A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks

被引:34
|
作者
Fang, Liming [1 ]
Li, Yang [1 ]
Liu, Zhe [1 ]
Yin, Changchun [1 ]
Li, Minghui [1 ]
Cao, Zehong Jimmy [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Univ Tasmania, Coll Sci & Engn, Hobart, Tas 7001, Australia
基金
中国国家自然科学基金;
关键词
Protocols; Internet of Things; Monitoring; Security; Biomedical monitoring; Temperature sensors; Anomaly detection; Internet of Things (IoT); smart healthcare;
D O I
10.1109/TII.2020.3011444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of the Internet of Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities to hijack devices, control services, steal medical data, or make devices operate illegally. These restrictions have led to huge security risks for IoT, and have challenged the management of critical infrastructure services. Based on these problems, this article proposes an anomaly detection system for detecting illegal behavior (DIB) in medical IoT environment.The DIB system can analyze data packets transmitted by medical IoT devices, learn operation rules by itself, and remind management personnel that the device is in an abnormal operation state to ensure the safety of control service. We further propose a model that is based on rough set theory and fuzzy core vector machine (FCVM) to improve the accuracy of DIB classification anomalies. Experimental results show that the R-FCVM is effective.
引用
收藏
页码:4260 / 4269
页数:10
相关论文
共 50 条
  • [1] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [2] ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks
    Li, Ruoyu
    Li, Qing
    Zhou, Jianer
    Jiang, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10576 - 10587
  • [3] Federated-Learning-Based Anomaly Detection for IoT Security Attacks
    Mothukuri, Viraaji
    Khare, Prachi
    Parizi, Reza M.
    Pouriyeh, Seyedamin
    Dehghantanha, Ali
    Srivastava, Gautam
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2545 - 2554
  • [4] An ensemble hyper-tuned model for IoT sensors attacks and anomaly detection
    Singh, Khushal
    Singh, Nanhay
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (07): : 1715 - 1739
  • [5] Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model
    Sanjay Chakraborty
    Saroj Kumar Pandey
    Saikat Maity
    Lopamudra Dey
    SN Computer Science, 5 (8)
  • [6] An IoT Anomaly Detection Model Based on Artificial Immunity
    Liu, Caiming
    Chen, Siyu
    Zhang, Yan
    Chen, Run
    Guo, Kuiliang
    ADVANCED RESEARCH ON ENGINEERING MATERIALS, ENERGY, MANAGEMENT AND CONTROL, PTS 1 AND 2, 2012, 424-425 : 625 - +
  • [7] Fast Anomaly Detection for IoT Services Based on Multisource Log Fusion
    Jiang, Xingguo
    Luo, Hong
    Sun, Yan
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 9405 - 9419
  • [8] HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices
    Breitenbacher, Dominik
    Homoliak, Ivan
    Aung, Yan Lin
    Tippenhauer, Nils Ole
    Elovici, Yuval
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 479 - 484
  • [9] Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
    Erba, Alessandro
    Tippenhauer, Nils Ole
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 412 - 426
  • [10] A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation
    Ahmadi, Khatereh
    Javidan, Reza
    IET INFORMATION SECURITY, 2024, 2024