A Fuzzy-Based Duo-Secure Multi-Modal Framework for IoMT Anomaly Detection

被引:26
作者
Wagan, Shiraz Ali [1 ]
Koo, Jahwan [2 ]
Siddiqui, Isma Farah [3 ]
Qureshi, Nawab Muhammad Faseeh [4 ]
Attique, Muhammad [5 ]
Shin, Dong Ryeol [1 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon, South Korea
[2] Sungkyunkwan Univ, Coll Software, Suwon, South Korea
[3] Mehran Univ Engn & Technol, Dept Software Engn, Jamshoro, Pakistan
[4] Sungkyunkwan Univ, Dept Comp Educ, Seoul, South Korea
[5] Sejong Univ, Dept Software, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Fuzzy logic; Multi-modal; Duo-secure; Anomaly detection; Internet of Medical Things (IoMT);
D O I
10.1016/j.jksuci.2022.11.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement in the Internet of Medical Things (IoMT) infrastructure, network security issues have become a serious concern for hospitals and medical facilities. For this, a variety of customized network security tools and frameworks are used to distract several generalized attacks such as botnet-based distributed denial of services attacks (DDoS) and zero-day network attacks. Thus, it becomes difficult to operate routine IoMT services and tasks in between the under-attack scenario. This paper discusses a novel approach named Duo-Secure IoMT framework that uses multi-modal sensory signals' data to differentiate the attack pattern and routine IoMT devices' data. The proposed model uses a combination of two techniques such as dynamic Fuzzy C-Means clustering along with customized Bi-LSTM technique that processes sensory medical data securely along with identifying attack patterns within the IoMT network. As a case study, we are using a dataset to evaluate heart disease which consists of 36 attributes and 18940 instances. The performance evaluation shows that the proposed model evaluates a) prediction of heart issues and b) identification of network malware with an individual accuracy of 92.95% and multimodal joint accuracy of 89.67% in the IoMT-based distributed network environment. (c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:131 / 144
页数:14
相关论文
共 55 条
  • [1] Alex P. Mamatha, 2019, 2019 International Conference on Communication and Signal Processing (ICCSP), P0848, DOI 10.1109/ICCSP.2019.8697977
  • [2] Ontology-Based Security Recommendation for the Internet of Medical Things
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    [J]. IEEE ACCESS, 2019, 7 : 48948 - 48960
  • [3] [Anonymous], 2022, PERVASIVE MOBILE COM, V86
  • [4] [Anonymous], 2022, SECURITY PRIVACY, V5, P235
  • [5] [Anonymous], 2022, WIRELESS COMMUN MOBI
  • [6] [Anonymous], 2017, GLOBECOM 2017 2017 I, P1
  • [7] [Anonymous], 2015, IEEE T AUTOM SCI ENG, V13, P688
  • [8] [Anonymous], 2022, IEEE J BIOMED HLTH I
  • [9] [Anonymous], 2018, 2018 10 INT C EL COM, P1
  • [10] [Anonymous], 2019, INT J COMPUT SCI ENG