[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Nowadays Mobile Health (also termed as m-Health) is an essential component of the healthcare sector. The m-healthcare uses different types of digitized devices (laptops, smart phones, tablets) to transfer patient runtime data very quickly among the different internetworking channels. The architecture of the m-health system is completely dependent on the centralized cloud computing system. Cloud computing architecture suffers from various attacks, which leads to the unavailability of data at runtime. The paper concentrates on the most vulnerable DDoS attack, which disrupts the network by unauthorized requests and breaks the reliability of the system. In the research paper, the authors have designed the four-layers m-healthcare architecture. An innovative DDoS recognition approach is proposed to easily identify the attacks in the system. The deterrence approaches are also analysed and experimented with the help of virtualized cloud-based software environment. The result section is progressed with the use of performance metrics, and analysis of maximum and mean value of DDoS attack success rate is also part of the research work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Availability of data and material

All data generated or analyzed during this study are included in this article (and its supplementary information files).

Code availability

The software application or custom code required in this research work are described and cited appropriately.

References

  1. Mousavi SM and St-Hilaire M. 2015 Early detection of DDoS attacks against SDN controllers. In: Int Conf ComputNetwCommun ICNC, pp. 77–81.

  2. Srinivas, J., Mishra, D., & Mukhopadhyay, S. (2017). A mutual authentication framework for wireless medical sensor networks. Journal of Medical Systems, 41(5), 1–19.

    Article  Google Scholar 

  3. SomaniG, G. M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). Scale inside-out: Rapid mitigation of cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959–973.

    Article  Google Scholar 

  4. Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115, 1668–1693.

    Article  Google Scholar 

  5. Dayal, N., & Srivastava, S. (2017) Analyzing behavior of DDOS attacks to identify DDOS detection features in SDN. In 9th international conference on communication systems and networks, COMSNETS 2017, pp. 274–81.

  6. Ili, Ko., Chambers, D., & Barrett, E. (2020). Adaptable feature-selecting and threshold-moving complete auto encoder for DDoS flood attack mitigation. Journal of Information Security Applicaiton, 55, 1–13.

    Google Scholar 

  7. Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351–64365.

    Article  Google Scholar 

  8. Gagnon, M. P., Ngangue, P., Payne-Gagnon, J., & Desmartis, M. (2016). m-Health adoption by healthcare professionals: A systematic review. Journal of the American Medical Informatics Association, 23(1), 212–220.

    Article  Google Scholar 

  9. Dovidio, J. F., & Fiske, S. T. (2012). Under the radar: How unexamined biases in decision-making processes in clinical interactions can contribute to health care disparities. American Journal of public health, 102(5), 945–952.

    Article  Google Scholar 

  10. Xu, L., & Wu, F. (2015). Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems, 39(2), 1–9.

    Article  Google Scholar 

  11. Tawalbeh, L. A., MehmoodR, B. E., & Song, H. (2016). Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171–6180.

    Article  Google Scholar 

  12. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.

    Article  Google Scholar 

  13. Wamsley, D., & Chin-Yee, B. (2021). Covid 19, digital health technology and the politics of the unprecedented. Big Data & Society, 8(1), 1–6.

    Article  Google Scholar 

  14. Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE Access, 6, 44570–44579.

    Article  Google Scholar 

  15. Cambiaso, E., Papaleo, G., & Chiola Gand Aiello, M. (2015). Designing and modeling the slow next DoS attack. In Computational intelligence in security for information systems conference (pp. 249–259). Springer.

  16. Yu, G., Li, T., Wei, J., & Liu, C. (2017). Assessment of reduction of quality attacks on mobile IP networks. In 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA/IUCC) (pp. 449-453). IEEE.

  17. Wang, X., Chen, M., & Xing, C. (2015). SDSNM: A software-defined security networking mechanism to defend against DDoS attacks. In 2015 ninth international conference on frontier of computer science and technology (pp. 115–121). IEEE.

  18. Sheela, P. S., & Choudhary, M. (2017). Deploying an OpenStack cloud computing framework for university campus. In 2017 international conference on computing, communication and automation (ICCCA) (pp. 819-824). IEEE.

  19. Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd international conference of cloud computing technologies and applications (CloudTech) (pp. 1–7). IEEE.

  20. Breitenbacher, D., & Elovici, Y. (2018). N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Computing, 17, 12–22.

    Article  Google Scholar 

  21. Fadil, A., Riadi, I., & Aji, S. (2017). Review of detection DDOS attack detection using naive Bayes classifier for network forensics. Bulletin of Electrical Engineering and Informatics, 6, 140–148.

    Article  Google Scholar 

  22. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233.

    Article  Google Scholar 

  23. Ray, S., Mishra, K. N., & Dutta, S. (2021). Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sādhanā, 46, 1–25.

    Article  Google Scholar 

  24. ChandrakarP,. (2019). A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 10(1), 96–116.

    Article  Google Scholar 

  25. Dey, N., Ashour, A. S., & Bhatt, C. (2017). Internet of things driven connected healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 3–12). Springer, Cham.

  26. Elhayatmy, G., Dey, N., & Ashour, A. S. (2018). Internet of Things based wireless body area network in healthcare. In Internet of things and big data analytics toward next-generation intelligence (pp. 3–20). Springer, Cham.

  27. Dey, N., Ashour Amrita, S., & Shi, F. (2017). Developing residential wireless sensor networks for EGG healthcare monitoring. IEEE Transactions on Consumer Electronics, 63(4), 442–449.

    Article  Google Scholar 

  28. Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares Joao Manuel, R. S. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 1–13.

    Article  Google Scholar 

  29. Kamble, P., & Gawade, A. (2019). Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks. In 2019 international conference on contemporary computing and informatics (IC3I) (pp. 69–73). IEEE.

  30. Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.

    Article  Google Scholar 

  31. Zhang, J., & Xue Nand Huang, X. (2016). A secure systems for pervasive social network-based healthcare. In IEEE Access, 4, 9239–9250.

    Article  Google Scholar 

  32. Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In 43rd IEEE conference on local computer networks (LCN2018), demonstration track, Singapore, Singapore pp. 1–3.

  33. Giri, N., Jaisinghani, R., Kriplani, R., Ramrakhyani, T., & Bhatia, V. (2019). Distributed denial of service (DDoS) mitigation in software defined network using blockchain. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 673–678). IEEE.

  34. Al-Sakran, H., Alharbi, Y., & Serguievskaia, I. (2019). Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies. In 2019 2nd international conference on new trends in computing sciences (ICTCS) (pp. 1–6). IEEE.

  35. Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A review of intrusion detection and blockchain applications in the cloud: Approaches, challenges, and solutions. IEEE Access, 8, 104893–104917.

    Article  Google Scholar 

  36. Hanen, J., Kechaou, Z., & Ayed, M. B. (2016). An enhanced healthcare system in mobile cloud computing environment. Vietnam Journal of Computer Science, 3, 267–277.

    Article  Google Scholar 

  37. Nkosi, M. T., & Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In 2010 IEEE second international Conference on cloud computing technology and science (pp. 629–633). IEEE.

  38. Ray, S., Mishra, K. N., & Dutta, S. (2022). Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach. International Journal of Information Technology, 14(3), 1333–1341.

    Article  Google Scholar 

  39. Ahmed, H. I., Nasr, A. A., Abdel-Mageid, S. M., & Aslan, H. K. (2021). DADEM: distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT). International Journal of Ambient Computing and Intelligence (IJACI), 12(1), 114–139.

    Article  Google Scholar 

  40. Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: attacks and control in MANET. In Handbook of research on network forensics and analysis techniques (pp. 19–37). IGI Global.

  41. Abdullah, E. G., Yildiz, K., & Buldu, A. (2021). Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications, 169, 1–8.

    Google Scholar 

  42. Albuquerque Silas, L., & Gondim Paulo, R. L. (2016). Security in cloud-computing-based mobile health. It Professional, 18(3), 37–44.

    Article  Google Scholar 

  43. Sun, J., Zhu, X., Zhang, C., & Fang, Y. (2011). Security and privacy for Mobile healthcare (m-health) systems. Handbook on securing cyber-physical infrastructure.

  44. Wang, Y., Hu, T., Tang, G., Xie, J., & Lu, J. (2019). SGS: Safe–guard scheme for protecting control plane against DDoS attacks in software–defined networking. IEEE Access, 7, 34699–34710.

    Article  Google Scholar 

  45. Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127–140.

    Article  Google Scholar 

  46. Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813–80828.

    Article  Google Scholar 

  47. Wang, D., & Jie, J. (2010). A multi-core based DDoS detection method. In 2010 3rd international conference on computer science and information technology (Vol. 4, pp. 115–118). IEEE.

  48. Milne, R., & Costa, A. (2020). Disruption and dislocation in Post-COVID futures for digital health. Big Data and Society, 7(2), 1–7.

    Article  Google Scholar 

  49. Ray, S., Mishra, K. N., & Dutta, S. (2022). https://github.com/smray567/DDoS-attack-in-m-health.

  50. Alazab, M. (2015). Profling and classifying the behavior of malicious codes. The Journal of Systems and Software, 100, 91–102.

    Article  Google Scholar 

  51. Yang, J. G., Wang, X. T., & Liu, L. Q. (2016). Based on traffic and IP entropy characteristics of DDoS attack detection method. Application Research of Computers, 33(4), 1145–1149.

    Google Scholar 

  52. Nguyen, H. T., Ngo, Q. D., & Le, V. H. (2020). A novel graph-based approach for IoT botnet detection. International Journal of Information Security, 19(5), 567–577.

    Article  Google Scholar 

Download references

Funding

The fund for completing this review work was given by Birla Institute of Technology, Mesra, Ranchi, India (0027).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamta Nath Mishra.

Ethics declarations

Conflicts of interest

Being the corresponding author, I declare that there is no conflict of interest between the authors or with any organization. The information about relevant data (if any) has been provided by the authors in the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ray, S., Mishra, K.N. & Dutta, S. An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data. Wireless Pers Commun 128, 1763–1797 (2023). https://doi.org/10.1007/s11277-022-10018-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10018-3

Keywords

Navigation