Survey of Machine Learning Based Intrusion Detection Methods for
Internet of Medical Things
- URL: http://arxiv.org/abs/2202.09657v1
- Date: Sat, 19 Feb 2022 18:40:55 GMT
- Title: Survey of Machine Learning Based Intrusion Detection Methods for
Internet of Medical Things
- Authors: Ayoub Si-Ahmed, Mohammed Ali Al-Garadi and Narhimene Boustia
- Abstract summary: Internet of Medical Things (IoMT) represents an application of the Internet of Things.
The sensitive and private nature of this data may represent a prime interest for attackers.
The use of traditional security methods on equipment that is limited in terms of storage and computing capacity is ineffective.
- Score: 2.223733768286313
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Internet of Medical Things (IoMT) represents an application of the Internet
of Things, where health professionals perform remote analysis of physiological
data collected using sensors that are associated with patients, allowing
real-time and permanent monitoring of the patient's health condition and the
detection of possible diseases at an early stage. However, the use of wireless
communication for data transfer exposes this data to cyberattacks, and the
sensitive and private nature of this data may represent a prime interest for
attackers. The use of traditional security methods on equipment that is limited
in terms of storage and computing capacity is ineffective. In this context, we
have performed a comprehensive survey to investigate the use of the intrusion
detection system based on machine learning (ML) for IoMT security. We presented
the generic three-layer architecture of IoMT, the security requirement of IoMT
security. We review the various threats that can affect IoMT security and
identify the advantage, disadvantages, methods, and datasets used in each
solution based on ML. Then we provide some challenges and limitations of
applying ML on each layer of IoMT, which can serve as direction for future
study.
Related papers
- Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems [1.8434042562191815]
The Internet of Medical Things (IoMT) transcends traditional medical boundaries, enabling a transition from reactive treatment to proactive prevention.
Its benefits are countered by significant security challenges that endanger the lives of its users due to the sensitivity and value of the processed data.
A new framework for Intrusion Detection Systems (IDS) is introduced, leveraging Artificial Neural Networks (ANN) for intrusion detection while utilizing Federated Learning (FL) for privacy preservation.
arXiv Detail & Related papers (2024-03-14T11:57:26Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation [4.499833362998488]
This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices.
The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application.
arXiv Detail & Related papers (2024-01-17T10:55:26Z) - Crossed-IoT device portability of Electromagnetic Side Channel Analysis:
Challenges and Dataset [1.7811840395202345]
This study examines the impact of device variability on the accuracy and reliability of EM-SCA approaches.
We present an approach to collect the EM-SCA datasets and demonstrate the feasibility of using transfer learning to obtain more meaningful and reliable results.
arXiv Detail & Related papers (2023-10-04T19:13:39Z) - IoMT-Blockchain based Secured Remote Patient Monitoring Framework for
Neuro-Stimulation Device [0.0]
Real-time sensory data from patients may be delivered and analyzed through rapid development of wearable IoMT devices.
Data from the Internet of Things is gathered, analyzed, and stored in a single location.
Due to its decentralized nature, blockchain (BC) can alleviate these issues.
arXiv Detail & Related papers (2023-08-31T16:59:58Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - A Novel Framework for Threat Analysis of Machine Learning-based Smart
Healthcare Systems [2.519906683279153]
We propose SHChecker, a novel threat analysis framework that integrates machine learning and formal analysis capabilities.
We implement SHChecker on a synthetic and a real dataset, which affirms that our framework can reveal potential attack vectors in an IoMT system.
arXiv Detail & Related papers (2021-03-05T04:51:02Z) - Privacy-preserving medical image analysis [53.4844489668116]
We present PriMIA, a software framework designed for privacy-preserving machine learning (PPML) in medical imaging.
We show significantly better classification performance of a securely aggregated federated learning model compared to human experts on unseen datasets.
We empirically evaluate the framework's security against a gradient-based model inversion attack.
arXiv Detail & Related papers (2020-12-10T13:56:00Z) - Machine Learning in Nano-Scale Biomedical Engineering [77.75587007080894]
We review the existing research regarding the use of machine learning in nano-scale biomedical engineering.
The main challenges that can be formulated as ML problems are classified into the three main categories.
For each of the presented methodologies, special emphasis is given to its principles, applications, and limitations.
arXiv Detail & Related papers (2020-08-05T15:45:54Z) - Lightweight Collaborative Anomaly Detection for the IoT using Blockchain [40.52854197326305]
Internet of things (IoT) devices tend to have many vulnerabilities which can be exploited by an attacker.
Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner.
We present a distributed IoT simulation platform, which consists of 48 Raspberry Pis.
arXiv Detail & Related papers (2020-06-18T14:50:08Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.