A tree classifier based network intrusion detection model for Internet of Medical Things

被引:54
作者
Gupta, Karan [1 ]
Sharma, Deepak Kumar [2 ]
Gupta, Koyel Datta [3 ]
Kumar, Anil [4 ]
机构
[1] Netaji Subhas Univ Technol, Dept Informat Technol, New Delhi, India
[2] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, Delhi, India
[3] Maharaja Surajmal Inst Technol, Dept Comp Sci & Engn, New Delhi, India
[4] DIT Univ, Sch Comp, Data Sci Res Grp, Dehra Dun, Uttarakhand, India
关键词
Internet of Medical Things; Intrusion detection; Tree classifier; Security; Estimator; DETECTION SYSTEM; ARCHITECTURE;
D O I
10.1016/j.compeleceng.2022.108158
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Healthcare is one of the key areas of prospect for the Internet of Things (IoT). To facilitate better medical services, enormous growth in the field of the Internet of Medical Things (IoMT) is observed recently. Despite the numerous benefits, the cyber threats on connected healthcare devices can compromise privacy and can also cause damage to the health of the concerned patient. The massive demand for IoMT devices with seamless and effective medical facilities for the large-scale population requires a robust secured model to ensure the privacy and safety of patients in this network. However, designing security models for IoMT networks is very challenging. An effort has been made in this work, to design a tree classifier-based network intrusion detection model for IoMT networks. The proposed system effectively reduces the dimension of the input data to speed up the anomaly detection procedure while maintaining a very high accuracy of 94.23%.
引用
收藏
页数:20
相关论文
共 25 条
[1]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[2]  
Chakraborty S, 2019, INT CONF ADV COMMUN, P260, DOI [10.23919/ICACT.2019.8701983, 10.23919/icact.2019.8701983]
[3]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[4]  
Claesen M, 2015, Arxiv, DOI [arXiv:1502.02127, DOI 10.48550/ARXIV.1502.02127, 10.48550/ARXIV.1502.02127]
[5]  
Farhan RI., 2020, Indonesian J Electr Eng Comput Sci, V20, P1413, DOI DOI 10.11591/IJEECS.V20.I3.PP1413-1418
[6]   Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine [J].
Gatouillat, Arthur ;
Badr, Youakim ;
Massot, Bertrand ;
Sejdic, Ervin .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05) :3810-3822
[7]   Extremely randomized trees [J].
Geurts, P ;
Ernst, D ;
Wehenkel, L .
MACHINE LEARNING, 2006, 63 (01) :3-42
[8]  
Gron A., 2017, HANDS MACHINE LEARNI, V1st
[9]   Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study [J].
Hady, Anar A. ;
Ghubaish, Ali ;
Salman, Tara ;
Unal, Devrim ;
Jain, Raj .
IEEE ACCESS, 2020, 8 :106576-106584
[10]  
Hosmer DW, 2013, WILEY SER PROBAB ST, P1, DOI 10.1002/9781118548387