A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks

被引:34
|
作者
Fang, Liming [1 ]
Li, Yang [1 ]
Liu, Zhe [1 ]
Yin, Changchun [1 ]
Li, Minghui [1 ]
Cao, Zehong Jimmy [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Univ Tasmania, Coll Sci & Engn, Hobart, Tas 7001, Australia
基金
中国国家自然科学基金;
关键词
Protocols; Internet of Things; Monitoring; Security; Biomedical monitoring; Temperature sensors; Anomaly detection; Internet of Things (IoT); smart healthcare;
D O I
10.1109/TII.2020.3011444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of the Internet of Things (IoT) in medical field has brought unprecedented convenience to human beings. However, attackers can use device configuration vulnerabilities to hijack devices, control services, steal medical data, or make devices operate illegally. These restrictions have led to huge security risks for IoT, and have challenged the management of critical infrastructure services. Based on these problems, this article proposes an anomaly detection system for detecting illegal behavior (DIB) in medical IoT environment.The DIB system can analyze data packets transmitted by medical IoT devices, learn operation rules by itself, and remind management personnel that the device is in an abnormal operation state to ensure the safety of control service. We further propose a model that is based on rough set theory and fuzzy core vector machine (FCVM) to improve the accuracy of DIB classification anomalies. Experimental results show that the R-FCVM is effective.
引用
收藏
页码:4260 / 4269
页数:10
相关论文
共 50 条
  • [41] TCMD: A Two-Tier Classification Model for Anomaly-based Detection in IoT
    Alghanmi, Nusaybah
    Alotaibi, Reem
    Buhari, Seyed M.
    2019 6TH SWISS CONFERENCE ON DATA SCIENCE (SDS), 2019, : 130 - 135
  • [42] Bayesian Model Updating Method Based Android Malware Detection for IoT Services
    Wu, Fei
    Xiao, Limin
    Zhu, Jinbin
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 61 - 66
  • [43] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880
  • [44] An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks
    Kasim, Omer
    COMPUTER NETWORKS, 2020, 180
  • [45] A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT
    Wang, Yilei
    Li, Chunmei
    Zhang, Yiting
    Li, Tao
    Ning, Jianting
    Gai, Keke
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19564 - 19574
  • [46] An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks
    Rajkumar S.
    Sheeba S.L.
    Sivakami R.
    Prabu S.
    Selvarani A.
    SN Computer Science, 4 (4)
  • [47] Application Layer-Based Denial-of-Service Attacks Detection against IoT-CoAP
    Almeghlef, Sultan M.
    Al-Ghamdi, Abdullah Al-Malaise
    Ramzan, Muhammad Sher
    Ragab, Mahmoud
    ELECTRONICS, 2023, 12 (12)
  • [48] Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services
    Luo, Yuansheng
    Li, Wenjia
    Qiu, Shi
    SENSORS, 2020, 20 (01)
  • [49] Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection
    Gualandi, Gabriele
    Papadopoulos, Alessandro, V
    2023 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS, ACSOS, 2023, : 117 - 126
  • [50] Anomaly-based intrusion detection system for IoT networks through deep learning model
    Saba, Tanzila
    Rehman, Amjad
    Sadad, Tariq
    Kolivand, Hoshang
    Bahaj, Saeed Ali
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99