Abstract
Nowadays Mobile Health (also termed as m-Health) is an essential component of the healthcare sector. The m-healthcare uses different types of digitized devices (laptops, smart phones, tablets) to transfer patient runtime data very quickly among the different internetworking channels. The architecture of the m-health system is completely dependent on the centralized cloud computing system. Cloud computing architecture suffers from various attacks, which leads to the unavailability of data at runtime. The paper concentrates on the most vulnerable DDoS attack, which disrupts the network by unauthorized requests and breaks the reliability of the system. In the research paper, the authors have designed the four-layers m-healthcare architecture. An innovative DDoS recognition approach is proposed to easily identify the attacks in the system. The deterrence approaches are also analysed and experimented with the help of virtualized cloud-based software environment. The result section is progressed with the use of performance metrics, and analysis of maximum and mean value of DDoS attack success rate is also part of the research work.
Similar content being viewed by others
Availability of data and material
All data generated or analyzed during this study are included in this article (and its supplementary information files).
Code availability
The software application or custom code required in this research work are described and cited appropriately.
References
Mousavi SM and St-Hilaire M. 2015 Early detection of DDoS attacks against SDN controllers. In: Int Conf ComputNetwCommun ICNC, pp. 77–81.
Srinivas, J., Mishra, D., & Mukhopadhyay, S. (2017). A mutual authentication framework for wireless medical sensor networks. Journal of Medical Systems, 41(5), 1–19.
SomaniG, G. M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). Scale inside-out: Rapid mitigation of cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959–973.
Chanal, P. M., & Kakkasageri, M. S. (2020). Security and privacy in IoT: A survey. Wireless Personal Communications, 115, 1668–1693.
Dayal, N., & Srivastava, S. (2017) Analyzing behavior of DDOS attacks to identify DDOS detection features in SDN. In 9th international conference on communication systems and networks, COMSNETS 2017, pp. 274–81.
Ili, Ko., Chambers, D., & Barrett, E. (2020). Adaptable feature-selecting and threshold-moving complete auto encoder for DDoS flood attack mitigation. Journal of Information Security Applicaiton, 55, 1–13.
Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access, 7, 64351–64365.
Gagnon, M. P., Ngangue, P., Payne-Gagnon, J., & Desmartis, M. (2016). m-Health adoption by healthcare professionals: A systematic review. Journal of the American Medical Informatics Association, 23(1), 212–220.
Dovidio, J. F., & Fiske, S. T. (2012). Under the radar: How unexamined biases in decision-making processes in clinical interactions can contribute to health care disparities. American Journal of public health, 102(5), 945–952.
Xu, L., & Wu, F. (2015). Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems, 39(2), 1–9.
Tawalbeh, L. A., MehmoodR, B. E., & Song, H. (2016). Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171–6180.
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.
Wamsley, D., & Chin-Yee, B. (2021). Covid 19, digital health technology and the politics of the unprecedented. Big Data & Society, 8(1), 1–6.
Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE Access, 6, 44570–44579.
Cambiaso, E., Papaleo, G., & Chiola Gand Aiello, M. (2015). Designing and modeling the slow next DoS attack. In Computational intelligence in security for information systems conference (pp. 249–259). Springer.
Yu, G., Li, T., Wei, J., & Liu, C. (2017). Assessment of reduction of quality attacks on mobile IP networks. In 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA/IUCC) (pp. 449-453). IEEE.
Wang, X., Chen, M., & Xing, C. (2015). SDSNM: A software-defined security networking mechanism to defend against DDoS attacks. In 2015 ninth international conference on frontier of computer science and technology (pp. 115–121). IEEE.
Sheela, P. S., & Choudhary, M. (2017). Deploying an OpenStack cloud computing framework for university campus. In 2017 international conference on computing, communication and automation (ICCCA) (pp. 819-824). IEEE.
Zekri, M., El Kafhali, S., Aboutabit, N., & Saadi, Y. (2017). DDoS attack detection using machine learning techniques in cloud computing environments. In 2017 3rd international conference of cloud computing technologies and applications (CloudTech) (pp. 1–7). IEEE.
Breitenbacher, D., & Elovici, Y. (2018). N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders. IEEE Pervasive Computing, 17, 12–22.
Fadil, A., Riadi, I., & Aji, S. (2017). Review of detection DDOS attack detection using naive Bayes classifier for network forensics. Bulletin of Electrical Engineering and Informatics, 6, 140–148.
Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233.
Ray, S., Mishra, K. N., & Dutta, S. (2021). Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sādhanā, 46, 1–25.
ChandrakarP,. (2019). A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks. International Journal of Ambient Computing and Intelligence (IJACI), 10(1), 96–116.
Dey, N., Ashour, A. S., & Bhatt, C. (2017). Internet of things driven connected healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 3–12). Springer, Cham.
Elhayatmy, G., Dey, N., & Ashour, A. S. (2018). Internet of Things based wireless body area network in healthcare. In Internet of things and big data analytics toward next-generation intelligence (pp. 3–20). Springer, Cham.
Dey, N., Ashour Amrita, S., & Shi, F. (2017). Developing residential wireless sensor networks for EGG healthcare monitoring. IEEE Transactions on Consumer Electronics, 63(4), 442–449.
Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares Joao Manuel, R. S. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 1–13.
Kamble, P., & Gawade, A. (2019). Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks. In 2019 international conference on contemporary computing and informatics (IC3I) (pp. 69–73). IEEE.
Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.
Zhang, J., & Xue Nand Huang, X. (2016). A secure systems for pervasive social network-based healthcare. In IEEE Access, 4, 9239–9250.
Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a cooperative, multi-domain DDoS defense by a blockchain signaling system (BloSS). In 43rd IEEE conference on local computer networks (LCN2018), demonstration track, Singapore, Singapore pp. 1–3.
Giri, N., Jaisinghani, R., Kriplani, R., Ramrakhyani, T., & Bhatia, V. (2019). Distributed denial of service (DDoS) mitigation in software defined network using blockchain. In 2019 third international conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) (pp. 673–678). IEEE.
Al-Sakran, H., Alharbi, Y., & Serguievskaia, I. (2019). Framework architecture for securing IoT using blockchain, smart contract and software defined network technologies. In 2019 2nd international conference on new trends in computing sciences (ICTCS) (pp. 1–6). IEEE.
Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A review of intrusion detection and blockchain applications in the cloud: Approaches, challenges, and solutions. IEEE Access, 8, 104893–104917.
Hanen, J., Kechaou, Z., & Ayed, M. B. (2016). An enhanced healthcare system in mobile cloud computing environment. Vietnam Journal of Computer Science, 3, 267–277.
Nkosi, M. T., & Mekuria, F. (2010). Cloud computing for enhanced mobile health applications. In 2010 IEEE second international Conference on cloud computing technology and science (pp. 629–633). IEEE.
Ray, S., Mishra, K. N., & Dutta, S. (2022). Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach. International Journal of Information Technology, 14(3), 1333–1341.
Ahmed, H. I., Nasr, A. A., Abdel-Mageid, S. M., & Aslan, H. K. (2021). DADEM: distributed attack detection model based on big data analytics for the enhancement of the security of internet of things (IoT). International Journal of Ambient Computing and Intelligence (IJACI), 12(1), 114–139.
Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: attacks and control in MANET. In Handbook of research on network forensics and analysis techniques (pp. 19–37). IGI Global.
Abdullah, E. G., Yildiz, K., & Buldu, A. (2021). Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications, 169, 1–8.
Albuquerque Silas, L., & Gondim Paulo, R. L. (2016). Security in cloud-computing-based mobile health. It Professional, 18(3), 37–44.
Sun, J., Zhu, X., Zhang, C., & Fang, Y. (2011). Security and privacy for Mobile healthcare (m-health) systems. Handbook on securing cyber-physical infrastructure.
Wang, Y., Hu, T., Tang, G., Xie, J., & Lu, J. (2019). SGS: Safe–guard scheme for protecting control plane against DDoS attacks in software–defined networking. IEEE Access, 7, 34699–34710.
Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127–140.
Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813–80828.
Wang, D., & Jie, J. (2010). A multi-core based DDoS detection method. In 2010 3rd international conference on computer science and information technology (Vol. 4, pp. 115–118). IEEE.
Milne, R., & Costa, A. (2020). Disruption and dislocation in Post-COVID futures for digital health. Big Data and Society, 7(2), 1–7.
Ray, S., Mishra, K. N., & Dutta, S. (2022). https://github.com/smray567/DDoS-attack-in-m-health.
Alazab, M. (2015). Profling and classifying the behavior of malicious codes. The Journal of Systems and Software, 100, 91–102.
Yang, J. G., Wang, X. T., & Liu, L. Q. (2016). Based on traffic and IP entropy characteristics of DDoS attack detection method. Application Research of Computers, 33(4), 1145–1149.
Nguyen, H. T., Ngo, Q. D., & Le, V. H. (2020). A novel graph-based approach for IoT botnet detection. International Journal of Information Security, 19(5), 567–577.
Funding
The fund for completing this review work was given by Birla Institute of Technology, Mesra, Ranchi, India (0027).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
Being the corresponding author, I declare that there is no conflict of interest between the authors or with any organization. The information about relevant data (if any) has been provided by the authors in the manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ray, S., Mishra, K.N. & Dutta, S. An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data. Wireless Pers Commun 128, 1763–1797 (2023). https://doi.org/10.1007/s11277-022-10018-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10018-3