TEXT

page 1

page 5

research
06/15/2020

A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types

The Common Weakness Enumeration (CWE) is a prominent list of software we...
research
12/24/2019

Introducing the Robot Vulnerability Database (RVD)

Cybersecurity in robotics is an emerging topic that has gained significa...
research
02/27/2019

Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media

Breaking cybersecurity events are shared across a range of websites, inc...
research
02/09/2023

PETIoT: PEnetration Testing the Internet of Things

Attackers may attempt exploiting Internet of Things (IoT) devices to ope...
research
06/25/2021

Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

Smart Contracts (SCs) in Ethereum can automate tasks and provide differe...
research
12/10/2022

Information retrieval in single cell chromatin analysis using TF-IDF transformation methods

Single-cell sequencing assay for transposase-accessible chromatin (scATA...

Please sign up or login with your details

Forgot password? Click here to reset