Efficient DDOS Detection in Internet of Medical Things using CNN-ACL Approach

Authors

  • Jeethu Mathew Research Scholar, Department of Computer Science, Bishop Heber College, Trichy. Affiliated to Bharathidasan University Trichy.
  • R. Jemima Priyadarsini Associate Professor, Department of Computer Science, Bishop Heber College Trichy. Affiliated to Bharathidasan University Trichy.

Keywords:

Healthcare, IoMT, DDOS detection, network security, machine learning, CNN-ACL

Abstract

Internet of Things (IoT) has made great progress in the field of health care system and has the possibility of revolutionizing technical, sociological, and commercial hopes for a healthier future. The term "IoMT" (Internet of Medical Things) refers to the use of networking technology to connect medical devices and software programs related to health-care data to the Internet. These advancements allow the healthcare industry to continue providing patients with a higher level of attention and care. Despite the many advantages they provide, these gadgets also provide new attack surfaces, raising various security and privacy issues. Attacks against medical instruments that is connected to the Internet have the potential to affect people severely and in a life-threatening way. To guarantee accuracy and patient data confidentiality, this thesis focuses on offering a highly secure method of transmitting medical data via IoMT. This paper proposes the average convolution layer (CNN-ACL), a unique CNN architecture type for learning the content features of anomalous activity and then identifying the individual anomaly. A powerful system for detecting network DDOS that incorporates a cutting-edge convolutional layer capable of teaching low-level anomalous qualities is designed with the aid of the CNN-ACL, which is highly recommended. Experimental results demonstrate that this method's network DDOS detection effectiveness is superior to machine learning methods based on the KDDCUP99 and CICIDS2017 datasets. Python is used to stimulate the study, and the average accuracy may be increased to 91%, with 0.87 precision and 0.86 recall.

Downloads

Download data is not yet available.

References

F. Akram, D. Liu, P. Zhao, N. Kryvinska, S. Abbas and M. Rizwan, “Trustworthy intrusion detection in e-healthcare systems,” Frontiers in public health, vol. 9, pp. 788347, 2021.

S. Arunachalam, A. Sivasankari and S. Arthi, “Identifying The Fraud Detection in Health Care System Using Machine Learning,” 2019. DoI: 10.13140/RG.2.2.17720.88328.

A. A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, “Intrusion detection system for healthcare systems using medical and network data: A comparison study,” IEEE Access, vol. 8, pp. 106576-106584, 2020.

E. Aminanto and K. Kim, “Deep learning in intrusion detection system: An overview,” In 2016 International Research Conference on Engineering and Technology (2016 IRCET), pp 1-12, Seoul, South Korea

L. Deng and D. Yu, “Deep learning: methods and applications,” Foundations and trends® in signal processing, vol. 7, no. 3, pp. 197-387, 2014.

IBM 2016 “Cost of Data Breach Study United States,” I. Corp, Washington, DC, USA, 2016 September.

D. Kavitha, A. Vidhya, V. Prema, M. Priyadharshini, G. Kumaresan and G. Sangeetha, “An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 12, pp. ett.4610, 2022.

J. D. Lee, H. S. Cha, S. Rathore and J. H. Park, “M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT,” Computers, Materials & Continua, vol. 67, no. 2, 2021.

S. P. RM, P. K. R. Maddikunta, M. Parimala, S. Koppu, T. R. Gadekallu, C. L. Chowdhary and M. Alazab, “An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture,” Computer Communications, vol. 160, pp. 139-149, 2020.

K. K. Patel, S. M. Patel and P. Scholar, P. “Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges,” International journal of engineering science and computing, vol. 6, no. 5, 2016.

J. Rosen and B. Hannaford, “Doc at a distance,” IEEE spectrum, vol. 43, no. 10, pp. 34-39, 2006.

E. K. Wang, C. M. Chen, M. M. Hassan and A. Almogren, “A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain,” Future Generation Computer Systems, vol. 108, pp. 135-144, 2020.

W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, “Security and privacy in the medical internet of things: a review,” Security and Communication Networks, pp. 1-9, 2018.

S. Saif, P. Bhattacharjee, K. Karmakar, R. Saha and S. Biswas, “IoT-Based Secure Health Care: Challenges, Requirements and Case Study,” In Internet of Things Based Smart Healthcare: Intelligent and Secure Solutions Applying Machine Learning Techniques, pp. 327-350, 2022.

S. Saif, P. Das, S. Biswas, M. Khari and V. Shanmuganathan, “HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare,” Microprocessors and Microsystems, pp. 104622, 2022.

B. Susilo and R. F. Sari, “Intrusion detection in IoT networks using deep learning algorithm,” Information, vol. 11, no. 5, 279, 2020.

I. Ullah, A. Ullah, and M. Sajjad,”Towards a hybrid deep learning model for anomalous activities detection in internet of things networks,” IoT, vol. 2, no. 3, pp. 428-448, 2021.

T. Yaqoob, H. Abbas and M. Atiquzzaman, “Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3723-3768, 2019.

Y. Xu, X. Zhang, C. Lu, Z. Qiu, C. Bi, Y. Lai, and H. Zhang, “Network threat detection based on group CNN for privacy protection,” Wireless Communications and Mobile Computing, pp. 1-18, 2021.

Mr. Bhushan Bandre, Ms. Rashmi Khalatkar. (2015). Impact of Data Mining Technique in Education Institutions. International Journal of New Practices in Management and Engineering, 4(02), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/35

Satyanarayana, K. ., Aharon, S., Subramanyam, M., Chakradhari, C., & Anand, K. (2023). A Hybrid Microgrid Operated by PV Wind and Diesel Generator with Advanced Control Strategy. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 171–181. https://doi.org/10.17762/ijritcc.v11i4s.6325

Downloads

Published

21.09.2023

How to Cite

Mathew, J. ., & Priyadarsini , R. J. . (2023). Efficient DDOS Detection in Internet of Medical Things using CNN-ACL Approach. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 789–799. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3612

Issue

Section

Research Article