INTRUSION DETECTION SYSTEM FOR INTERNET OF MEDICAL THINGS USING GRU WITH ATTENTION MECHANISM-BASED HYBRID DEEP LEARNING TECHNIQUE


(Received: 6-Sep.-2024, Revised: 8-Nov.-2024 , Accepted: 21-Nov.-2024)
The proliferation of Internet of Things devices in healthcare, specifically the Internet of Medical Things, has revolutionized patient care and health-monitoring systems. Integrating these interconnected medical devices introduces unprecedented security challenges, necessitating robust Intrusion Detection Systems (IDSs) to safeguard patient data and healthcare infrastructure. To protect the IoMT devices from numerous malicious attacks, researchers have developed numerous Intrusion Detection Systems, but the development of an effective and real-time IDS remains a challenge. Our proposed IDS addresses this gap and surpasses state-of-the-art IDS techniques for IoMT networks. In this research paper, we have proposed a novel IDS approach for IoMT, leveraging a Hybrid Deep Learning technique to enhance detection accuracy and efficiency. By combining the strengths of Gated Recurrent Unit (GRU) and Attention Mechanism, the proposed IDS achieves superior performance in detecting anomalous activities in medical networks. We evaluated the proposed IDS model on two publicly available benchmark intrusion datasets and achieved 99.99 % accuracy on the ICU Healthcare Dataset and 98.94 % on the NF-TON-IoT Dataset. Precision, Recall, F1-score metrics and ROC-AUC for the proposed model are promising. We also added Noise to the features to show how effectively the model performed in noisy environments. Moreover, we used the K-Fold Cross Validation Technique to cross-va�O�L�Ga�W�H �W�K�H �Po�G�H�O’�V performance on both datasets, ensuring the reliability and applicability of the suggested IDS model for IoMT networks.

[1] F. Laricchia, "Topic: Wearables," Statista, [Online], Available: https://www.statista.com/topics/1556/wearable-tec, Accessed: Jun. 18, 2024.

[2] R. Dwivedi, D. Mehrotra and S. Chandra, "Potential of Internet of Medical Things (IoMT) Applications in Building a Smart Healthcare System: A Systematic Review," Journal of Oral Biology and Craniofacial Research, vol. 12, no. 2, pp. 302-318, 2022.

[3] S. S. Ambarkar and N. Shekokar, "Toward Smart and Secure IoT Based Healthcare System," Proc. of Internet of Things, Smart Computing and Technology: A Roadmap Ahead, Studies in Systems, Decision and Control, vol. 266, pp. 283-303, Springer, 2020.

[4] A. Tabassum, A. Erbad, A. Mohamed and M. Guizani, "Privacy-preserving Distributed IDS Using Incremental Learning for IoT Health Systems," IEEE Access, vol. 9, pp. 14271-14283, 2021.

[5] R. U. Rasool, H. F. Ahmad, W. Rafique, A. Qayyum and J. Qadir, "Security and Privacy of Internet of Medical Things: A Contemporary Review in the Age of Surveillance, Botnets and Adversarial ML," Journal of Network and Computer Applications, vol. 201, p. 103332, 2022.

[6] M. L. Hernandez-Jaimes et al., "Artificial Intelligence for IoMT Security: A Review of Intrusion Detection Systems, Attacks, Datasets and Cloud-Fog-Edge Architectures," Internet of Things, vol. 23, p. 100887, 2023.

[7] M. Wazid, A. K. Das, J. J. Rodrigues, S. Shetty and Y. Park, "IoMT Malware Detection Approaches: Analysis and Research Challenges," IEEE Access, vol. 7, pp. 182459-182476, 2019.

[8] A. Si-Ahmed et al., "Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things," Applied Soft Computing, vol. 140, p. 110227, 2023.

[9] Y. Rbah et al., "Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A Survey," Proc. of the 2022 2nd IEEE Int. Conf. on Innovative Research in Applied Science, Engineering and Technology (IRASET), pp. 1-9, Meknes, Morocco, 2022.

[10] K. Gupta et al., "A Tree Classifier Based Network Intrusion Detection Model for Internet of Medical Things," Computers and Electrical Engineering, vol. 102, p. 108158, 2022.

[11] J. Nayak, S. K. Meher, A. Souri, B. Naik and S. Vimal, "Extreme Learning Machine and Bayesian Optimization-driven Intelligent Framework for IoMT Cyber-attack Detection," The Journal of Supercomputing, vol. 78, no. 13, pp. 14866-14891, 2022.

[12] S. Liaqat et al., "SDN Orchestration to Combat Evolving Cyber Threats in Internet of Medical Things (IoMT)," Computer Communications, vol. 160, pp. 697-705, 2020.

[13] I. A. Khan et al., "XSRU-IoMT: Explainable Simple Recurrent Units for Threat Detection in Internet of Medical Things networks," Future Generation Computer Systems, vol. 127, pp. 181-193, 2022.

[14] P. Kumar et al., "An Ensemble Learning and Fog-cloud Architecture-driven Cyber-attack Detection Framework for IoMT Networks," Computer Communications, vol. 166, pp. 110- 124, 2021.

[15] S. Nandy et al., "An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-neural Network," IEEE J. of Biomedical and Health Informatics, vol. 26, no. 5, pp. 1969-1976, 2021.

[16] P. Singh et al., "Dew-cloud-based hierarchical federated learning for intrusion detection in IoMT," IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 722-731, 2022.

[17] S. A. Wagan et al., "A Fuzzy-based Duo-secure Multi-modal Framework for IoMT Anomaly Detection," J. of King Saud Uni.-Computer and Information Sciences, vol. 35, no. 1, pp. 131-144, 2023.

[18] F. Khan et al., "A Secure Ensemble Learning-based Fog-cloud Approach for Cyberattack Detection in IoMT," IEEE Transactions on Industrial Informatics, vol. 19, no. 10, pp. 10125 – 10132, 2023.

[19] U. Zukaib et al., "Meta-IDS: Meta-learning Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network," IEEE Internet of Things J., vol. 11, no. 13, pp. 23080 – 23095, 2024.

[20] S. P. RM et al., "An Effective Feature Engineering for DNN Using Hybrid PCA-GWO for Intrusion Detection in IoMT Architecture," Computer Communications, vol. 160, pp. 139-149, 2020.

[21] S. Khan and A. Akhunzada, "A hybrid DL-driven Intelligent SDN-enabled Malware Detection Framework for Internet of Medical Things (IoMT)," Computer Comm., vol. 170, pp. 209-216, 2021.

[22] J. B. Awotunde et al., "A Deep Learning-based Intrusion Detection Technique for a Secured IoMT System," Proc. of the Int. Conf. on Informatics and Intelligent Applications (ICIIA 2021), Part of the Book Series: Communications in Computer and Information Science, vol. 1547, pp. 50-62, Nov. 2021.

[23] N. Saran, N. Kesswani and R. Saharan, "Intrusion Detection System Using Deep Learning Techniques for Internet of Medical Things (IoMT)," Proc. of the International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR 2023), Part of the Book Series: Lecture Notes in Networks and Systems, vol. 1001, pp. 752-763, Springer, Aug. 2024.

[24] Y. K. Saheed and M. O. Arowolo, "Efficient Cyber Attack Detection on the Internet of Medical Things-smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms," IEEE Access, vol. 9, pp. 161546-161554, 2021.

[25] R. Chaganti et al., "A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things," Sustainability, vol. 14, no. 19, p. 12828, 2022.

[26] J. A. Alzubi, O. A. Alzubi, I. Qiqieh and A. Singh, "A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-centric IoMT Industry," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 2049 – 2057, 2024.

[27] F. Laghrissi, S. Douzi, K. Douzi and B. Hssina, "IDS-attention: An Efficient Algorithm for Intrusion Detection Systems Using Attention Mechanism," Journal of Big Data, vol. 8, no. 1, p. 149, 2021.

[28] M. V. Assis et al., "A GRU Deep Learning System against Attacks in Software Defined Networks," Journal of Network and Computer Applications, vol. 177, p. 102942, 2021.

[29] X. Miao, S. Li, Y. Zhu and Z. An, "A Novel Real-time Fault Diagnosis Method for Planetary Gearbox Using Transferable Hidden Layer," IEEE Sensors Journal, vol. 20, no. 15, pp. 8403-8412, 2020.

[30] F. Hussain et al., "IoT Healthcare Security Dataset," IEEE Dataport, [Online], Available: https://ieee-dataport.org/keywords/healthcare-security-dataset, 2021.

[31] F. Hussain et al., "A Framework for Malicious Traffic Detection in IoT Healthcare Environment," Sensors, vol. 21, no. 9, p. 3025, 2021.