Efficient DDOS Detection in Internet of Medical Things using CNN-ACL Approach
Keywords:
Healthcare, IoMT, DDOS detection, network security, machine learning, CNN-ACLAbstract
Internet of Things (IoT) has made great progress in the field of health care system and has the possibility of revolutionizing technical, sociological, and commercial hopes for a healthier future. The term "IoMT" (Internet of Medical Things) refers to the use of networking technology to connect medical devices and software programs related to health-care data to the Internet. These advancements allow the healthcare industry to continue providing patients with a higher level of attention and care. Despite the many advantages they provide, these gadgets also provide new attack surfaces, raising various security and privacy issues. Attacks against medical instruments that is connected to the Internet have the potential to affect people severely and in a life-threatening way. To guarantee accuracy and patient data confidentiality, this thesis focuses on offering a highly secure method of transmitting medical data via IoMT. This paper proposes the average convolution layer (CNN-ACL), a unique CNN architecture type for learning the content features of anomalous activity and then identifying the individual anomaly. A powerful system for detecting network DDOS that incorporates a cutting-edge convolutional layer capable of teaching low-level anomalous qualities is designed with the aid of the CNN-ACL, which is highly recommended. Experimental results demonstrate that this method's network DDOS detection effectiveness is superior to machine learning methods based on the KDDCUP99 and CICIDS2017 datasets. Python is used to stimulate the study, and the average accuracy may be increased to 91%, with 0.87 precision and 0.86 recall.
Downloads
References
F. Akram, D. Liu, P. Zhao, N. Kryvinska, S. Abbas and M. Rizwan, “Trustworthy intrusion detection in e-healthcare systems,” Frontiers in public health, vol. 9, pp. 788347, 2021.
S. Arunachalam, A. Sivasankari and S. Arthi, “Identifying The Fraud Detection in Health Care System Using Machine Learning,” 2019. DoI: 10.13140/RG.2.2.17720.88328.
A. A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, “Intrusion detection system for healthcare systems using medical and network data: A comparison study,” IEEE Access, vol. 8, pp. 106576-106584, 2020.
E. Aminanto and K. Kim, “Deep learning in intrusion detection system: An overview,” In 2016 International Research Conference on Engineering and Technology (2016 IRCET), pp 1-12, Seoul, South Korea
L. Deng and D. Yu, “Deep learning: methods and applications,” Foundations and trends® in signal processing, vol. 7, no. 3, pp. 197-387, 2014.
IBM 2016 “Cost of Data Breach Study United States,” I. Corp, Washington, DC, USA, 2016 September.
D. Kavitha, A. Vidhya, V. Prema, M. Priyadharshini, G. Kumaresan and G. Sangeetha, “An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 12, pp. ett.4610, 2022.
J. D. Lee, H. S. Cha, S. Rathore and J. H. Park, “M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT,” Computers, Materials & Continua, vol. 67, no. 2, 2021.
S. P. RM, P. K. R. Maddikunta, M. Parimala, S. Koppu, T. R. Gadekallu, C. L. Chowdhary and M. Alazab, “An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture,” Computer Communications, vol. 160, pp. 139-149, 2020.
K. K. Patel, S. M. Patel and P. Scholar, P. “Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges,” International journal of engineering science and computing, vol. 6, no. 5, 2016.
J. Rosen and B. Hannaford, “Doc at a distance,” IEEE spectrum, vol. 43, no. 10, pp. 34-39, 2006.
E. K. Wang, C. M. Chen, M. M. Hassan and A. Almogren, “A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain,” Future Generation Computer Systems, vol. 108, pp. 135-144, 2020.
W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, “Security and privacy in the medical internet of things: a review,” Security and Communication Networks, pp. 1-9, 2018.
S. Saif, P. Bhattacharjee, K. Karmakar, R. Saha and S. Biswas, “IoT-Based Secure Health Care: Challenges, Requirements and Case Study,” In Internet of Things Based Smart Healthcare: Intelligent and Secure Solutions Applying Machine Learning Techniques, pp. 327-350, 2022.
S. Saif, P. Das, S. Biswas, M. Khari and V. Shanmuganathan, “HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare,” Microprocessors and Microsystems, pp. 104622, 2022.
B. Susilo and R. F. Sari, “Intrusion detection in IoT networks using deep learning algorithm,” Information, vol. 11, no. 5, 279, 2020.
I. Ullah, A. Ullah, and M. Sajjad,”Towards a hybrid deep learning model for anomalous activities detection in internet of things networks,” IoT, vol. 2, no. 3, pp. 428-448, 2021.
T. Yaqoob, H. Abbas and M. Atiquzzaman, “Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3723-3768, 2019.
Y. Xu, X. Zhang, C. Lu, Z. Qiu, C. Bi, Y. Lai, and H. Zhang, “Network threat detection based on group CNN for privacy protection,” Wireless Communications and Mobile Computing, pp. 1-18, 2021.
Mr. Bhushan Bandre, Ms. Rashmi Khalatkar. (2015). Impact of Data Mining Technique in Education Institutions. International Journal of New Practices in Management and Engineering, 4(02), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/35
Satyanarayana, K. ., Aharon, S., Subramanyam, M., Chakradhari, C., & Anand, K. (2023). A Hybrid Microgrid Operated by PV Wind and Diesel Generator with Advanced Control Strategy. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 171–181. https://doi.org/10.17762/ijritcc.v11i4s.6325
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.