[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Automotive User Interface Based on LSTM-Grid Search Deep Learning Model for IoT Security Change Request Classification

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2024)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 200))

  • 350 Accesses

Abstract

The field of the Internet of Things (IoT) is rapidly growing in significance, with roughly fifty billion devices being used in technology for computing by the end of 2020. However, the interdependence of IoT devices, as well as the variety of components used in their implementation, has caused a variety of issues, such as insufficient testing of change requests (CR) that affect security requirements. One way to address these security issues is to provide a deeper classification of security requirements that have an impact on the overall software process, such as software testing. Thus, the primary goal of this study is to assist software testers in prioritizing changes requested to enhance software security on IoT-based devices. Therefore, a deep learning-based approach to security CR classification is proposed. In this study, the Long Short Term Memory (LSTM) model is used and enhanced through the grid search tuning method. The LSTM-based grid search deep learning classifier identifies the class (i.e., sub-characteristics defined by the ISO 25010 quality model) of a given security CR from IoT-based devices with an average classification accuracy of 79%. Finally, to validate the robustness of our proposed research methodology, we developed an automated classification user interface for software testers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 199.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://jupyter.org/.

  2. 2.

    https://drive.google.com/file/d/17Yvj3olZPlpawMG2SmoBZMGYs4kTTUJX/view?usp=sharing.

References

  1. Al-Garadi, M.A., et al.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22(3), 1646–1685 (2020)

    Article  Google Scholar 

  2. Haoues, M., Sellami, A., Ben-Abdallah, H., Cheikhi, L.: A guideline for software architecture selection based on ISO 25010 quality related characteristics. Int. J. Syst. Assur. Eng. Manag. 8, 886–909 (2017)

    Article  Google Scholar 

  3. Medhat, N., Moussa, S., Badr, N., Tolba, M.F.: Testing techniques in IoT-based systems. In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), December 2019, pp. 394–401. IEEE (2019)

    Google Scholar 

  4. Ahmad, W., Rasool, A., Javed, A.R., Baker, T., Jalil, Z.: Cyber security in IoT-based cloud computing: a comprehensive survey. Electronics 11(1), 16 (2021)

    Article  Google Scholar 

  5. Medhat, N., Moussa, S.M., Badr, N.L., Tolba, M.F.: A framework for continuous regression and integration testing in IoT systems based on deep learning and search-based techniques. IEEE Access 8, 215716–215726 (2020)

    Article  Google Scholar 

  6. Feng, X., Zhu, X., Han, Q.L., Zhou, W., Wen, S., Xiang, Y.: Detecting vulnerability on IoT device firmware: a survey. IEEE/CAA J. Automatica Sin. 10(1), 25–41 (2022)

    Article  Google Scholar 

  7. AlDhafer, O., Ahmad, I., Mahmood, S.: An end-to-end deep learning system for requirements classification using recurrent neural networks. Inf. Softw. Technol. 147, 106877 (2022)

    Article  Google Scholar 

  8. Zhu, S., Yang, S., Gou, X., Xu, Y., Zhang, T., Wan, Y.: Survey of testing methods and testbed development concerning internet of things. Wirel. Pers. Commun. 123, 165–194 (2021). https://doi.org/10.1007/s11277-021-09124-5

    Article  Google Scholar 

  9. Johnson, R. Zhang, T.: Supervised and semi-supervised text categorization using LSTM for region embeddings. In: International Conference on Machine Learning, pp. 526–534. PMLR (2016)

    Google Scholar 

  10. Navarro-Almanza, R., Juarez-Ramirez, R., Licea, G.: Towards supporting software engineering using deep learning: a case of software requirements classification. In: 2017 5th International Conference in Software Engineering Research and Innovation (CONISOFT), pp. 116–120. IEEE (2017)

    Google Scholar 

  11. Han, J., Pak, W.: Hierarchical LSTM-based network intrusion detection system using hybrid classification. Appl. Sci. 13(5), 3089 (2023)

    Article  Google Scholar 

  12. Yahya, A.E., Gharbi, A., Yafooz, W.M., Al-Dhaqm, A.: A novel hybrid deep learning model for detecting and classifying non-functional requirements of mobile apps issues. Electronics 12(5), 1258 (2023)

    Article  Google Scholar 

  13. Rahimi, N., Eassa, F., Elrefaei, L.: One-and two-phase software requirement classification using ensemble deep learning. Entropy 23(10), 1264 (2021)

    Article  Google Scholar 

  14. Bacanin, N., Stoean, C., Zivkovic, M., Rakic, M., Strulak-Wójcikiewicz, R., Stoean, R.: On the benefits of using metaheuristics in the hyperparameter tuning of deep learning models for energy load forecasting. Energies 16(3), 1434 (2023)

    Article  Google Scholar 

  15. Kim, T.Y., Cho, S.B.: Particle swarm optimization-based CNN-LSTM networks for forecasting energy consumption. In: 2019 IEEE Congress on Evolutionary Computation (CEC), pp. 1510–1516. IEEE (2019)

    Google Scholar 

  16. Priyadarshini, I., Cotton, C.: A novel LSTM-CNN-grid search-based deep neural network for sentiment analysis. J. Supercomput. 77(12), 13911–13932 (2021)

    Article  Google Scholar 

  17. Tiun, S., Mokhtar, U.A., Bakar, S.H., Saad, S.: Classification of functional and non-functional requirement in software requirement using Word2vec and fast Text. J. Phys. Conf. Ser. 1529(4), 042077 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zaineb Sakhrawi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sakhrawi, Z., Labidi, T., Sellami, A., Bouassida, N. (2024). Automotive User Interface Based on LSTM-Grid Search Deep Learning Model for IoT Security Change Request Classification. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 200. Springer, Cham. https://doi.org/10.1007/978-3-031-57853-3_40

Download citation

Publish with us

Policies and ethics