A Comparative Analysis of Medical IoT Device Attacks Using Machine Learning Models

Authors

DOI:

https://doi.org/10.56532/mjsat.v4i4.318

Keywords:

CICIoMT2024 Dataset, Cybersecurity, Machine Learning, Intrusion Detection, IoMT

Abstract

The Internet of Medical Things (IoMT) is revolutionizing healthcare by providing remarkable possibilities for remote patient monitoring, instantaneous data analysis, and customized healthcare delivery. However, the widespread use of interconnected medical devices has exposed vulnerabilities to cyber threats, posing significant challenges to the security, privacy, and accessibility of healthcare data and services. The CICIoMT2024 dataset is a crucial resource in IoMT security, offering a wide range of cyber-attacks targeting IoMT devices. This paper uses data balancing techniques like SMOTE and advanced machine learning (ML) models to analyze cyber threats on IoMT devices, aiming to improve healthcare system safety by identifying and mitigating cyberattacks. By conducting extensive experiments, the paper has determined the most effective ML models for three different levels of classification of the dataset: binary, multiclass, and multitype. Employing ML techniques like AdaBoost, Random Forest, kNN, and XGBoost proves to be extremely powerful in accurately categorizing various types of attacks. This study emphasizes the importance of proactive cybersecurity measures in IoMT ecosystems, as well as the effectiveness of ML techniques in protecting healthcare systems from evolving cyber threats.

References

“What is the Internet of Things (IoT)? | IBM.” [Online]. Available: https://www.ibm.com/topics/internet-of-things.

“Global annual number of IoT cyber attacks 2018-2022,” Statista, May 03, 2023. [Online]. Available: https://www.statista.com/statistics/137756 9/worldwide-annual-internet-of-things-attacks/. [Accessed: Apr. 30, 2024]

A. I. Jony and S. A. Hamim, “Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age,” Journal of Information Technology and Cyber Security, vol. 1, no.2, pp. 53–67, 2023, doi: https://doi.org/10.30996/jitcs.9715.

K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures,” IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021, doi: 10.3390/iot2010009. [Online].

B. Pradhan, S. Bhattacharyya, and K. Pal, “IoT-Based Applications in Healthcare Devices,” Journal of Healthcare Engineering, vol. 2021, pp. 1–18, Mar. 2021, doi: 10.1155/2021/6632599. [Online].

“IoMT Dataset 2024,” Canadian Institute for Cybersecurity|UNB, Feb. 2024. [Online]. Available: https://www.unb.ca/cic/datasets/iomt-dataset-2024.html. [Accessed: Mar. 05, 2024]

S. Dadkhah, E. Carlos Pinto Neto, R. Ferreira, R. Chukwuka Molokwu, S. Sadeghi, and A. Ghorbani, “CICIoMT2024: Attack Vectors in Healthcare devices-A Multi-Protocol Dataset for Assessing IoMT Device Security,” Feb. 2024, doi: 10.20944/preprints202402.0898.v1. [Online].

F. Hussain and S. G. Abbas and G. A. Shah and I. M. Pires and U. U. Fayyaz and F. Shahzad and N. M. Garcia and E. Zdravevski, “A Framework for Malicious Traffic Detection in IoT Healthcare Environment,” Sensors, vol. 21, no. 9, p. 3025, Apr. 2021.[Online].Available: http://dx.doi.org/10.3390/s21093025

W. Ma, L. Ma, K. Li, and J. Guo, “Few-shot IoT attack detection based on SSDSAE and adaptive loss weighted meta residual network,” Information Fusion, vol. 98, p. 101853, Oct. 2023, doi: 10.1016/j.inffus.2023.101853. [Online].

N. Moustafa, “A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets,” Sustainable Cities and Society, vol. 72, p. 102994, Sep. 2021, doi: 10.1016/j.scs.2021.102994. [Online].

H. K. Kim, “IoT network intrusion dataset,” IEEE DataPort,Sep.27,2019.[Online].Available: https://ieee-dataport.org/open-access/iot-network-intrusion-dataset

B. S. and R. Nagapadma, “RT-IoT2022,” UC Irvine Machine Learning Repository, 2023. [Online]. Available: https://doi.org/10.24432/C5P338

N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset,” arXiv.org, Nov. 02, 2018. [Online].

J. Mathews, P. Chatterjee, and S. Banik, “CoAP-DoS: An IoT Network Intrusion Data Set,” 2022 6th International Conference on Cryptography, Security and Privacy (CSP), Jan. 2022, doi: 10.1109/csp55486.2022.00025. [Online].

A. Hady, A. Ghubaish, T. Salman, D. Unal, and R. Jain, “Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study,” IEEE Access, vol. 8, pp. 106576–106584,2020,doi: 10.1109/access.2020.3000421. [Online]. Available: http://dx.doi.org/10.1109/access.2020.3000421

M. Ahmed, S. Byreddy, A. Nutakki, L. F. Sikos, and P. Haskell-Dowland, “ECU-IoHT: A dataset for analyzing cyberattacks in Internet of health things,” Research Online. [Online].

D. Unal, “BlueTack,” IEEE DataPort, Jan. 09, 2021. [Online].Available:https://ieee-dataport.org/documents/bluetack

P. Radoglou-Grammatikis et al., “Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach,” IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 2041–2052, Mar. 2022, doi: 10.1109/tii.2021.3093905. [Online].

A. I. Jony and A. K. B. Arnob, “A long short-term memory-based approach for detecting cyber-attacks in IoT using CIC-IoT2023 dataset,” Journal of edge computing, vol. 3, no. 1, pp. 28-42, 2024.

M. A. Anwer, S. M. Khan, M. Farooq, and Waseemullah, “Attack Detection in IoT using Machine Learning,” Engineering, Technology and Applied science research/Engineering, Technology and Applied Science Research, Jun. 12, 2021. [Online].

Churcher et al., “An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks,” Sensors, Jan. 10, 2021. [Online]. Available:https://www.mdpi.com/1424-8220/21/2/446

I. Vaccari, G. Chiola, M. Aiello, M. Mongelli, and E. Cambiaso, “MQTTset, a New Dataset for Machine Learning Techniques on MQTT,” Sensors, vol. 20, no. 22, p. 6578, Nov. 2020, doi: 10.3390/s20226578.[Online].

V. Tomer and S. Sharma, “Detecting IoT Attacks Using an Ensemble Machine Learning Model,” Future Internet, vol. 14, no. 4, p. 102, Mar. 2022, doi: 10.3390/fi14040102.

D. Unal, S. Bennbaia, and F. O. Catak, “Machine learning for the security of healthcare systems based on Internet of Things and edge computing,” Cybersecurity and Cognitive Science, pp. 299–320, 2022, doi: 10.1016/b978-0-323-90570-1.00007-3. [Online].

S. S. Shanto, Z. Ahmed, and A. I. Jony, "Binary vs. Multiclass Sentiment Classification for Bangla E-commerce Product Reviews: A Comparative Analysis of Machine Learning Models", International Journal of Information Engineering and Electronic Business (IJIEEB), vo. 15, no. 6, pp. 48-63, 2023.

S. S. Shanto, Z. Ahmed, and A. I. Jony, "Mining User Opinions: A Balanced Bangla Sentiment Analysis Dataset for E-Commerce", Malaysian Journal of Science and Advanced Technology, vo. 3, no. 4, pp. 272-279, 2023.

Downloads

Published

2024-09-29

How to Cite

[1]
M. Mohsin and A. I. Jony, “A Comparative Analysis of Medical IoT Device Attacks Using Machine Learning Models”, Malaysian J. Sci. Adv. Tech., vol. 4, no. 4, pp. 429–439, Sep. 2024.

Issue

Section

Articles