schemas from different security systems. It is also
worth mentioning that our method can also be used
on numerous other on-line vulnerability databases
such as those managed by companies (e.g. Microsoft
Security Advisories, Tipping Point Zero Day
Initiative, etc.), national CERTs, or professionals’
forums (e.g. Exploit-DB and others). It may also be
worthwhile to integrate information from various
databases – this should increase the precision of the
classification and is a topic of our further research.
REFERENCES
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari,
M., & Ayyash, M. (2015). Internet of things: A survey
on enabling technologies, protocols, and applications.
IEEE communications surveys & tutorials, 17(4), 2347-
2376.
Antonakakis, M., April, T., Bailey, M., Bernhard, M.,
Bursztein, E., Cochran, J., ... & Zhou, Y. (2017).
Understanding the mirai botnet. In 26th {USENIX}
security symposium ({USENIX} Security 17) (pp. 1093-
1110).
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of
things: A survey. Computer networks, 54(15), 2787-
2805.
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N.,
Dankel, M., Steube, J., ... & Shavitt, Y. (2016).
{DROWN}: Breaking {TLS} Using SSLv2. In 25th
{USENIX} Security Symposium ({USENIX} Security
16) (pp. 689-706).
Bauer, M., Bui, N., Jardak, C., & Nettsträter, A. (2013). The
IoT ARM reference manual. Enabling Things to Talk,
213.
Blinowski, G. J., & Piotrowski, P. (2020, June). CVE based
classification of vulnerable IoT systems. In
International Conference on Dependability and
Complex Systems (pp. 82-93). Springer, Cham.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in
industries: A survey. IEEE Transactions on industrial
informatics, 10(4), 2233-2243
Durumeric, Z., Li, F., Kasten, J., Amann, J., Beekman, J.,
Payer, M., ... & Halderman, J. A. (2014, November).
The matter of heartbleed. In Proceedings of the 2014
conference on internet measurement conference (pp.
475-488).
EU FP7 (2007). The 7th Framework Programme funded
European Research and Technological Development
from 2007 until 2013; Internet of Things and Future
Internet Enterprise Systems; https://ec.europa.eu/
transport/themes/research/fp7_en, last accessed:
01.03.2021
Huang, G., Li, Y., Wang, Q., Ren, J., Cheng, Y., & Zhao,
X. (2019). Automatic classification method for
software vulnerability based on deep neural network.
IEEE Access, 7, 28291-28298.
Ling, Z., Liu, K., Xu, Y., Gao, C., Jin, Y., Zou, C., ... &
Zhao, W. (2018). Iot security: An end-to-end view and
case study. arXiv preprint arXiv:1805.05853
Liu, Z., Lv, X., Liu, K., & Shi, S. (2010, March). Study on
SVM compared with the other text classification
methods. In 2010 Second international workshop on
education technology and computer science (Vol. 1, pp.
219-222). IEEE.
MITRE. (2020). CVE Common Vulnerabilities and
Exposures database, https://cve.mitre.org/, last
accessed: 02.01.2020
Na, S., Kim, T., & Kim, H. (2016, November). A study on
the classification of common vulnerabilities and
exposures using naïve bayes. In International
Conference on Broadband and Wireless Computing,
Communication and Applications (pp. 657-662).
Springer, Cham.
Neuhaus, S., & Zimmermann, T. (2010, November).
Security trend analysis with CVE topic models. In 2010
IEEE 21st International Symposium on Software
Reliability Engineering (pp. 111-120). IEEE.
NIST. (2020). Security Content Automation Protocol v 1.3,
https://csrc.nist.gov/projects/security-content-
automation-protocol/, Created December 07, 2016,
Updated August 07, 2020, last accessed 02.01.2021.
NIST CFP. (2020). Official Common Platform
Enumeration (CPE) Dictionary, https://csrc.nist.gov/
Projects/Security-Content-Automation-Protocol/Speci
fications/cpe, Created December 07, 2016, Updated
August 07, 2020, last accessed 02.01.2021.
OWASP Top Ten Project. (2021). https://owasp.org/www-
project-top-ten/; last accessed: 01.03.2021
Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A.
(2016). UCO: A unified cybersecurity ontology. UMBC
Student Collection.
Vapnik, V. (1998). Statistical learning theory, New York.
NY: Wiley.
Wang, J. A., & Guo, M. (2010, April). Vulnerability
categorization using Bayesian networks. In
Proceedings of the sixth annual workshop on cyber
security and information intelligence research (pp. 1-
4).