Detecting Anomalous User Behavior in Remote Patient Monitoring

被引:14
作者
Gupta, Deepti [1 ]
Gupta, Maanak [2 ]
Bhatt, Smriti [3 ]
Tosun, Ali Saman [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[3] Texas A&M Univ San Antonio, Dept Comp & Cyber Secur, San Antonio, TX 78224 USA
来源
2021 IEEE 22ND INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2021) | 2021年
基金
美国国家科学基金会;
关键词
Anomaly Detection; Internet of Medical Things; Remote Patient Monitoring; Security; Cloud Computing; Hidden Markov Model; Behavioral Data; SYSTEM;
D O I
10.1109/IRI51335.2021.00011
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth in Remote Patient Monitoring (RPM) services using wearable and non-wearable Internet of Medical Things (IoMT) promises to improve the quality of diagnosis and facilitate timely treatment for a gamut of medical conditions. At the same time, the proliferation of IoMT devices increases the potential for malicious activities that can lead to catastrophic results including theft of personal information, data breach, and compromised medical devices, putting human lives at risk. IoMT devices generate tremendous amount of data that reflect user behavior patterns including both personal and day-to-day social activities along with daily routine health monitoring. In this context, there are possibilities of anomalies generated due to various reasons including unexpected user behavior, faulty sensor, or abnormal values from malicious/compromised devices. To address this problem, there is an imminent need to develop a framework for securing the smart health care infrastructure to identify and mitigate anomalies. In this paper, we present an anomaly detection model for RPM utilizing IoMT and smart home devices. We propose Hidden Markov Model (HMM) based anomaly detection that analyzes normal user behavior in the context of RPM comprising both smart home and smart health devices, and identifies anomalous user behavior. We design a testbed with multiple IoMT devices and home sensors to collect data and use the HMM model to train using network and user behavioral data. Proposed HMM based anomaly detection model achieved over 98% accuracy in identifying the anomalies in the context of RPM.
引用
收藏
页码:33 / 40
页数:8
相关论文
共 32 条
[1]   Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment [J].
Aslan, Omer ;
Ozkan-Okay, Merve ;
Gupta, Deepti .
IEEE ACCESS, 2021, 9 :83252-83271
[2]   An Access Control Framework for Cloud-Enabled Wearable Internet of Things [J].
Bhatt, Smriti ;
Patwa, Farhan ;
Sandhu, Ravi .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, :328-338
[3]   Anomaly detection model of user behavior based on principal component analysis [J].
Bi, Meng ;
Xu, Jian ;
Wang, Mo ;
Zhou, Fucai .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (04) :547-554
[4]  
Cawthra J., 1800, NIST SPECIAL PUBLICA, p30B
[5]   A Survey on Anomalous Behavior Detection for Elderly Care Using Dense-Sensing Networks [J].
Deep, Samundra ;
Zheng, Xi ;
Karmakar, Chandan ;
Yu, Dongjin ;
Hamey, Leonard G. C. ;
Jin, Jiong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :352-370
[6]  
Fu C., HAWATCHER SEMANTICS
[7]  
Gupta D, 2020, 2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), DOI 10.1109/WF-IoT48130.2020.9221446
[8]   Future Smart Connected Communities to Fight COVID-19 Outbreak [J].
Gupta, Deepti ;
Bhatt, Smriti ;
Gupta, Maanak ;
Tosun, Ali Saman .
INTERNET OF THINGS, 2021, 13
[9]   Access Control Model for Google Cloud IoT [J].
Gupta, Deepti ;
Bhatt, Smriti ;
Gupta, Maanak ;
Kayode, Olumide ;
Tosun, Ali Saman .
2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, :198-208
[10]   Towards Activity-Centric Access Control for Smart Collaborative Ecosystems [J].
Gupta, Maanak ;
Sandhu, Ravi .
PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, :155-164