Skip to main content

Developing Security Recommender System Using Content-Based Filtering Mechanisms

  • Conference paper
  • First Online:
Information Technology for Education, Science, and Technics (ITEST 2022)

Abstract

Machine learning and artificial intelligence are becoming more common today. They are used in a variety of areas, including the energy, medical, and financial sectors, to complete different tasks and assist in the making of key choices. Among other uses, machine learning and artificial intelligence are used to build powerful recommender engines to provide user with corresponding recommendations in different directions like movie recommendations, friends suggestions in social networks and much more. The goal of the scientific work offered by the authors of this research was to identify and understand the vulnerabilities of hardware-based systems and related mechanisms, in order to improve the corresponding security measures. The main goal of the offered research is to design an upgraded recognition system and to identify the corresponding hardware-based vulnerabilities. Based on the research the goal of the papers is also to provide the potential users with the corresponding recommendations. This article discusses a web-based system that studies the potential security issues in hardware-based systems and provides optimal solutions. The system was tested using real-world cases from industrial and corporate organizations, and the assessment process demonstrates its ability to greatly enhance cybersecurity levels for various types of organizations. The research has resulted in a prototype of a web-based system that collects information about modern hardware-related vulnerabilities and provides the users with appropriate recommendations based on a specific situation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, X., Li, Z., Yang, Y.: Deep learning based side-channel analysis: a survey. IEEE Access 8, 202671–202694 (2020). https://doi.org/10.1109/access.2020.3031811

    Article  Google Scholar 

  2. Bhunia, S., Hsiao, M.S., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014). https://doi.org/10.1109/JPROC.2014.2334493

    Article  Google Scholar 

  3. Moradi, A., Kuhn, M.G., Paar, C.: Hash function design strategies for counteracting side-channel attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2011(4), 87–108 (2011). https://doi.org/10.1007/978-3-642-23822-2_6

  4. Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65–68 (2015)

    Google Scholar 

  5. Wang, H., Forte, D., Tehranipoor, M.M., Shi, Q.: Probing attacks on integrated circuits: challenges and research opportunities. IEEE Des. Test 34(5), 63–71 (2017). https://doi.org/10.1109/MDAT.2017.2729398

    Article  Google Scholar 

  6. Dan, P.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive, vol. 169, pp. 170–184 (2002)

    Google Scholar 

  7. Samer, M., Fayez, G., Aaron, G.T.: Hardware attacks: an algebraic approach. J. Cryptogr. Eng. 6, 325–337 (2006). https://doi.org/10.1007/s13389-016-0117-6

  8. Samer, M., Gebali, F., Gulliver, T., et al.: Hardware attack risk assessment. In: ICES, vol. 1109 (2015). https://doi.org/10.1109/ICCES.2015.7393073

  9. Imani, M., Shirani-Mehr, H., Naderi, H., Tehranipoor, M.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 36(1), 55–73 (2019). https://doi.org/10.1109/MDAT.2018.2871403

    Article  Google Scholar 

  10. Austin, T.: Hardware security: an overview of the state of the art. In: IEEE Security & Privacy, vol. 13, no. 4, pp. 24–29, July-Aug. 2015. https://doi.org/10.1109/MSP.2015.78

  11. Huang, Z., Wang, Q., Chen, Y., Jiang, X.: A survey on machine learning against hardware Trojan attacks: recent advances and challenges. IEEE Access 8, 10796–10826 (2020). https://doi.org/10.1109/ACCESS.2020.2965016

    Article  Google Scholar 

  12. Iavich, M., Iashvili, G., Gagnidze, A., et al.: Lattice based Merkle. In: IVUS 2019, Kaunas 25 April 2019: Proceedings. - CEUR-WS – 2019, vol. 2470, pp. 13–16 (2019)

    Google Scholar 

  13. Calero Valdez, A., Ziefle, M., Verbert, K.: HCI for recommender systems: the past, the present and the future. In: Proceedings of the 10th ACM Conference on Recommender Systems (RecSys 2016). Association for Computing Machinery, New York, NY, USA, pp. 123–126 (2016). https://doi.org/10.1145/2959100.2959158

  14. Bhunia, S., Abramovici, M., Agrawal, D., et al.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30, 6–17 (2013)

    Google Scholar 

  15. Gagnidze, A., Iavich, M., Iashvili, G.: Novel version of Merkle cryptosystem. Bull. Georgian Natl. Acad. Sci. 11(4), 28–33 (2017)

    Google Scholar 

  16. Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 2016, pp. 321–326 (2016). https://doi.org/10.1109/ICED.2016.7804660

  17. Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: European Symposium on Security and Privacy, Saarbrücken 21–24 March 2016: Proceedings, pp. 3–12. IEEE (2016)

    Google Scholar 

  18. Iashvili, G., Iavich, M., Gagnidze, A., Gnatyuk, S.: Increasing usability of TLS certificate generation process using secure design. In: CEUR Workshop Proceedings, vol. 2698, pp. 35–41 (2020)

    Google Scholar 

  19. Gao, P., et al.: Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 2021, pp. 193–204 (2021). https://doi.org/10.1109/ICDE51399.2021.00024

  20. Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580–591. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75075-6_47

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was supported by Shota Rustaveli National Foundation of Georgia (SRNSFG) [NFR-22-14060].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giorgi Iashvili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iavich, M., Iashvili, G., Odarchenko, R., Gnatyuk, S., Gagnidze, A. (2023). Developing Security Recommender System Using Content-Based Filtering Mechanisms. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35467-0_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35466-3

  • Online ISBN: 978-3-031-35467-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics