A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks

被引:34
|
作者
Fang, Liming [1 ]
Li, Yang [1 ]
Liu, Zhe [1 ]
Yin, Changchun [1 ]
Li, Minghui [1 ]
Cao, Zehong Jimmy [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Univ Tasmania, Coll Sci & Engn, Hobart, Tas 7001, Australia
基金
中国国家自然科学基金;
关键词
Protocols; Internet of Things; Monitoring; Security; Biomedical monitoring; Temperature sensors; Anomaly detection; Internet of Things (IoT); smart healthcare;
D O I
10.1109/TII.2020.3011444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of the Internet of Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities to hijack devices, control services, steal medical data, or make devices operate illegally. These restrictions have led to huge security risks for IoT, and have challenged the management of critical infrastructure services. Based on these problems, this article proposes an anomaly detection system for detecting illegal behavior (DIB) in medical IoT environment.The DIB system can analyze data packets transmitted by medical IoT devices, learn operation rules by itself, and remind management personnel that the device is in an abnormal operation state to ensure the safety of control service. We further propose a model that is based on rough set theory and fuzzy core vector machine (FCVM) to improve the accuracy of DIB classification anomalies. Experimental results show that the R-FCVM is effective.
引用
收藏
页码:4260 / 4269
页数:10
相关论文
共 50 条
  • [21] Model Stealing Detection for IoT Services Based on Multidimensional Features
    Liu, Xinjing
    Liu, Taifeng
    Yang, Hao
    Dong, Jiakang
    Ying, Zuobin
    Ma, Zhuo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39183 - 39194
  • [22] Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection
    Lai, Yuni
    Waniek, Marcin
    Li, Liying
    Wu, Jingwen
    Zhu, Yulin
    Michalak, Tomasz P.
    Rahwan, Talal
    Zhou, Kai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9315 - 9329
  • [23] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [24] HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)
    Breitenbacher, Dominik
    Homoliak, Ivan
    Aung, Yan Lin
    Elovici, Yuval
    Tippenhauer, Nils Ole
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 9640 - 9658
  • [25] A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks
    Liu, Bing
    Zhang, Zhe
    Hu, Shengrong
    Sun, Song
    Liu, Dapeng
    Qiu, Zhenyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4049 - 4069
  • [26] A New Data Model for Behavioral Based Anomaly Detection in IoT Device Monitoring
    Michalak, Marcin
    Biczyk, Piotr
    Adamczyk, Blazej
    Brzeczek, Maksym
    Hermansa, Marek
    Kostorz, Iwona
    Wawrowski, Lukasz
    Czerwinski, Michal
    ROUGH SETS, IJCRS 2023, 2023, 14481 : 599 - 611
  • [27] Anomaly Detection Based on LSTM Learning in IoT-Based Dormitory for Indoor Environment Control
    Noh, Seol-Hyun
    Moon, Hyeun Jun
    Zhang, Chong
    Guo, Rui
    Min, Yunran
    Zhuang, Chaoqun
    BUILDINGS, 2023, 13 (11)
  • [28] Data Poisoning Attacks against Autoencoder-based Anomaly Detection Models: a Robustness Analysis
    Bovenzi, Giampaolo
    Foggia, Alessio
    Santella, Salvatore
    Testa, Alessandro
    Persico, Valerio
    Pescape, Antonio
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5427 - 5432
  • [29] Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks
    Ghinita, Gabriel
    Damiani, Maria Luisa
    Silvestri, Claudio
    Bertino, Elisa
    ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS, 2016, 2 (02)
  • [30] Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
    Erba, Alessandro
    Taormina, Riccardo
    Galelli, Stefano
    Pogliani, Marcello
    Carminati, Michele
    Zanero, Stefano
    Tippenhauer, Nils Ole
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 480 - 495