Abstract
Machine learning and artificial intelligence are becoming more common today. They are used in a variety of areas, including the energy, medical, and financial sectors, to complete different tasks and assist in the making of key choices. Among other uses, machine learning and artificial intelligence are used to build powerful recommender engines to provide user with corresponding recommendations in different directions like movie recommendations, friends suggestions in social networks and much more. The goal of the scientific work offered by the authors of this research was to identify and understand the vulnerabilities of hardware-based systems and related mechanisms, in order to improve the corresponding security measures. The main goal of the offered research is to design an upgraded recognition system and to identify the corresponding hardware-based vulnerabilities. Based on the research the goal of the papers is also to provide the potential users with the corresponding recommendations. This article discusses a web-based system that studies the potential security issues in hardware-based systems and provides optimal solutions. The system was tested using real-world cases from industrial and corporate organizations, and the assessment process demonstrates its ability to greatly enhance cybersecurity levels for various types of organizations. The research has resulted in a prototype of a web-based system that collects information about modern hardware-related vulnerabilities and provides the users with appropriate recommendations based on a specific situation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, X., Li, Z., Yang, Y.: Deep learning based side-channel analysis: a survey. IEEE Access 8, 202671–202694 (2020). https://doi.org/10.1109/access.2020.3031811
Bhunia, S., Hsiao, M.S., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014). https://doi.org/10.1109/JPROC.2014.2334493
Moradi, A., Kuhn, M.G., Paar, C.: Hash function design strategies for counteracting side-channel attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2011(4), 87–108 (2011). https://doi.org/10.1007/978-3-642-23822-2_6
Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65–68 (2015)
Wang, H., Forte, D., Tehranipoor, M.M., Shi, Q.: Probing attacks on integrated circuits: challenges and research opportunities. IEEE Des. Test 34(5), 63–71 (2017). https://doi.org/10.1109/MDAT.2017.2729398
Dan, P.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive, vol. 169, pp. 170–184 (2002)
Samer, M., Fayez, G., Aaron, G.T.: Hardware attacks: an algebraic approach. J. Cryptogr. Eng. 6, 325–337 (2006). https://doi.org/10.1007/s13389-016-0117-6
Samer, M., Gebali, F., Gulliver, T., et al.: Hardware attack risk assessment. In: ICES, vol. 1109 (2015). https://doi.org/10.1109/ICCES.2015.7393073
Imani, M., Shirani-Mehr, H., Naderi, H., Tehranipoor, M.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 36(1), 55–73 (2019). https://doi.org/10.1109/MDAT.2018.2871403
Austin, T.: Hardware security: an overview of the state of the art. In: IEEE Security & Privacy, vol. 13, no. 4, pp. 24–29, July-Aug. 2015. https://doi.org/10.1109/MSP.2015.78
Huang, Z., Wang, Q., Chen, Y., Jiang, X.: A survey on machine learning against hardware Trojan attacks: recent advances and challenges. IEEE Access 8, 10796–10826 (2020). https://doi.org/10.1109/ACCESS.2020.2965016
Iavich, M., Iashvili, G., Gagnidze, A., et al.: Lattice based Merkle. In: IVUS 2019, Kaunas 25 April 2019: Proceedings. - CEUR-WS – 2019, vol. 2470, pp. 13–16 (2019)
Calero Valdez, A., Ziefle, M., Verbert, K.: HCI for recommender systems: the past, the present and the future. In: Proceedings of the 10th ACM Conference on Recommender Systems (RecSys 2016). Association for Computing Machinery, New York, NY, USA, pp. 123–126 (2016). https://doi.org/10.1145/2959100.2959158
Bhunia, S., Abramovici, M., Agrawal, D., et al.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30, 6–17 (2013)
Gagnidze, A., Iavich, M., Iashvili, G.: Novel version of Merkle cryptosystem. Bull. Georgian Natl. Acad. Sci. 11(4), 28–33 (2017)
Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 2016, pp. 321–326 (2016). https://doi.org/10.1109/ICED.2016.7804660
Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: European Symposium on Security and Privacy, Saarbrücken 21–24 March 2016: Proceedings, pp. 3–12. IEEE (2016)
Iashvili, G., Iavich, M., Gagnidze, A., Gnatyuk, S.: Increasing usability of TLS certificate generation process using secure design. In: CEUR Workshop Proceedings, vol. 2698, pp. 35–41 (2020)
Gao, P., et al.: Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 2021, pp. 193–204 (2021). https://doi.org/10.1109/ICDE51399.2021.00024
Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580–591. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75075-6_47
Acknowledgement
This work was supported by Shota Rustaveli National Foundation of Georgia (SRNSFG) [NFR-22-14060].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Iavich, M., Iashvili, G., Odarchenko, R., Gnatyuk, S., Gagnidze, A. (2023). Developing Security Recommender System Using Content-Based Filtering Mechanisms. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-031-35467-0_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35466-3
Online ISBN: 978-3-031-35467-0
eBook Packages: EngineeringEngineering (R0)