[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Intrusion Detection System for IoE-Based Medical Networks

Published: 14 April 2023 Publication History

Abstract

Internet of everything (IoE) has the power of reforming the healthcare sector - various medical devices, hardware, and software applications that are interconnected, tendering a massive volume of data. The huge interconnected medical-based network is prone to significant malicious attacks that can modify the medical data being communicated and transferred. IoE permits dynamic two-way communication and empowers the network with intellect, sophisticated data handling, caching, and allocation mechanisms. In this paper, an improvement in the conventional variable-sized detector generation for healthcare - IVD-IMT algorithm under Artificial Immune System (AIS) based Intrusion Detection System (IDS) capable of handling enormous data generated by the IoE medical network is proposed. Algorithm efficiency is dependent on two performance metrics - detection rate and false alarm rate. The input parameters were tuned using synthetic datasets and then tested over the NSL-KDD dataset. The research lays emphasis on lowering the false alarm rate without compromising on the detection rate.

References

[1]
Angelov, P. P., Silva, G. C., & Dasgupta, D. (2016). A survey of recent works in artificial immune systems. In Handbook on computational intelligence (pp. 547–586). 005. World Scientific Publishing.
[2]
Balthrop, J., Esponda, F., Forrest, S., & Glickman, M. (2002). Coverage and generalisation in anartificial immune system. In Genetic and Evolutionary Computation, 3–10.
[3]
BanuR.AhammedG. F. A.FathimaN. (2016). A review on biologically inspired approaches to security for Internet of things (IoT). In International Conference on Electrical, Electronics, and Optimization Techniques(ICEEOT), (pp. 1062–1066). IEEE. 10.1109/ICEEOT.2016.7754848
[4]
BaraniF. (2014). A hybrid approach for dynamic intrusion detection in adhoc networks usinggenetic algorithm and artificial immune system. In Journal of Intelligent Systems (ICIS) Iranian Conference, (pp. 1–6). IEEE.
[5]
Bayar, N., Darmoul, S., Hajri-Gabouj, S., & Pierreval, H. (2015, November). Fault detection, diagnosis and recovery using artificial immune systems: A review. Engineering Applications of Artificial Intelligence, 46, 43–57.
[6]
Bendiab, E., & Kholladi, M.-K. (2010). The negative selection algorithm: A supervised learning approach for skin detection and classification. IJCSNS International Journal of Computer Science and Network Security, 10, 86–92.
[7]
D’haeseleerP.ForrestS.HelmanP. (1996). An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, (pp. 110–119). IEEE Computer Society. 10.1109/SECPRI.1996.502674
[8]
Dasgupta, D., Ji, Z., & Gonzalez, F. (2004). Artificial immune system (AIS) Research in the Last Five Years. Proceedings. (pp. 123–130). CEC.
[9]
Del Gaudio, D., & Hirmer, P. (2021). The IoT Vision: Challenges and Research Gaps. International Journal of Organizational and Collective Intelligence, 11(4), 1–12.
[10]
Dong, B., Yang, J., Ma, Y., & Zhang, X. (2016). Medical monitoring model of Internet of things based on the adaptive threshold difference algorithm. International Journal of Multimedia and Ubiquitous Engineering, 11(5), 75–82.
[11]
Dwivedi, A., Srivastava, G., Dhar, S., & Singh, R. (2019). A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors (Basel), 19(2), 326. 30650612.
[12]
Foley, P. G. (2021). Security Measures in IoT Devices, Including Wireless Medical Devices: Factors Influencing the Adoption of Effective Security Measures. IGI Global. https://www.igi-global.com/article/security-measures-in-iot-devices-including-wireless-medical-devices/308267
[13]
ForrestS.PerelsonA.AllenL.CherukuriR. (1994). Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (pp. 202–212). IEEE Computer Society Press. 10.1109/RISP.1994.296580
[14]
Hart, E. (2005). Not all balls are round: An investigation of alternative recognition-region shapes. In Lecture Notes in Computer Science, 29–42.
[15]
Hidayat, E., Fajrian, N. A., Muda, A. K., Huoy, C. Y., & Ahmad, S. (2011). A comparative study of feature extraction using PCA and LDA for face recognition. 7th International Conference on Information Assurance and Security (IAS), (pp. 354–359). IEEE.
[16]
Igawa, K., & Ohashi, H. (2009). A negative selection algorithm for classification and reduction ofthe noise effect. Journal of Applied Soft Computing, 9, 431–438.
[17]
Ji, Z., & Dasgupta, D. (2004). Real-valued negative selection algorithm with Variable-sized detectors. Lecture Notes in Computer Science, 30, 287–298.
[18]
Ji, Z., & Dasgupta, D. (2005). Estimating the detector coverage in a negative selection algorithm. In H.-G. Beyer et al. (Eds.). GECCO 2005. Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, 1 (pp. 281–288). ACM Press. 10.1145/1068009.1068056
[19]
Ji, Z., & Dasgupta, D. (2009). V-detector: An efficient negative selection algorithm with “probably adequate” detector coverage. Information Sciences, 179(10), 1390–1406.
[20]
Kumar, K. B. S., & Bairavi, K. (2016). IoT based health monitoring system for autistic patients. Proceedings of the Symposium on Big Data and Cloud Computing Challenges. Smart Innovation, Systems and Technologies.
[21]
Langley, D. J., van Doorn, J., Ng, I. C. L., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The Internet of Everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.
[22]
Lata, M., & Kumar, V. (2021). Standards and Regulatory Compliances for IoT Security. International Journal of Service Science, Management, Engineering, and Technology, 12(5), 133–147.
[23]
Lhazmir, S., El Moudden, I., & Kobbane, A. (2017). Feature extraction based on principal component analysis for text categorization. International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), (pp. 1–6). IEEE.
[24]
Meena, G., & Choudhary, R. R. (2017). A review paper on IDS classification using KDD 99 and NSL KDD dataset in Weka. International Conference on Computer, Communications and Electronics (Comptelix), (pp. 553–558). . 8004032 IEEE.
[25]
Miraz, M., Ali, M., Excell, P., & Picking, R. (2018). Internet of nano-things, things and everything: Future growth trends. Future Internet, 10(8), 68.
[26]
Muhammad, G., Rahman, S. M. M., Alelaiwi, A., & Alamri, A. (2017, January). AL elaiwi, and A. Alamri. IEEE Communications Magazine, 55(1), 69–73.
[27]
Murali, M. (2015). Principal component analysis based Feature Vector Extraction. Indian Journal of Science and Technology, 8(35). Advance online publication.
[28]
Pamukov, M. E., & Poulkov, V. K. (2017). Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems. 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (pp. 543–547). IEEE.
[29]
Patel, K. K., & Patel, S. M. (2016). Internet of things IOT: Definition, characteristics, architecture, enabling technologies, application future challenges. International Journal of Engineering Science and Computing, 6(5), 6122–6131.
[30]
Read, M., Andrews, P., & Timmis, J. (2012). An introduction to Artificial Immune systems.
[31]
Ryan, P. J., & Watson, R. B. (2017). Research challenges for the Internet of things: What role can OR play? Systems, 5(1), 1–34.
[32]
ShapiroJ. M.LamontG. B.PetersonG. L. (2005). An evolutionary algorithm to generate hyperellipsoid detectors for negative selection. In BeyerH.-G. (Eds.) Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, 1 (pp. 337–344). ACM Press.
[33]
Some, E., Boots, B., & Gondwe, G. (2021). Enabling 5G and IoT: In Search of More Spectrum for Connected Devices. International Journal of Interdisciplinary Telecommunications and Networking, 13(4), 1–10.
[34]
Srivastava, G., & Lin, J. (2021). Chun-Wei and Pirouz, matin and Li, Yuanfa and Yun,Unil, A Pre-Large Weighted-Fusion System of Sensed High-Utility Pattern . IEEE Sensors Journal.
[35]
Sunke, B. (2008). Research and analysis of network intrusion detection system [Thesis]. GTBIT, GGSIPU, India.
[36]
Tan, Y. (2016). Artificial immune system: Applications in. Computers and Security, 1(18). Wiley. https://www.wiley. com/en-us/Artificial
[37]
Thirumalai, C., & Mohan, S., & Srivastava, G. (2020). An efficient public, key secure scheme for cloud and IoT security. In Computer Communications.
[38]
Tiwari, M., Kumar, R., Bharti, A., & Kishan, J. (2017). Intrusion Detection System. International Journal of Technical Research and Applications., 5, 2320–8163.
[39]
Xu, J., Wang, J., Xie, S., Chen, W., & Kim, J. (2013) January,. Study on intrusion detection policy for Wireless sensor networks. International Journal of Security and its Applications, 7(1), 1–6.
[40]
Yang, C., Jia, L., Chen, B., & Wen, H. (2020). Negative selection algorithm based on AntigenDensity clustering. IEEE Access : Practical Innovations, Open Solutions, 8, 44967–44975.
[41]
Yang, H., Li, T., Hu, X., Wang, F., & Zou, Y. (2014). A survey of artificial immune systembased intrusion detection. TheScientificWorldJournal, 2014.
[42]
Yeole, A. S., & Kalbande, D. R. (2016). Use of Internet of Things (IoT) in Healthcare: A Survey. In Proceedings of the ACM Symposium on Women in Research 2016 (WIR ’16) (pp. 71–76). Association for Computing Machinery.

Cited By

View all
  • (2023)Federated Learning for Collaborative Cybersecurity of Distributed HealthcareAdvances in Mobile Computing and Multimedia Intelligence10.1007/978-3-031-48348-6_5(57-62)Online publication date: 4-Dec-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Database Management
Journal of Database Management  Volume 34, Issue 2
Jun 2023
144 pages

Publisher

IGI Global

United States

Publication History

Published: 14 April 2023

Author Tags

  1. Internet of Everything
  2. Medical Networks Security
  3. Intrusion Detection System
  4. Real Time
  5. Artificial Immune System
  6. Multidimensional Data Points

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Federated Learning for Collaborative Cybersecurity of Distributed HealthcareAdvances in Mobile Computing and Multimedia Intelligence10.1007/978-3-031-48348-6_5(57-62)Online publication date: 4-Dec-2023

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media