Abstract
Internet of Medical Things (IoMT) is network of interconnected medical devices (smart watches, pace makers, prosthetics, glucometer, etc.), software applications, and health systems and services. IoMT has successfully addressed many old healthcare problems. But it comes with its drawbacks essentially with patient’s information privacy and security related issues that comes from IoMT architecture. Using obsolete systems can bring security vulnerabilities and draw attacker’s attention emphasizing the need for effective solution to secure and protect the data traffic in IoMT network. Recently, intrusion detection system (IDS) is regarded as an essential security solution for protecting IoMT network. In the past decades, machines learning (ML) algorithms have demonstrated breakthrough results in the field of intrusion detection. Notwithstanding, to our knowledge, there is no work that investigates the power of machines learning algorithms for intrusion detection in IoMT network. This paper aims to fill this gap of knowledge investigating the application of different ML algorithms for intrusion detection in IoMT network. The investigation analysis includes ML algorithms such as K-nearest neighbor, Naïve Bayes, support vector machine, artificial neural network and decision tree. The benchmark dataset, Bot-IoT which is publicly available with comprehensive set of attacks was used to train and test the effectiveness of all ML models considered for investigation. Also, we used comprehensive set of evaluation metrics to compare the power of ML algorithms with regard to their detection accuracy for intrusion in IoMT networks. The outcome of the analysis provides a promising path to identify the best the machine learning approach can be used for building effective IDS that can safeguard IoMT network against malicious activities.












Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated during the current study.
References
Fontanet A, Autran B, Lina B, Kieny M, Karim S, Sridhar D (2021) SARS-CoV-2 variants and ending the COVID-19 pandemic. Lancet 397:952–954
Ravens-Sieberer U, Kaman A, Erhart M, Devine J, Schlack R et al (2021) Impact of the COVID-19 pandemic on quality of life and mental health in children and adolescents in Germany. Eur Child Adolesc Psychiatry 30:1–11
Siddiqui MF (2021) IoMT potential impact in COVID-19: combating a pandemic with innovation. Stud Comput Intell 923:349–361
Udgata SK, Suryadevara NK (2021) COVID-19, sensors, and internet of medical things (IoMT). In: SpringerBRiefs applied sciences and technology, vol 1, 1 edn. Springer, pp. 39–53
Joyia G, Liaqat R, Farooq A, Rehman S (2017) Internet of medical things (IoMT): applications, benefits and future challenges in healthcare domain. J Commun 4:240–247
Lu Y, Qi Y, Fu X (2019) A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoring. Futur Gener Comput Syst 101:1130–1141
Vaiyapuri T, Binbusayyis A, Varadarajan V (2021) Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int J Adv Comput Sci Appl 12:731–737
Hameed S, Hassan W (2021) A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput Sci 7:e414
Alqaralleh BAY, Vaiyapuri T, Parvathy VS, Gupta D, Khanna A et al (2021) Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Pers Ubiquit Comput. https://doi.org/10.1007/s00779-021-01543-2
Khan S, Akhunzada A (2021) A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT). Comput Commun 170:209–216
Binbusayyis A, Vaiyapuri T (2021) Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7:106495–106513
Binbusayyis A, Vaiyapuri T (2020) Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 6:e04262
Binbusayyis A, Vaiyapuri T (2021) Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM. Appl Intell 51:7094–7108
Vaiyapuri T, Sbai Z, Alaskar H, Alaseem NA (2021) Deep learning approaches for intrusion detection in IIoT networks—opportunities and future directions. Int J Adv Comput Sci Appl 12(4):86–92
Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433–442
Sun L, Jiang X, Ren H, Guo Y (2020) Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application. IEEE Access 8:101079–101092
Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput Commun 166:110–124
Lewis DD (1998) Naive(Bayes)at forty: the independence assumption in information retrieval. Lect Notes Comput Sci 1398:4–15
Ziegel ER (2001) Bayes and empirical Bayes methods for data analysis. Technometrics 43:246–255
Kass RE, Raftery AE (1995) Bayes factors. J Am Stat Assoc 90:773–795
Anava O, Levy KY (2016) k∗-Nearest neighbors: from global to local. In: Proc. NeurIPS, Barcelona, Spain, pp 4923–4931
García-Pedrajas N, Castillo JD, Cerruela-García G (2015) A proposal for local k values for k-nearest neighbor rule. IEEE Trans Neural Netw Learn Syst 28:470–475
Swain P, Hauska H (1977) The decision tree classifier: design and potential. IEEE Trans Geosci Electron 15:142–147
Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H (2020) Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future internet 12:44–57
Hopfield J, Tank D (1986) Computing with neural circuits: a model. Science 233:625–633
Yu L, Wang S, Lai K (2007) Basic learning principles of artificial neural networks. In: Foreign-exchange-rate forecasting with artificial neural networks, vol 107. Springer, pp 27–37 (2007)
Mehrotra K, Mohan C, Ranka S (1997) Elements of artificial neural networks. MIT Press
Vaiyapuri T, Binbusayyis A (2021) Application of deep autoencoder as an one-class classifier for unsupervised network intrusion detection: a comparative evaluation. PeerJ Comput Sci 6:e327
Vaiyapuri T, Binbusayyis A (2021) Enhanced deep autoencoder based feature representation learning for intelligent intrusion detection system. Comput Mater Contin 68(3):3271–3288
Koroniotis N, Moustafa N, Sitnikova E (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur Gener Comput Syst 100:779–796
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Binbusayyis, A., Alaskar, H., Vaiyapuri, T. et al. An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. J Supercomput 78, 17403–17422 (2022). https://doi.org/10.1007/s11227-022-04568-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04568-3