Skip to main content

Advertisement

Log in

An investigation and comparison of machine learning approaches for intrusion detection in IoMT network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of Medical Things (IoMT) is network of interconnected medical devices (smart watches, pace makers, prosthetics, glucometer, etc.), software applications, and health systems and services. IoMT has successfully addressed many old healthcare problems. But it comes with its drawbacks essentially with patient’s information privacy and security related issues that comes from IoMT architecture. Using obsolete systems can bring security vulnerabilities and draw attacker’s attention emphasizing the need for effective solution to secure and protect the data traffic in IoMT network. Recently, intrusion detection system (IDS) is regarded as an essential security solution for protecting IoMT network. In the past decades, machines learning (ML) algorithms have demonstrated breakthrough results in the field of intrusion detection. Notwithstanding, to our knowledge, there is no work that investigates the power of machines learning algorithms for intrusion detection in IoMT network. This paper aims to fill this gap of knowledge investigating the application of different ML algorithms for intrusion detection in IoMT network. The investigation analysis includes ML algorithms such as K-nearest neighbor, Naïve Bayes, support vector machine, artificial neural network and decision tree. The benchmark dataset, Bot-IoT which is publicly available with comprehensive set of attacks was used to train and test the effectiveness of all ML models considered for investigation. Also, we used comprehensive set of evaluation metrics to compare the power of ML algorithms with regard to their detection accuracy for intrusion in IoMT networks. The outcome of the analysis provides a promising path to identify the best the machine learning approach can be used for building effective IDS that can safeguard IoMT network against malicious activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated during the current study.

References

  1. Fontanet A, Autran B, Lina B, Kieny M, Karim S, Sridhar D (2021) SARS-CoV-2 variants and ending the COVID-19 pandemic. Lancet 397:952–954

    Article  Google Scholar 

  2. Ravens-Sieberer U, Kaman A, Erhart M, Devine J, Schlack R et al (2021) Impact of the COVID-19 pandemic on quality of life and mental health in children and adolescents in Germany. Eur Child Adolesc Psychiatry 30:1–11

    Google Scholar 

  3. Siddiqui MF (2021) IoMT potential impact in COVID-19: combating a pandemic with innovation. Stud Comput Intell 923:349–361

    Article  Google Scholar 

  4. Udgata SK, Suryadevara NK (2021) COVID-19, sensors, and internet of medical things (IoMT). In: SpringerBRiefs applied sciences and technology, vol 1, 1 edn. Springer, pp. 39–53

  5. Joyia G, Liaqat R, Farooq A, Rehman S (2017) Internet of medical things (IoMT): applications, benefits and future challenges in healthcare domain. J Commun 4:240–247

    Google Scholar 

  6. Lu Y, Qi Y, Fu X (2019) A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring. Futur Gener Comput Syst 101:1130–1141

    Article  Google Scholar 

  7. Vaiyapuri T, Binbusayyis A, Varadarajan V (2021) Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int J Adv Comput Sci Appl 12:731–737

    Google Scholar 

  8. Hameed S, Hassan W (2021) A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput Sci 7:e414

    Article  Google Scholar 

  9. Alqaralleh BAY, Vaiyapuri T, Parvathy VS, Gupta D, Khanna A et al (2021) Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Pers Ubiquit Comput. https://doi.org/10.1007/s00779-021-01543-2

    Article  Google Scholar 

  10. Khan S, Akhunzada A (2021) A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT). Comput Commun 170:209–216

    Article  Google Scholar 

  11. Binbusayyis A, Vaiyapuri T (2021) Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7:106495–106513

    Article  Google Scholar 

  12. Binbusayyis A, Vaiyapuri T (2020) Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 6:e04262

    Article  Google Scholar 

  13. Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Appl Intell 51:7094–7108

    Article  Google Scholar 

  14. Vaiyapuri T, Sbai Z, Alaskar H, Alaseem NA (2021) Deep learning approaches for intrusion detection in IIoT networks—opportunities and future directions. Int J Adv Comput Sci Appl 12(4):86–92

    Google Scholar 

  15. Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433–442

    Article  Google Scholar 

  16. Sun L, Jiang X, Ren H, Guo Y (2020) Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application. IEEE Access 8:101079–101092

    Article  Google Scholar 

  17. Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124

    Article  Google Scholar 

  18. Lewis DD (1998) Naive(Bayes)at forty: the independence assumption in information retrieval. Lect Notes Comput Sci 1398:4–15

    Article  Google Scholar 

  19. Ziegel ER (2001) Bayes and empirical Bayes methods for data analysis. Technometrics 43:246–255

    Article  Google Scholar 

  20. Kass RE, Raftery AE (1995) Bayes factors. J Am Stat Assoc 90:773–795

    Article  MathSciNet  Google Scholar 

  21. Anava O, Levy KY (2016) k∗-Nearest neighbors: from global to local. In: Proc. NeurIPS, Barcelona, Spain, pp 4923–4931

  22. García-Pedrajas N, Castillo JD, Cerruela-García G (2015) A proposal for local k values for k-nearest neighbor rule. IEEE Trans Neural Netw Learn Syst 28:470–475

    Article  Google Scholar 

  23. Swain P, Hauska H (1977) The decision tree classifier: design and potential. IEEE Trans Geosci Electron 15:142–147

    Article  Google Scholar 

  24. Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H (2020) Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future internet 12:44–57

    Article  Google Scholar 

  25. Hopfield J, Tank D (1986) Computing with neural circuits: a model. Science 233:625–633

    Article  Google Scholar 

  26. Yu L, Wang S, Lai K (2007) Basic learning principles of artificial neural networks. In: Foreign-exchange-rate forecasting with artificial neural networks, vol 107. Springer, pp 27–37 (2007)

  27. Mehrotra K, Mohan C, Ranka S (1997) Elements of artificial neural networks. MIT Press

    MATH  Google Scholar 

  28. Vaiyapuri T, Binbusayyis A (2021) Application of deep autoencoder as an one-class classifier for unsupervised network intrusion detection: a comparative evaluation. PeerJ Comput Sci 6:e327

    Article  Google Scholar 

  29. Vaiyapuri T, Binbusayyis A (2021) Enhanced deep autoencoder based feature representation learning for intelligent intrusion detection system. Comput Mater Contin 68(3):3271–3288

    Google Scholar 

  30. Koroniotis N, Moustafa N, Sitnikova E (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur Gener Comput Syst 100:779–796

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thavavel Vaiyapuri.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Binbusayyis, A., Alaskar, H., Vaiyapuri, T. et al. An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. J Supercomput 78, 17403–17422 (2022). https://doi.org/10.1007/s11227-022-04568-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04568-3

Keywords