DOI QR코드

DOI QR Code

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong (Division of Advanced IT, Baekseok University)
  • 투고 : 2024.04.15
  • 심사 : 2024.04.26
  • 발행 : 2024.06.30

초록

With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

키워드

과제정보

This work was supported by funding at Baekseok University in 2024.

참고문헌

  1. T. Liu, C. Sun, and Y. Zhang, "Load Balancing Routing Algorithm of Low-Orbit Communication Satellite Network Traffic Based on Machine Learning," Wireless Communications and Mobile Computing, pp. 1-14, 2021. DOI: https://doi.org/10.1155/2021/3234390.
  2. B. H. Choi, Y. -J. Song, and J. -H. Won, "Design of a KPS Civil Signal Candidate Simulator Using a Fully-Reconfigurable GNSS Signal Generator," in Proc of IPNT Conference, pp. 23-27, Nov 2-4, 2022. http://ipnt.or.kr/2022proc/14.
  3. NASA Advanced Supercomputing (NAS) Division, Open Source Software, [Internet] cited 2024 May 08, Available from: https://www.nas.nasa.gov/software/software.html.
  4. Alazba and H. Aljamaan, "Code smell detection using feature selection and stacking ensemble," Empirical investigation, Information and Software Technology, Vol. 138, pp. 106648, 2021. DOI: https://doi.org/10.1016/j.infsof.2021.106648.
  5. V. Markovic, Z. Jakovljevic, and Z. Miljkovic, "Feature sensitive three-dimensional point cloud simplification using support vector regression," Tehnicki vjesnik, Vol. 26, pp. 985-994, 2019. DOI: https://doi.org/10.17559/TV-20180328175336.
  6. D. R. Cambrin, L. Colomba, and P. Graza, "CaBuAir: California Burned Areas dataset for delineation," IEEE Geoscience and Remote Sensing Magazine, Vol. 11, pp. 106-113, 2024. DOI: https://doi.org/10.48550/arXiv.2401.11519.
  7. Sani, D., Mahato, S., Saini, S., Agarwal, H. K., and C. C. Devshali, " SICKLE: A Multi-Sensor Satellite Imagery Dataset Annotated with Multiple Key Cropping Parameters," WACV [Internet] cited 2024 May 08, Available from: https://sites.google.com/iiitd.ac.in/sickle/home
  8. J. Smailes, S. Kohler, S. Birnbach, M. Strohmeier, and I. Martinovic, "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting," in Proc of CCS'23, pp.1-14, Nov 26-30, 2023. [Internet], cited 2024 May 08, Available from: https://arxiv.org/pdf/2305.06947.
  9. Kueppers, G., Busch, J. P., Reiher, L., & Eckstein, L. 2024, V2AIX: A Multi-Modal Real-World Dataset of ETSI ITS V2X Messages in Public Road Traffic, [Internet], cited 2024 May 08, Available from: https://arxiv.org/html/2403.10221v1.
  10. F. A. Fontana, M. V. Mantyla, M. Zanoni, and A. Marino, "Comparing and experimenting machine learning techniques for code smell detection," Empirical Software Engineering, Vol. 21, pp. 1143-1191, 2016. DOI: https://doi.org/10.1007/s10664-015-9378-4.
  11. A. Kaur, S. Jain, and S. Goel, "Sp-j48: a novel optimization and machine-learning-based approach for solving complex problems, special application in software engineering for detecting code smell," Neural Computing Application, Vol. 32, pp. 7009-7027, 2020. DOI: https://doi.org/10.1007/s00521-019-04175-z.
  12. F. A. Fontana and M. Zanoni, "Code smell severity classification using machine learning techniques," Knowledge-Based System, Vol.128, pp. 43-58, 2017. DOI: https://doi.org/10.1016/j.knosys.2017.04.014
  13. M. I. Azeem, F. Palomba, L. Shi, and Q. Wang, Q, "Machine Learning Techniques for Code Smell Detection, A Systematic Literature Review and Meta-Analysis," Information & Software Technology, Vol. 18, pp. 115-138, 2019. DOI: DOI: https://doi.org/10.1016/j.infsof.2018.12.009.
  14. A. Jesudoss and S. Maneesha, "Identification of code smell using machine learning," in Proc of International Conference Intelligence Computing Control Syst. (ICCS), pp.54-58, 2019. DOI: https://doi.org/10.1109/ICCS45141.2019.9065317.
  15. T. Lin, X. Fu, F. Chen, and L. Li, "A novel approach for code smell detection based on deep leaning," EAI International Conference on Applied Cryptography in Computer and Communications, Springer, pp. 171-174, 2021. DOI: DOI: https://doi.org/10.1007/978-3-030-80851-8_16.
  16. D. Cruz, A. Santana, and E. Figueiredo, "Detecting bad smell with machine learning algorithms: an empirical study," in Proc of the 3rd International Conference on Technical Debt., pp.31-40, 2022. https://doi.org/10.1145/3387906.3388618.
  17. S. Wang, Y. Zhang, and J. Sun, "Detection of bad smell in code based on bp neural network," Computer Engineering, Vol. 46, pp. 216-222, 2021. DOI: https://doi.org/10.1117/12.2561197.
  18. F. Pecorelli, Di Palomba, D. Di Nucci, D., and A. De Lucia, "Comparing heuristic and machine learning approaches for metric-based code smell detection," in Proc of IEEE/ACM 27th International Conference on Program Comprehension (ICPC), pp. 25-26 May 2019. DOI: https://doi.org/10.1109/ICPC.2019.00023.
  19. B. H. Choi, Y. -J. Song, and J. -H. Won, "Design of a KPS Civil Signal Candidate Simulator Using a Fully-Reconfigurable GNSS Signal Generator," in Proc of IPNT Conference, pp. 23-27, Nov 2-4, 2022. http://ipnt.or.kr/2022proc/14.
  20. N. Maneerat and P. Muenchaisri, "Bad-smell prediction from software design model using machine learning techniques," in Proc of Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 331-336, May 2011. DOI: https://doi.org/10.1109/JCSSE.2011.5930143.
  21. J. Wang, J. Chen, and J. Gao, "Ecc multi-label code smell detection method based on ranking loss," Journal of Computer Research and Development, Vol. 58, pp. 178-188, 2021. DOI: https://doi.org/10.7544/issn1000-1239.2021.20190836.
  22. I. Sim, J. Jeong, S. Yun, Y. Lim, and J. Seo, "A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System," International Journal of Internet, Broadcasting and Communication, Vol. 15, No. 4, pp. 128-133, 2023. http://doig.org/10.7236/IJIBC.2023.15.4.128.