A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks

被引:35
作者
Fang, Liming [1 ]
Li, Yang [1 ]
Liu, Zhe [1 ]
Yin, Changchun [1 ]
Li, Minghui [1 ]
Cao, Zehong Jimmy [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Univ Tasmania, Coll Sci & Engn, Hobart, Tas 7001, Australia
基金
中国国家自然科学基金;
关键词
Protocols; Internet of Things; Monitoring; Security; Biomedical monitoring; Temperature sensors; Anomaly detection; Internet of Things (IoT); smart healthcare;
D O I
10.1109/TII.2020.3011444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of the Internet of Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities to hijack devices, control services, steal medical data, or make devices operate illegally. These restrictions have led to huge security risks for IoT, and have challenged the management of critical infrastructure services. Based on these problems, this article proposes an anomaly detection system for detecting illegal behavior (DIB) in medical IoT environment.The DIB system can analyze data packets transmitted by medical IoT devices, learn operation rules by itself, and remind management personnel that the device is in an abnormal operation state to ensure the safety of control service. We further propose a model that is based on rough set theory and fuzzy core vector machine (FCVM) to improve the accuracy of DIB classification anomalies. Experimental results show that the R-FCVM is effective.
引用
收藏
页码:4260 / 4269
页数:10
相关论文
共 29 条
  • [1] Acar A, 2018, P 13 ACM C COMP SEC, P207
  • [2] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [3] Apthorpe N., 2017, ARXIV170506805
  • [4] Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments
    Brun, Olivier
    Yin, Yonghua
    Gelenbe, Erol
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 458 - 463
  • [5] Celik ZB, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1687
  • [6] Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities
    Choo, Kim-Kwang Raymond
    Gritzalis, Stefanos
    Park, Jong Hyuk
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3567 - 3569
  • [7] Is Anybody Home? Inferring Activity From Smart Home Network Traffic
    Copos, Bogdan
    Levitt, Karl
    Bishop, Matt
    Rowe, Jeff
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 245 - 251
  • [8] Dimitrov DV, 2016, HEALTHC INFORM RES, V22, P156
  • [9] Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
    Dyer, Kevin P.
    Coull, Scott E.
    Ristenpart, Thomas
    Shrimpton, Thomas
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 332 - 346
  • [10] Fernandes E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P531