A multiagent based framework secured with layered SVM-based IDS for
remote healthcare systems
- URL: http://arxiv.org/abs/2104.06498v1
- Date: Tue, 13 Apr 2021 20:34:38 GMT
- Title: A multiagent based framework secured with layered SVM-based IDS for
remote healthcare systems
- Authors: Mohammadreza Begli, Farnaz Derakhshan
- Abstract summary: We propose a secure framework for remote healthcare systems that consists of two phases.
First, we design a healthcare system base on multiagent technology to collect data from a sensor network.
In the second phase, a layered architecture of intrusion detection systems that uses Support Vector Machine to learn the behavior of network traffic is applied.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Since the number of elderly and patients who are in hospitals and healthcare
centers are growing, providing efficient remote healthcare services seems very
important. Currently, most such systems benefit from the distribution and
autonomy features of multiagent systems and the structure of wireless sensor
networks. On the one hand, securing the data of remote healthcare systems is
one of the most significant concerns; particularly recent types of research
about the security of remote healthcare systems keep them secure from
eavesdropping and data modification. On the other hand, existing remote
healthcare systems are still vulnerable against other common attacks of
healthcare networks such as Denial of Service (DoS) and User to Root (U2R)
attacks, because they are managed remotely and based on the Internet.
Therefore, in this paper, we propose a secure framework for remote healthcare
systems that consists of two phases. First, we design a healthcare system base
on multiagent technology to collect data from a sensor network. Then, in the
second phase, a layered architecture of intrusion detection systems that uses
Support Vector Machine to learn the behavior of network traffic is applied.
Based on our framework, we implement a secure remote healthcare system and
evaluate this system against the frequent attacks of healthcare networks such
as Smurf, Buffer overflow, Neptune, and Pod attacks. In the end, evaluation
parameters of the layered architecture of intrusion detection systems prove the
efficiency and correctness of our proposed framework.
Related papers
- ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Misuse Cases in the Era of Generative AI and Cloud-based Health Information Ecosystem [0.5530212768657544]
This article proposes a zero-trust-based context-aware framework for managing access to the cloud ecosystem.
The framework has two main scoring schemas to maintain the chain of trust.
The analysis is based on a pre-trained machine learning model to generate the semantic and syntactic scores.
arXiv Detail & Related papers (2023-11-28T22:12:07Z) - Blockchain-empowered Federated Learning for Healthcare Metaverses:
User-centric Incentive Mechanism with Optimal Data Freshness [66.3982155172418]
We first design a user-centric privacy-preserving framework based on decentralized Federated Learning (FL) for healthcare metaverses.
We then utilize Age of Information (AoI) as an effective data-freshness metric and propose an AoI-based contract theory model under Prospect Theory (PT) to motivate sensing data sharing.
arXiv Detail & Related papers (2023-07-29T12:54:03Z) - Analysis of Master Vein Attacks on Finger Vein Recognition Systems [42.63580709376905]
Finger vein recognition (FVR) systems have been commercially used, especially in ATMs, for customer verification.
It is essential to measure their robustness against various attack methods, especially when a hand-crafted FVR system is used without any countermeasure methods.
We are the first in the literature to introduce master vein attacks in which we craft a vein-looking image so that it can falsely match with as many identities as possible.
arXiv Detail & Related papers (2022-10-18T06:36:59Z) - Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion
based Perception in Autonomous Driving Under Physical-World Attacks [62.923992740383966]
We present the first study of security issues of MSF-based perception in AD systems.
We generate a physically-realizable, adversarial 3D-printed object that misleads an AD system to fail in detecting it and thus crash into it.
Our results show that the attack achieves over 90% success rate across different object types and MSF.
arXiv Detail & Related papers (2021-06-17T05:11:07Z) - A Novel Framework for Threat Analysis of Machine Learning-based Smart
Healthcare Systems [2.519906683279153]
We propose SHChecker, a novel threat analysis framework that integrates machine learning and formal analysis capabilities.
We implement SHChecker on a synthetic and a real dataset, which affirms that our framework can reveal potential attack vectors in an IoMT system.
arXiv Detail & Related papers (2021-03-05T04:51:02Z) - I-Health: Leveraging Edge Computing and Blockchain for Epidemic
Management [36.55809341110476]
Epidemic situations demand intensive data collection and management from different locations/entities within a strict time constraint.
This paper proposes an Intelligent-Health (I-Health) system that aims to aggregate diverse e-health entities in a unique national healthcare system.
In particular, we design an automated patients monitoring scheme, at the edge, which enables the prompt discovery, remote monitoring, and fast emergency response.
arXiv Detail & Related papers (2020-12-18T23:41:00Z) - Cascaded WLAN-FWA Networking and Computing Architecture for Pervasive
In-Home Healthcare [14.05576563358248]
This paper proposes a new architecture to support indoor healthcare monitoring, with a focus on epileptic patients.
IEEE 802.11ax is used for the wireless local area network to collect physiological and environmental data in-home and 5G-enabled Fixed Wireless Access links.
The inclusion of local computing capabilities at the router, together with a mobile edge computing resource, represents a further architectural enhancement.
arXiv Detail & Related papers (2020-10-08T07:16:00Z) - Technological Platform for the Prevention and Management of Healthcare
Associated Infections and Outbreaks [0.0]
Hospital acquired infections are among the most common adverse events in healthcare around the world.
Preventive guidelines and regulations have been devised, however compliance is frequently poor and there is much room for improvement.
This paper presents the prototype of anIntegrating a wireless sensor network for the surveillance of clinical processes with monitoring software built around a workflow engine as key component.
arXiv Detail & Related papers (2020-09-05T09:35:49Z) - A Context Aware Framework for IoT Based Healthcare Monitoring Systems [0.0]
This paper attempts to introduce and propose a generic framework for the design and development of context aware healthcare monitoring systems in the IoT platform.
The fundamental components of the healthcare monitoring systems are identified and modelled.
The paper also stresses on the crucial role played by the AI field in addressing resilient context aware healthcare monitoring systems.
arXiv Detail & Related papers (2020-08-21T14:04:45Z) - Towards robust sensing for Autonomous Vehicles: An adversarial
perspective [82.83630604517249]
It is of primary importance that the resulting decisions are robust to perturbations.
Adversarial perturbations are purposefully crafted alterations of the environment or of the sensory measurements.
A careful evaluation of the vulnerabilities of their sensing system(s) is necessary in order to build and deploy safer systems.
arXiv Detail & Related papers (2020-07-14T05:25:15Z) - Firearm Detection and Segmentation Using an Ensemble of Semantic Neural
Networks [62.997667081978825]
We present a weapon detection system based on an ensemble of semantic Convolutional Neural Networks.
A set of simpler neural networks dedicated to specific tasks requires less computational resources and can be trained in parallel.
The overall output of the system given by the aggregation of the outputs of individual networks can be tuned by a user to trade-off false positives and false negatives.
arXiv Detail & Related papers (2020-02-11T13:58:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.