An investigation and comparison of machine learning approaches for intrusion detection in IoMT network

被引:38
作者
Binbusayyis, Adel [1 ]
Alaskar, Haya [1 ]
Vaiyapuri, Thavavel [1 ]
Dinesh, M. [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj, Saudi Arabia
[2] Saudi Elect Univ, Coll Comp & Informat, Riyadh, Saudi Arabia
关键词
Internet of medical things (IoMT); Security issues; Intrusion detection system; Machine learning (ML); K-nearest neighbor (KNN); Naive Bayes (NB); Support-vector machine (SVM); Artificial neural network (ANN); Decision tree (DT); DETECTION FRAMEWORK; INTERNET; THINGS;
D O I
10.1007/s11227-022-04568-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Medical Things (IoMT) is network of interconnected medical devices (smart watches, pace makers, prosthetics, glucometer, etc.), software applications, and health systems and services. IoMT has successfully addressed many old healthcare problems. But it comes with its drawbacks essentially with patient's information privacy and security related issues that comes from IoMT architecture. Using obsolete systems can bring security vulnerabilities and draw attacker's attention emphasizing the need for effective solution to secure and protect the data traffic in IoMT network. Recently, intrusion detection system (IDS) is regarded as an essential security solution for protecting IoMT network. In the past decades, machines learning (ML) algorithms have demonstrated breakthrough results in the field of intrusion detection. Notwithstanding, to our knowledge, there is no work that investigates the power of machines learning algorithms for intrusion detection in IoMT network. This paper aims to fill this gap of knowledge investigating the application of different ML algorithms for intrusion detection in IoMT network. The investigation analysis includes ML algorithms such as K-nearest neighbor, Naive Bayes, support vector machine, artificial neural network and decision tree. The benchmark dataset, Bot-IoT which is publicly available with comprehensive set of attacks was used to train and test the effectiveness of all ML models considered for investigation. Also, we used comprehensive set of evaluation metrics to compare the power of ML algorithms with regard to their detection accuracy for intrusion in IoMT networks. The outcome of the analysis provides a promising path to identify the best the machine learning approach can be used for building effective IDS that can safeguard IoMT network against malicious activities.
引用
收藏
页码:17403 / 17422
页数:20
相关论文
共 30 条
[1]   Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment [J].
Alqaralleh B.A.Y. ;
Vaiyapuri T. ;
Parvathy V.S. ;
Gupta D. ;
Khanna A. ;
Shankar K. .
Personal and Ubiquitous Computing, 2024, 28 (01) :17-27
[2]  
Anava O, 2016, P NEURIPS BARC SPAIN
[3]  
[Anonymous], 1997, Elements of artificial neural networks
[4]   Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
APPLIED INTELLIGENCE, 2021, 51 (10) :7094-7108
[5]   Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
HELIYON, 2020, 6 (07)
[6]   Identifying and Benchmarking Key Features for Cyber Intrusion Detection: An Ensemble Approach [J].
Binbusayyis, Adel ;
Vaiyapuri, Thavavel .
IEEE ACCESS, 2019, 7 :106495-106513
[7]   RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Ahmim, Ahmed ;
Derdour, Makhlouf ;
Janicke, Helge .
FUTURE INTERNET, 2020, 12 (03)
[8]   SARS-CoV-2 variants and ending the COVID-19 pandemic [J].
Fontanet, Arnaud ;
Autran, Brigitte ;
Lina, Bruno ;
Kieny, Marie Paule ;
Karim, Salim S. Abdool ;
Sridhar, Devi .
LANCET, 2021, 397 (10278) :952-954
[9]   A Proposal for Local k Values for k-Nearest Neighbor Rule [J].
Garcia-Pedrajas, Nicolas ;
Romero del Castillo, Juan A. ;
Cerruela-Garcia, Gonzalo .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (02) :470-475
[10]   A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches [J].
Hameed, Shilan S. ;
Hassan, Wan Haslina ;
Latiff, Liza Abdul ;
Ghabban, Fahad .
PEERJ COMPUTER SCIENCE, 2021, 7 :1-44