Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Nov 28:2022:2037954.
doi: 10.1155/2022/2037954. eCollection 2022.

Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

Affiliations

Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

Abdulwahid Al Abdulwahid. Comput Intell Neurosci. .

Abstract

The huge number of network traffic data, the abundance of available network features, and the diversity of cyber-attack patterns mean that intrusion detection remains difficult even though many earlier efforts have succeeded in building the Internet of Healthcare Things (IoHT). The implementation of an effective algorithm to filter out most of the probable outliers of Round Trip Time (RTT) of packets recorded in the Internet environment is urgently required. Congestion and interference in networks can arise when numerous biosensors in an IoHT system all attempt to communicate at once. Internet of Health Things networks are susceptible to both intra- and internetwork interference. In this research, the Server-Side Includes (SSI) attack is a key issue because it allows for network compromise as part of Internal Attacks. Despite recent advancements, SSI detection remains difficult due to the vast amounts of network traffic data, the abundance of network features, and the diversity of cyber-attack patterns (DDoS, DoS, Satan, spoofing, etc.). With the help of sensors, physiological data may be collected and sent to distant servers, where they can be analyzed in real time by doctors to help them catch diseases in their earliest stages. This is made possible by the Internet of medical things (IoMT). Wireless data transfer, however, leaves it vulnerable to hackers, especially if the data being transferred are particularly private or sensitive. Security measures designed for devices with more storage space and processing power will not work on those with less. However, machine learning for intrusion detection can give a tailored security response to the needs of IoMT systems. For SSI detection, current methods are either inefficient because of the large number of packets that need to be caught and analyzed or unsuccessful because of outlier values in the RTTs obtained from the captured TCP packets. To the same end, "downstream detection" refers to the process of calculating the total length of all connections made after a certain point. As a means of improving the SSI detection algorithm's throughput in a network environment, packet RTT outliers will be eliminated. Flow records are used as inputs by flow-based NIDS to determine whether or not a given flow is malicious. In order to detect middlebox-based attacks from two Medical Health IoT datasets, this paper proposes a unique architecture of explainable neural networks (XNN). The model's accuracy in classifying attacks in dataset 1 of the IoHT is 99.7%t, besides achieving 99.4% accuracy in categorising attacks on IoHT dataset 2.

PubMed Disclaimer

Conflict of interest statement

The author declares that he has no conflicts of interest.

Figures

Figure 1
Figure 1
Proposed flow work.
Figure 2
Figure 2
Repartition of services in IoHT DATASET 1 subcategories of accomplishments in the IoHT dataset 1.
Figure 3
Figure 3
Repartition of attack types.
Figure 4
Figure 4
IoHT DATASET 2 visualization.
Figure 5
Figure 5
Proposed architecture of XNN.
Figure 6
Figure 6
Performance of XNN on IoHT Dataset 1 with KMEANS.
Figure 7
Figure 7
Performance of XNN on IoHT Dataset 1 with one hot encoding.
Figure 8
Figure 8
Performance of XNN on IoHT Dataset 1 without feature scoring.
Figure 9
Figure 9
Confusion matrix with KMEANS.
Figure 10
Figure 10
Confusion matrix with one hot encoding.
Figure 11
Figure 11
Confusion matrix without feature scoring.
Figure 12
Figure 12
Comparison of deep learning models on IoHT Dataset 1 with KMEANS.
Figure 13
Figure 13
Performance of XNN on IoHT DATASET 2 with KMEANS.
Figure 14
Figure 14
Performance of XNN on IoHT DATASET 2 with one hot encoding.
Figure 15
Figure 15
Performance of XNN on IoHT DATASET 2 without feature scoring.
Figure 16
Figure 16
Confusion matrix with KMEANS.
Figure 17
Figure 17
Confusion matrix with one hot encoding.
Figure 18
Figure 18
Confusion matrix without feature scoring.
Figure 19
Figure 19
Comparison of deep learning models on IoHT Dataset 2 with KMEANS.

References

    1. Rouzbahani H. M., Karimipour H., Lei L. Multi-layer defense algorithm against deep reinforcement learning-based intruders in smart grids. TechRxiv . 2022:1–10.
    1. A D., Keerthana K., Kiruthikanjali N., Nandhini G., Yuvaraj G. Secured smart healthcare monitoring system based on IOT. SSRN Electronic Journal . 2017;5(20):5–7. doi: 10.2139/ssrn.2941100. - DOI
    1. Meng W., Li W., Zhu L. Enhancing Medical Smartphone Networks via Blockchain-Based Trust Management against Insider Attacks. IEEE Transactions on Engineering Management . 2020;67(4):1377–1386. doi: 10.1109/TEM.2019.2921736. - DOI
    1. Butt S. A., Diaz-Martinez J. L., Jamal T., Ali A., De-La-Hoz-Franco E., Shoaib M. IoT smart health security threats. Proceedings of the 2019 19th International Conference on Computational Science and Its Applications (ICCSA); July 2019; Petersburg, Russia. - DOI
    1. Hussain T., Hussain D., Hussain I., et al. Internet of things with deep learning-based face recognition approach for authentication in control medical systems. Computational and Mathematical Methods in Medicine . 2022;2022:17. doi: 10.1155/2022/5137513.5137513 - DOI - PMC - PubMed