An investigation and comparison of machine learning approaches for intrusion detection in IoMT network

被引:0
|
作者
Adel Binbusayyis
Haya Alaskar
Thavavel Vaiyapuri
M. Dinesh
机构
[1] Prince Sattam Bin Abdulaziz University,College of Computer Engineering and Sciences
[2] Saudi Electronic University,College of Computing and Informatics
来源
关键词
Internet of medical things (IoMT); Security issues; Intrusion detection system; Machine learning (ML); -nearest neighbor (KNN); Naïve Bayes (NB); Support-vector machine (SVM); Artificial neural network (ANN); Decision tree (DT);
D O I
暂无
中图分类号
学科分类号
摘要
Internet of Medical Things (IoMT) is network of interconnected medical devices (smart watches, pace makers, prosthetics, glucometer, etc.), software applications, and health systems and services. IoMT has successfully addressed many old healthcare problems. But it comes with its drawbacks essentially with patient’s information privacy and security related issues that comes from IoMT architecture. Using obsolete systems can bring security vulnerabilities and draw attacker’s attention emphasizing the need for effective solution to secure and protect the data traffic in IoMT network. Recently, intrusion detection system (IDS) is regarded as an essential security solution for protecting IoMT network. In the past decades, machines learning (ML) algorithms have demonstrated breakthrough results in the field of intrusion detection. Notwithstanding, to our knowledge, there is no work that investigates the power of machines learning algorithms for intrusion detection in IoMT network. This paper aims to fill this gap of knowledge investigating the application of different ML algorithms for intrusion detection in IoMT network. The investigation analysis includes ML algorithms such as K-nearest neighbor, Naïve Bayes, support vector machine, artificial neural network and decision tree. The benchmark dataset, Bot-IoT which is publicly available with comprehensive set of attacks was used to train and test the effectiveness of all ML models considered for investigation. Also, we used comprehensive set of evaluation metrics to compare the power of ML algorithms with regard to their detection accuracy for intrusion in IoMT networks. The outcome of the analysis provides a promising path to identify the best the machine learning approach can be used for building effective IDS that can safeguard IoMT network against malicious activities.
引用
收藏
页码:17403 / 17422
页数:19
相关论文
共 50 条
  • [31] Classification of Intrusion Detection Dataset using machine learning Approaches
    Subramanyam, Doodipalli
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 280 - 283
  • [32] Machine learning techniques for web intrusion detection - a comparison
    Truong Son Pham
    Tuan Hao Hoang
    Van Canh Vu
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE), 2016, : 291 - 297
  • [33] Network Intrusion Detection Using Machine Learning Anomaly Detection Algorithms
    Hanifi, Khadija
    Bank, Hasan
    Karsligil, M. Elif
    Yavuz, A. Gokhan
    Guvensan, M. Amac
    [J]. 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [34] An investigation of machine learning-based intrusion detection system in mobile ad hoc network
    Singh, C. Edwin
    Vigila, S. Maria Celestin
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2023, 11 (01) : 54 - 70
  • [35] Public Domain Datasets for Optimizing Network Intrusion and Machine Learning Approaches
    Deraman, Maznan
    Desa, Abd Jalil
    Othman, Zulaiha Ali
    [J]. 2011 3RD CONFERENCE ON DATA MINING AND OPTIMIZATION (DMO), 2011, : 51 - 56
  • [36] Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion
    Abd Jalil, Kamarularifin
    Kamarudin, Muhammad Hilmi
    Masrek, Mohamad Noorman
    [J]. 2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 221 - 226
  • [37] On the feasibility of adversarial machine learning in malware and network intrusion detection
    Venturi, Andrea
    Zanasi, Claudio
    [J]. 2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
  • [38] Adversarial machine learning for network intrusion detection: A comparative study
    Jmila, Houda
    Ibn Khedher, Mohamed
    [J]. COMPUTER NETWORKS, 2022, 214
  • [39] Intrusion Detection on the In-Vehicle Network Using Machine Learning
    Sharmin, Shaila
    Mansor, Hafizah
    [J]. 2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 26 - 31
  • [40] Supervised Machine Learning Techniques for Efficient Network Intrusion Detection
    Aboueata, Nada
    Alrasbi, Sara
    Erbad, Aiman
    Kassler, Andreas
    Bhamare, Deval
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,