Effective Deep Learning-Based Attack Detection Methods for the Internet of Medical Things

Effective Deep Learning-Based Attack Detection Methods for the Internet of Medical Things

DOI: 10.4018/978-1-6684-8938-3.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Recently, the internet of things (IoT) has evolved into a breakthrough for creating intelligent settings. Any technology's reliance on the IoT model is seen as having major security and privacy issues. The various conceivable attacks carried out by intruders give rise to privacy and security considerations. Therefore, creating an intrusion detection system is crucial for identifying attacks and anomalies in the IoT system. In this work, a deep belief network (DBN) algorithm model for the intrusion detection system has been proposed. The CICIDS 2017 dataset is used for the performance analysis of the current IDS model in terms of assaults and anomaly detection. Accuracy, recall, precision, F1-score, detection rate, and other characteristics were all improved by the proposed method. IoT technology has revolutionized how healthcare is provided to patients. Medical institutions are very concerned about IoT security because of the network enabled IoT devices' integration with healthcare network infrastructure.
Chapter Preview
Top

1. Introduction

The Internet of Things (IoT) is a type of network that connects everything to the Internet based on a predetermined protocol over data sensing devices, allowing for data sharing and exchanges as well as intelligent identification, tracing, placement, administration, and monitoring. The Internet of Things is typically defined as a network of physical items. However, the internet has evolved into a network of devices of all shapes and sizes, including home appliances, smartphones, cars, cameras, medical devices, contemporary frameworks, people, animals, and structures. Each of these connected devices shares and communicates data according to predetermined protocols. (Keyur & Sunil, 2016). The IoT is an internet comprising three different types of relationships and can be considered as i) Human to human, ii) Human to machine or thing, iii) Internet-based communication between machines and objects (HaddadPajouh et al., 2018). The goal of the IoT is to enable connections between things at any time, anywhere, with anything, and with anyone, ideally using any pathways, networks, and supports. There are numerous uses for the IoT. IoT is a technology that utilizes networks to connect and communicate with the physical environment. Smart homes, smart transportation, and intelligent healthcare are just a few of the many applications that the Internet of Things can be used for. (Ali Al-Garadi et al., 2018) The market for IoT in healthcare has grown in recent years. Cyber-physical systems (CPS), which connect IoMT devices like blood glucose monitors, pulse oximeters, asthma inhalers, and other wearables, have been widely used by healthcare institutions. IoT healthcare apps may track patients, samples, and supplies, as well as enhance service quality and job efficiency, by leveraging biometric data and measurements gathered by sensors. Due to the healthcare industry's stringent security regulations and HIPAA compliance, security concerns must be considered along with the ease and benefits of emerging technology. Through IoT medical equipment, patient data has been unlawfully acquired and transmitted.

1.1. Effect of IoMT Attacks

Healthcare typically suffers more damage from an IoT-focused hack than the average across all industries. Due to the growing IoMT deployment rates and security flaws in healthcare organisations' smart devices, IoMT security incidents have increased since 2019 (Pascu, 2022). Adversaries have a financial advantage in the business of cybercrime. Attacks against IoMT devices have the potential to injure patients gravely and perhaps endanger their lives. Considering their significance for safety and security, IoMT devices and healthcare infrastructure have therefore emerged as prime targets for attacks. Ransomware is one of the deadliest risks from cyberattacks for all industries. Healthcare businesses were, regrettably, the most often targeted by ransomware attacks (Graham, 2020). They are the most in need and willing to pay when it comes to the COVID problem. The frequency and complexity of the assaults are predicted to rise. Because any malfunction might compromise patient safety and privacy, security concerns with IoTs should be a major concern for administrators in the healthcare industry. To ensure that the advantages of IoT can be realized in the healthcare industry, a solid defensive plan is important.

Complete Chapter List

Search this Book:
Reset