Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Medical Things (IoMT) is a bionetwork of allied medical devices, sensors, wearable biosensor devices, etc. It is gradually reforming the healthcare industry by leveraging its capabilities to improve personalized healthcare services by enabling seamless communication of medical data. IoMT facilitates prompt emergency responses and provides improved quality of medical services with minimum cost. With the advancement of modern technology, progressively ubiquitous medical devices raise critical security and data privacy concerns through resource constraints and open connectivity. Vulnerabilities in IoMT devices allow unauthorized access for potential entry into healthcare and sensitive personal data. In addition, the patient may experience severe physical damage with the attack on IoMT devices. To provide security to IoMT devices and privacy to patient data, we have proposed a novel IoMT framework with the hybridization of Bayesian optimization and extreme learning machine (ELM). The proposed model derives encouraging performance with enhanced accuracy in decision-making process compared to similar state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Sayeed MA et al (2019) Neuro-detect: a machine learning-based fast and accurate seizure detection system in the IoMT. IEEE Trans Consumer Electron 65(3):359–368

    Article  Google Scholar 

  2. Reddy DKK et al (2021) Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment. J Inform Secur Appl 60:102866

    Google Scholar 

  3. Ghubaish A et al (2020) Recent advances in the internet-of-medical-things (IoMT) systems security. IEEE Internet Things J 8(11):8707–18

    Article  Google Scholar 

  4. Begli MR, Farnaz D, Hadis K (2019) A layered intrusion detection system for critical infrastructure using machine learning. In: 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE). IEEE

  5. Marwan M, Kartit A, Ouahmane H (2018) Security enhancement in healthcare cloud using machine learning. Proc Comput Sci 127:388–397

    Article  Google Scholar 

  6. Newaz AKMI, et al (2019) Healthguard: a machine learning-based security framework for smart healthcare systems. In: 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE

  7. He D et al (2019) Intrusion detection based on stacked autoencoder for connected healthcare systems. IEEE Netw 33(6):64–69

    Article  Google Scholar 

  8. Al-Shaher MA, Hameed RT, Ţăpuş N (2017) Protect healthcare system based on intelligent techniques. In: 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT), pp 0421–0426. IEEE

  9. Lakhan A, et al. (2021) Mobile‐fog‐cloud assisted deep reinforcement learning and blockchain‐enable IoMT system for healthcare workflows. Trans Emerging Telecommun Technol e4363

  10. Lakhan A et al (2021) Smart-contract aware ethereum and client-fog-cloud healthcare system. Sensors 21(12):4093

    Article  Google Scholar 

  11. Lakhan A, et al (2021) Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud. In: Enterprise Information Systems, pp 1–23

  12. Mutlag AA, Ghani MK, Mohammed MA (2021) A healthcare resource management optimization framework for ECG biomedical sensors. In: Efficient Data Handling for Massive Internet of Medical Things, pp 229–244. Springer, Cham

  13. Golec M, et al (2021) iFaaSBus: a security and privacy based lightweight framework for serverless computing using IoT and machine learning. IEEE Trans Ind Inform (2021)

  14. Yuvaraj N, Karthikeyan T, Praghash K (2021) An improved task allocation scheme in Serverless computing using gray wolf optimization (GWO) based Reinforcement Learning (RIL) approach. Wireless Pers Commun 117(3):2403–2421

    Article  Google Scholar 

  15. Pirbhulal S, et al (2019) Towards machine learning enabled security framework for IoT-based healthcare. In: 2019 13th International Conference on Sensing Technology (ICST). IEEE

  16. Swarna Priya RM et al (2020) An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 160:139–149

    Article  Google Scholar 

  17. Haseeb K et al (2021) A machine learning SDN-enabled big data model for IoMT systems. Electronics 10(18):2228

    Article  Google Scholar 

  18. Khan SR et al (2020) IoMT-based computational approach for detecting brain tumor. Future Gener Comput Syst 109:360–367

    Article  Google Scholar 

  19. Das A et al (2019) Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression. Future Gener Comput Syst 93:486–498

    Article  Google Scholar 

  20. Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70:489–501

    Article  Google Scholar 

  21. Huang GB, Zhou H, Ding X, Zhang R (2012) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B Cybern 42:513–529

    Article  Google Scholar 

  22. Mockus J (2012) Bayesian approach to global optimization: theory and applications, vol 37. Springer, Berlin

    MATH  Google Scholar 

  23. Moustafa N (2019) ToN_IoT Datasets, 2019 (online). https://doi.org/10.21227/feszdm97. Accessed on 8th February 2021

  24. Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. In: Computer Communications, vol 166. Elsevier, Amsterdam, pp 110–124. https://doi.org/10.1016/j.comcom.2020.12.003

  25. Radoglou-Grammatikis P, Sarigiannidis P, et al (2021) A self-learning approach for detecting intrusions in healthcare systems. In: ICC 2021: IEEE International Conference on Communications. IEEE, pp 1–6. https://doi.org/10.1109/ICC42927.2021.9500354

  26. Radoglou-Grammatikis P, Robolos K et al (2021) Modelling, detecting and mitigating threats against industrial healthcare systems: a combined SDN and reinforcement learning approach. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2021.3093905

    Article  Google Scholar 

  27. Hatamian A, Tavakoli MB, Moradkhani M (2021) Improving the security and confidentiality in the internet of medical things based on edge computing using clustering. In: Computational Intelligence and Neuroscience.https://doi.org/10.1155/2021/6509982

  28. Moukafih N, Orhanou G, El Hajji S (2020) Neural network-based voting system with high capacity and low computation for intrusion detection in SIEM/IDS systems. Secur Commun Netw 2020:1–15. https://doi.org/10.1155/2020/3512737

    Article  Google Scholar 

  29. Saba T (2020) Intrusion detection in smart city hospitals using ensemble classifiers. In: 2020 13th International Conference on Developments in eSystems Engineering (DeSE). IEEE, pp 418–422. https://doi.org/10.1109/DeSE51703.2020.9450247

  30. Manimurugan S et al (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8(2):77396–77404. https://doi.org/10.1109/ACCESS.2020.2986013

    Article  Google Scholar 

  31. Midani W, Fki Z, BenAyed M (2019) Online anomaly detection in ECG signal using hierarchical temporal memory. In: 2019 Fifth International Conference on Advances in Biomedical Engineering (ICABME). IEEE, pp 1–4. https://doi.org/10.1109/ICABME47164.2019.8940307

  32. Gill SS, Tuli S, Xu M, Singh I, Singh KV, Lindsay D, Garraghan P (2019) Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges. Internet Things 8:100118

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janmenjoy Nayak.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nayak, J., Meher, S.K., Souri , A. et al. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. J Supercomput 78, 14866–14891 (2022). https://doi.org/10.1007/s11227-022-04453-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04453-z

Keywords