Abstract
The need for security in healthcare environments has become increasingly important due to the rise of cyber-attacks and data breaches. In order to address this issue, this paper proposes an Internet of Things (IoT)-based intrusion detection system for healthcare using a deep learning strategy with custom features. This paper proposes an IoT-based intrusion detection system for healthcare using a deep learning strategy with custom features. The proposed system utilizes the IoT technology to gather real-time data from various medical devices and sensors deployed in a healthcare environment. The system incorporates a recurrent neural network (RNN) and a bidirectional long short-term memory (BiLSTM) algorithm to detect and classify intrusion attempts. The custom features are extracted from the incoming data streams and used to train the deep learning models. The proposed system is evaluated on a dataset comprising different types of intrusion scenarios, and it achieves an accuracy of 99.16%, error rate of 0.008371%, sensitivity ratio of 99.89% and specificity ratio of 98.203% for IoTID20 with custom features using RNNBiLSTM. The results demonstrate the effectiveness of the proposed system in detecting and mitigating security threats in a healthcare environment. The system has the potential to improve patient privacy and security, ultimately leading to better healthcare outcomes.
Similar content being viewed by others
Data availability
The input dataset used is the publicly available benchmark dataset IoTID20 dataset. Data is available.
References
Abu Al-Haija Q, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11:556. https://doi.org/10.3390/electronics11040556
Alkahtani H, Aldhyani THH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021(5579851):1–18. https://doi.org/10.1155/2021/5579851
Ashiku L, Dagli C (2021) Network intrusion detection system using deep learning. Procedia Comput Sci 185(2021):239–247. https://doi.org/10.1016/j.procs.2021.05.025
Chiba Z, Abghour N, Moussaid K, Elomri A, Rida M (2019) Intelligent approach to build a deep neural network based IDS for cloud environment using combination of machine learning algorithms. Comput Secur 86(1):291–317. https://doi.org/10.1016/j.cose.2019.06.013
Elsayed MA, Wrana M, Mansour Z, Lounis K, Ding SHH, Zulkernine M (2022) AdaptIDS: adaptive intrusion detection for mission-critical aerospace vehicles. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2022.3214095
Hyunjae K, Kang Dong H, Ahn Gyung M, Lee Jeong D, Yoo Kyung H, Park Huy K (2019) IoT network intrusion dataset, 27 Sept 2019. https://doi.org/10.21227/q70p-q449. Accessed 01 Jan 2020
Islam N, Farhin F, Sultana I, Kaiser MS, Rahman M, Hosen ASM, Cho G, Hwan G (2021) Towards machine learning based intrusion detection in IoT networks. CMC Tech Sci 69:1801–1821. https://doi.org/10.32604/cmc.2021.018466
Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J 16:507–521. https://doi.org/10.1007/s00778-006-0002-5
Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2016) AWID a datasets focused on intrusion detection in 802.11 http://icsdweb.aegean.gr/awid/index.html. Accessed 10 Jan 2020
Liu J, Zhang W, Tang Z, Xie Y, Ma T, Zhang J, Zhang G, Niyoyita JP (2019) Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection. Expert Syst Appl 139:112845
Maithem M, Al-sultany GA (2021) Network intrusion detection system using deep neural networks. J Phys Conf Ser 1804:012138. https://doi.org/10.1088/1742-6596/1804/1/012138
Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military communications and information systems conference (MilCIS), pp 1–6. https://doi.org/10.1109/MilCIS.2015.7348942
Pajouh HH, Javidan R, Khayami RK, Dehghantanha A, Choo K-KR (2019) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314–323
Qaddoura R, Al-Zoubi A, Almomani I, Faris H (2021) A multi-stage classification approach for IoT intrusion detection based on clustering with oversampling. Appl Sci 11(3022):1–19. https://doi.org/10.3390/app11073022
Riyaz B, Sannasi G (2020) A deep learning approach for effective intrusion detection in wireless networks using CNN. Soft Comput. https://doi.org/10.1007/s00500-020-05017-0
Saba T, Rehman A, Sadad T, Kolivand H, Bahaj SA (2022) Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput Electr Eng 99:107810. https://doi.org/10.1016/j.compeleceng.2022.107810. (ISSN 0045-7906)
Sarker IH (2021) Machine learning: algorithms, real-world applications and research directions. SN Comput Sci 2:160. https://doi.org/10.1007/s42979-021-00592-x
Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: Proceedings of international carnahan conference security technology, October 2019
Shukla AK (2020) An efficient hybrid evolutionary approach for identification of zero-day attacks on wired/wireless network system. Wirel Personal Commun. https://doi.org/10.1007/s11277-020-07808-y
Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium computational intelligence security defence applications CISDA 2009, pp 1–6
Thomas JJ, Wei LT, Jinila YB, Subhashini R (2020) Smart computerized essay scoring using deep neural networks for universities and institutions. IGI Glob. https://doi.org/10.4018/978-1-7998-3645-2.ch006
Ullah I, Mahmoud QH (2020a) A two-level flow-based anomalous activity detection system for IoT networks. Electronics. https://doi.org/10.3390/electronics9030530. (Corpus ID: 216324494)
Ullah I, Mahmoud QH (2020b) A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Goutte C, Zhu X (eds) Advances in artificial intelligence. Canadian AI 2020b. Lecture notes in computer
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, AlNemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550. https://doi.org/10.1109/ACCESS.2019.2895334
Wang J, Hu F, Li L (2017) Deep bi-directional long short-term memory model for short-term traffic flow prediction. In: Liu D, Xie S, Li Y, Zhao D, El-Alfy ES (eds) Neural information processing. ICONIP 2017. Lecture notes in computer science, vol 10638. Springer, Cham. https://doi.org/10.1007/978-3-319-70139-4_31
Yahalom R, Steren A, Nameri Y, Roytman M, Porgador A, Elovici Y (2019) Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl Based Syst 168:59–69
Funding
No funds or grants or support got from any organization or institution to perform this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest. There is no financial interest. The submission is original work and is not under review at any other publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jeyanthi, D.V., Indrani, B. IoT-based intrusion detection system for healthcare using RNNBiLSTM deep learning strategy with custom features. Soft Comput 27, 11915–11930 (2023). https://doi.org/10.1007/s00500-023-08536-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-08536-8