A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT

被引:42
|
作者
Khan, Fazlullah [1 ]
Jan, Mian Ahmad [1 ]
Alturki, Ryan [2 ]
Alshehri, Mohammad Dahman [3 ,4 ]
Shah, Syed Tauhidullah [5 ]
Rehman, Ateeq Ur [6 ]
机构
[1] Abdul Wali Khan Univ Mardan, Dept Comp Sci, Mardan 23200, Pakistan
[2] Umm Qura Univ, Dept Informat Sci, Coll Comp & Informat Syst, Mecca 21421, Saudi Arabia
[3] Taif Univ, Dept Comp Sci, Taif 11099, Saudi Arabia
[4] Taif Univ, Coll Comp & Informat Technol, Taif 11099, Saudi Arabia
[5] Univ Calgary, Dept Software Engn, Calgary, AB T2N IN4, Canada
[6] Univ Haripur, Dept Informat Technol, Haripur 22620, Pakistan
关键词
Cloud computing; cybersecurity; fog computing; healthcare; Internet of Medical Things (IoMT); intrusion detection systems; LSTM; HEALTH-CARE; INTERNET; THINGS;
D O I
10.1109/TII.2022.3231424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Medical Things (IoMT) effectively tackles several shortcomings of conventional healthcare systems. It includes medical personnel shortages, patient care quality, insufficient medical supplies, and healthcare expenditures. There are several advantages of using IoMT technology for enhanced treatment efficiency and quality, thus improving patient health. However, the frequency and magnitude of cyberattacks on IoMT are increasing at a breakneck pace. Therefore, this article proposes a cyberattack detection method for IoMT-based networks using ensemble learning and fog-cloud architecture to address security issues. The ensemble technique employs a set of long short-term memory (LSTM) networks as individual learners at the first level and stacks a decision tree on top of them to classify attack and normal events. In addition, we present a framework for deploying the proposed IoMT-based approach as Infrastructure as a Service in the cloud and Software as a Service in the fog. The proposed method is evaluated on the telemetry datasets of IoT and IIoT sensors (ToN-IoT) dataset, and the outcomes reveal that it surpasses the baseline approaches in terms of precision by 4%.
引用
收藏
页码:10125 / 10132
页数:8
相关论文
共 50 条
  • [1] An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    COMPUTER COMMUNICATIONS, 2021, 166 : 110 - 124
  • [2] A Secure Fog-Cloud Based Architecture for MIoT
    Almehmadi, Tahani
    Alshehri, Suhair
    Tahir, Sabeen
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [3] A new secure offloading approach for internet of vehicles in fog-cloud federation
    Salami, Yashar
    Khajehvand, Vahid
    Zeinali, Esmaeil
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [4] A new secure offloading approach for internet of vehicles in fog-cloud federation
    Yashar Salami
    Vahid Khajehvand
    Esmaeil Zeinali
    Scientific Reports, 14
  • [5] Learning-Based Task Offloading for Marine Fog-Cloud Computing Networks of USV Cluster
    Cui, Kuntao
    Lin, Bin
    Sun, Wenli
    Sun, Wenqiang
    ELECTRONICS, 2019, 8 (11)
  • [6] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [7] A cloud-based system for distance learning supported by Fog-Cloud cooperation
    Larcher, Lucas
    Stroele, Victor
    Dantas, Mario
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (5-6) : 618 - 634
  • [8] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    Li, Hongwei, 1600, Institute of Electrical and Electronics Engineers Inc. (07): : 11460 - 11472
  • [9] An integrated approach of ML-metaheuristics for secure service placement in fog-cloud ecosystem
    Singh, Supriya
    Vidyarthi, D. P.
    INTERNET OF THINGS, 2023, 22
  • [10] Fog-cloud distributed intrusion detection and cooperation
    Ghribi, Saadia
    Makhlouf, Amel Meddeb
    Zarai, Faouzi
    Guizani, Mohsen
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)