Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

被引:114
作者
Hady, Anar A. [1 ,2 ]
Ghubaish, Ali [1 ]
Salman, Tara [1 ]
Unal, Devrim [3 ]
Jain, Raj [1 ]
机构
[1] Washington Univ, Dept CSE, St Louis, MO 63130 USA
[2] Elect Res Inst, Cairo 12622, Egypt
[3] Qatar Univ, KINDI Ctr, Doha, Qatar
关键词
Medical services; Monitoring; Security; Sensors; Biometrics (access control); Measurement; Servers; Healthcare monitoring systems; IoT; machine learning; security; healthcare dataset; SECURE;
D O I
10.1109/ACCESS.2020.3000421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients& x2019; information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and confidentiality of patients& x2019; data is a significant challenge. Any alteration to the data could affect the patients& x2019; treatment, leading to human casualties in emergency conditions. Due to the high dimensionality and prominent dynamicity of the data involved in such systems, machine learning has the promise to provide an effective solution when it comes to intrusion detection. However, most of the available healthcare intrusion detection systems either use network flow metrics or patients& x2019; biometric data to build their datasets. This paper aims to show that combining both network and biometric metrics as features performs better than using only one of the two types of features. We have built a real-time Enhanced Healthcare Monitoring System (EHMS) testbed that monitors the patients& x2019; biometrics and collects network flow metrics. The monitored data is sent to a remote server for further diagnostic and treatment decisions. Man-in-the-middle cyber-attacks have been used, and a dataset of more than 16 thousand records of normal and attack healthcare data has been created. The system then applies different machine learning methods for training and testing the dataset against these attacks. Results prove that the performance has improved by 7& x0025; to 25& x0025; in some cases, and this shows the robustness of the proposed system in providing proper intrusion detection.
引用
收藏
页码:106576 / 106584
页数:9
相关论文
共 25 条
  • [1] Real-Time Secure Health Surveillance for Smarter Health Communities
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Forkan, Abdur Rahim Mohammad
    Atiquzzaman, Mohammed
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (01) : 122 - 129
  • [2] [Anonymous], Artificial neural network
  • [3] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [4] Brownlee J., 2021, FAILURE CLASSIFICATI
  • [5] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [6] Chakraborty S, 2019, INT CONF ADV COMMUN, P260, DOI [10.23919/icact.2019.8701983, 10.23919/ICACT.2019.8701983]
  • [7] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [8] Predictive Monitoring of Mobile Patients by Combining Clinical Observations With Data From Wearable Sensors
    Clifton, Lei
    Clifton, David A.
    Pimentel, Marco A. F.
    Watkinson, Peter J.
    Tarassenko, Lionel
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (03) : 722 - 730
  • [9] SUPPORT-VECTOR NETWORKS
    CORTES, C
    VAPNIK, V
    [J]. MACHINE LEARNING, 1995, 20 (03) : 273 - 297
  • [10] Communication and Security in Health Monitoring Systems - A Review
    Fotouhi, Hossein
    Causevic, Aida
    Lundqvist, Kristina
    Bjorkman, Mats
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 545 - 554