Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications

被引:10
作者
Albattah, Albatul [1 ]
Rassam, Murad A. [1 ,2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Informat Technol, Qasim 51452, Saudi Arabia
[2] Taiz Univ, Fac Engn & Informat Technol, Taizi 6803, Yemen
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
Internet of Healthcare Things (IoHT); anomaly detection; deep learning; convolutional long short-term memory (ConvLSTM); adversarial attacks; ANOMALY DETECTION;
D O I
10.3390/app13116807
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Deep learning (DL) models are frequently employed to extract valuable features from heterogeneous and high-dimensional healthcare data, which are used to keep track of patient well-being via healthcare monitoring systems. Essentially, the training and testing data for such models are collected by huge IoT devices that may contain noise (e.g., incorrect labels, abnormal data, and incomplete information) and may be subject to various types of adversarial attacks. Therefore, to ensure the reliability of the various Internet of Healthcare Things (IoHT) applications, the training and testing data that are required for such DL techniques should be guaranteed to be clean. This paper proposes a hybrid convolutional long short-term memory (ConvLSTM) technique to assure the reliability of IoHT monitoring applications by detecting anomalies and adversarial content in the training data used for developing DL models. Furthermore, countermeasure techniques are suggested to protect the DL models against such adversarial attacks during the training phase. An experimental evaluation using the public PhysioNet dataset demonstrates the ability of the proposed model to detect anomalous readings in the presence of adversarial attacks that were introduced in the training and testing stages. The evaluation results revealed that the model achieved an average F1 score of 97% and an accuracy of 98%, despite the introduction of adversarial attacks.
引用
收藏
页数:17
相关论文
共 34 条
[1]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[2]  
Al Rasyid MUH, 2018, 2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), P303, DOI 10.1109/KCIC.2018.8628522
[3]   A Correlation-Based Anomaly Detection Model for Wireless Body Area Networks Using Convolutional Long Short-Term Memory Neural Network [J].
Albattah, Albatul ;
Rassam, Murad A. .
SENSORS, 2022, 22 (05)
[4]   A Financial Fraud Detection Model Based on LSTM Deep Learning Technique [J].
Alghofaili, Yara ;
Albattah, Albatul ;
Rassam, Murad A. .
JOURNAL OF APPLIED SECURITY RESEARCH, 2020, 15 (04) :498-516
[5]   Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques [J].
AlZubi, Ahmad Ali ;
Al-Maitah, Mohammed ;
Alarifi, Abdulaziz .
SOFT COMPUTING, 2021, 25 (18) :12319-12332
[6]  
[Anonymous], MIMIC2 DATASET
[7]   Game-based adaptive anomaly detection in wireless body area networks [J].
Arfaoui, Amel ;
Kribeche, Ali ;
Senouci, Sidi Mohammed ;
Hamdi, Mohamed .
COMPUTER NETWORKS, 2019, 163
[8]   Toward fast and accurate emergency cases detection in BSNs [J].
Boudargham, Nadine ;
El Sibai, Rayane ;
Abdo, Jacques Bou ;
Demerjian, Jacques ;
Guyeux, Christophe ;
Makhoul, Abdallah .
IET WIRELESS SENSOR SYSTEMS, 2020, 10 (01) :47-60
[9]  
Bovenzi G., 2022, P IEEE INT C COMM, P5427
[10]   The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation [J].
Chicco, Davide ;
Jurman, Giuseppe .
BMC GENOMICS, 2020, 21 (01)