Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm

被引:10
|
作者
Alrowais, Fadwa [1 ]
Mohamed, Heba G. [2 ]
Al-Wesabi, Fahd N. [3 ]
Al Duhayyim, Mesfer [4 ]
Hilal, Anwer Mustafa [5 ]
Motwakel, Abdelwahed [5 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 84428, Riyadh 11671, Saudi Arabia
[2] Princess Nourah bint Abdulrahman Univ, Coll Engn, Dept Elect Engn, POB 84428, Riyadh 11671, Saudi Arabia
[3] King Khalid Univ, Coll Sci & Art Mahayil, Dept Comp Sci, Abha, Saudi Arabia
[4] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Al Kharj 16273, Saudi Arabia
[5] Prince Sattam bin Abdulaziz Univ, Dept Comp & Self Dev, Alkharj, Saudi Arabia
关键词
Medical cyber-physical system; ABC; Fuzzy C -mean; Attack detection; Sensor devices;
D O I
10.1016/j.compeleceng.2023.108636
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A medical cyber-physical system (MCPS) integrates medical sensor devices with cyber (infor-mation) components, which creates a sensitive approach and provides security. The MCPS plays a vital role in hospitals by detecting attacks and protecting patients' medical information. Many research projects have been carried out to detect attacks on the generation of medical information in MCPS. The issues with existing algorithms are their inefficiency and time-consuming maxi-mization of error rates. To overcome the challenges, this paper proposes detecting the attack using the fuzzy C-Means algorithm with artificial bee colony optimization (FCM-ABC). The novelty of the work is flexibility in deciding whether data points belong to actual users or at-tackers using the fuzzy c means degree [0,1] measuring technique of cluster formation. ABC is used in self-organizing the clusters with ABC collective intelligence. It monitors health infor-mation using sensor networks. The MCPS model interconnects the sensor devices remotely and collects the information. SVM has an accuracy rate of 76.32%, FCM has an accuracy rate of 81.34%, LSTM has an accuracy rate of 86.22%, and our proposed work, FCM-ABC, has an ac-curacy rate of 93.34%.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
    Jun Zhang
    Lei Pan
    Qing-Long Han
    Chao Chen
    Sheng Wen
    Yang Xiang
    IEEE/CAA Journal of Automatica Sinica, 2022, 9 (03) : 377 - 391
  • [42] Cyber-Physical System Attack Detection and Isolation: A Takagi-Sugeno Approach
    Guadarrama-Estrada, Angel R.
    Osorio-Gordillo, Gloria L.
    Vargas-Mendez, Rodolfo A.
    Reyes-Reyes, Juan
    Astorga-Zaragoza, Carlos M.
    MATHEMATICAL AND COMPUTATIONAL APPLICATIONS, 2025, 30 (01)
  • [43] Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
    Zhang, Jun
    Pan, Lei
    Han, Qing-Long
    Chen, Chao
    Wen, Sheng
    Xiang, Yang
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (03) : 377 - 391
  • [44] Attacker's perspective based analysis on cyber attack mode to cyber-physical system
    Su, Sheng, 1600, Power System Technology Press (38):
  • [45] Adaptive cyber-physical system attack detection and reconstruction with application to power systems
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12): : 1458 - 1468
  • [46] Attack detection and secure estimation under false data injection attack in cyber-physical systems
    Chattopadhyay, Arpan
    Mitra, Urbashi
    2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018,
  • [47] Review of the false data injection attack against the cyber-physical power system
    Wang, Qi
    Tai, Wei
    Tang, Yi
    Ni, Ming
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (02) : 101 - 107
  • [48] A Review on False Data Injection Attack Toward Cyber-physical Power System
    Wang Q.
    Tai W.
    Tang Y.
    Ni M.
    Zidonghua Xuebao/Acta Automatica Sinica, 2019, 45 (01): : 72 - 83
  • [49] Cyber attack mitigation for cyber-physical systems: hybrid system approach to controller design
    Kwon, Cheolhyeon
    Hwang, Inseok
    IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (07): : 731 - 741
  • [50] A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack
    Fan, Youping
    Li, Jingjiao
    Zhang, Dai
    IEEE ACCESS, 2018, 6 : 16972 - 16984