Anomaly-based Intrusion Detection System in Industrial IoT-Healthcare Environment Network

Md Maruf Rahman *

Department of Marketing and Business Analytics, Texas A&M University Commerce, Texas, USA.

Mahrima Akter Mim

College of Business (Computer Information System), Queensborough Community College, Queens, New York., USA.

Debashon Chakraborty

Department of Management Information Systems, Lamar University, Texas, USA

Zihad Hasan Joy

Department of Business, Engineering and Technology, College of Marketing Department, Texas A&M University-Texarkana, Texas, USA.

Nourin Nishat

Department of Management Information Systems, Lamar University, Texas, USA.

*Author to whom correspondence should be addressed.


Abstract

The Internet of Things (IoT) technology facilitates automation, monitoring, and control of tangible objects and surroundings by enabling connected devices to interact and exchange data over the Internet. Developments in edge computing, blockchain, and artificial intelligence (AI) are incorporated into IoT technologies for more reliable operations. Inadequate authorization, authentication, and encryption protocols could render IoT networks insecure and open the door to illegal access and data breaches which can have terrible consequences, most notably in the healthcare industry. In this regard, to identify malicious and incursion traffic, machine learning (ML) is crucial to Internet of Things (IoT) cybersecurity. The paper proposes a framework to detect intrusion or malicious traffic in IoT-enabled different medical equipment such as medical sensors, and controllers for real-time data collection, creating communication channels and data monitoring and analysis over locally available network nodes. IoT-Flock has been utilized for both normal and malicious traffic generation in a wide dataset found by the sensors connected to IoT integrated healthcare network. The feature selection-based proposed framework has been evaluated by three distinct machine learning classifiers, KNN, RF, and DT where corresponding accuracy, sensitivity, precision, and F1-score have been measured for performance analysis. With an accuracy of 99.74%, the KNN technique performed better than the other tactics used by RF and DT regarding intrusion detection in IoT networks. The suggested framework will be helpful in developing or analyzing security solutions in IoT-integrated network systems.

Keywords: IoT, cybersecurity, IoT-Flock, intrusion detection, healthcare, IIoT, IDS, malicious traffic, feature selection


How to Cite

Rahman, M. M., Mim , M. A., Chakraborty , D., Joy, Z. H., & Nishat , N. (2024). Anomaly-based Intrusion Detection System in Industrial IoT-Healthcare Environment Network. Journal of Engineering Research and Reports, 26(6), 113–123. https://doi.org/10.9734/jerr/2024/v26i61166

Downloads

Download data is not yet available.

References

Madakam, Somayya, Ramya Ramaswamy, and Siddharth Tripathi. Internet of things (IoT): A literature review. Journal of Computer and Communications. 20153.5:164-173.

Sharma, Neha, Madhavi Shamkuwar, Inderjit Singh. The history, present and future with IoT. Internet of things and big data analytics for smart generation. 2019:27-51.

Willig, Andreas, Kirsten Matheus, Adam Wolisz. Wireless technology in industrial networks. Proceedings of the IEEE. 200593.6:1130-1151.

IoT Connected Devices by Vertical. Statista; 2030 www.statista.com/statistics/1194682/iot-connected-devices-vertically/. Accessed 16 Mar. 2024.

Yuehong YIN, et al. The internet of things in healthcare: An overview. Journal of Industrial Information Integration. 2016;1:3-13.

Ghosh, Uttam, et al., eds. Intelligent internet of things for healthcare and industry. Springer International Publishing; 2022.

Yang, Yuchen, et al. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal. 2017;4.5:1250-1258.

Zhanna Malekos Smith, Eugenia Lostri, and James A Lewis. The Hidden Costs of Cybercrime. McAfee, p. 38.

Hassan, Wan Haslina. Current research on Internet of Things (IoT) security: A survey. Computer networks. 2019;148:283-294.

Almolhis, Nawaf, et al. The security issues in IoT-cloud: A review. 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA). IEEE; 2020.

Dasgupta, Dipankar, Zahid Akhtar, and Sajib Sen. Machine learning in cybersecurity: A comprehensive survey. The Journal of Defense Modeling and Simulation. 2022;19.1:57-106.

Hussain, Faisal, et al. A framework for malicious traffic detection in IoT healthcare environment. Sensors. 2021; 21.9:3025.

Moustafa N, Slay J, UNSW-NB15: A comprehensive data set for network intrusion detection systems (unsw-nb15 network data set), in Proc. IEEE Military Communications and Information Systems Conf. (MilCIS). 2015;1-6.

Samin, Omar Bin, et al. Malicious agricultural IoT traffic detection and classification: A comparative study of ML classifiers. Journal of Advances in Information Technology. 2023;14.4.

Wang, Sying-Jyan, et al. Feature selection for malicious traffic detection with machine learning. 2020 International Computer Symposium (ICS). IEEE; 2020.

Hema V, Sri Vigna S. Devadharshini, Gowsalya P. Malicious traffic flow detection in IOT using Ml based algorithms. International Research Journal on Advanced Science. 2023;3.5:68-76.

Ali, Sajid, et al. Effective multitask deep learning for iot malware detection and identification using behavioral traffic analysis. IEEE Transactions on Network and Service Management; 2022.

Diallo, Alec F, Paul Patras. Adaptive clustering-based malicious traffic classification at the network edge. IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE; 2021.

Rughoobur, Paavan, Leckraj Nagowah. A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. 2017 international conference on Infocom technologies and unmanned systems (trends and future directions)(ICTUS). IEEE; 2017.

Diwan, Tarun Dhar, et al. Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning. Mobile Information Systems. 2021(2021):1-13.

Farnaaz, Nabila, Jabbar MA. Random forest modeling for network intrusion detection system. Procedia Computer Science. 2016;89:213-217.

Ikram, Sumaiya Thaseen, et al. Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier. The Journal of Supercomputing. 2022;78.8: 10725-10756.

Chen, Yini, et al. DDoS attack detection based on random forest. 2020 IEEE International Conference on Progress in Informatics and Computing (PIC). IEEE; 2020.