2020
DOI: 10.1109/access.2020.3000421
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

Abstract: Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and confidentiality of patients' data is a significant challenge. Any alteration to the data could affect the patients' treatment, leading to human casualties in emergency conditions. Due to the high dimensionality and prominent dynamicity of the data involved in such systems, ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 137 publications
(65 citation statements)
references
References 18 publications
(18 reference statements)
0
39
0
Order By: Relevance
“…Several papers have already studied the cybersecurity and privacy issues of the healthcare ecosystem. Some of them are listed in [5]- [8]. In particular, T. Yaqoob et al in [5] provide a comprehensive study about the vulnerabilities of the smart medical devices and discuss relevant countermeasures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several papers have already studied the cybersecurity and privacy issues of the healthcare ecosystem. Some of them are listed in [5]- [8]. In particular, T. Yaqoob et al in [5] provide a comprehensive study about the vulnerabilities of the smart medical devices and discuss relevant countermeasures.…”
Section: Related Workmentioning
confidence: 99%
“…Sun et al in [7] introduce a survey regarding the cybersecurity challenges, requirements and threats related to IoMT, thus identifying directions for future research works. Finally, in [8], A. Hady et al present a thorough review about the Intrusion Detection Systems (IDS) in the healthcare area. Below, we analyse further some notable cases.…”
Section: Related Workmentioning
confidence: 99%
“…Even We have used a dataset collected from a healthcare testbed built at Washington University in St. Louis. The testbed includes monitoring sensors that collect the patient's biometrics and connect to a server in a lab-scale IoMT system [15], [16]. The dataset includes man-in-the-middle injection attacks and benign IoMT traffic.…”
Section: A Healthcare Systems and Their Requirementsmentioning
confidence: 99%
“…On the other hand, Machine Learning (ML), which is closely associated with computational statistics and one major aspect of the Security of Things (SoTs), has been presented to several applications to cybersecurity for the analysis of hybrid networks, comprised of both anomaly detection and the detection of data mismanagement [1]. The ML technique is apparently becoming the most promising approach to deal with security glitches and several hidden (otherwise known as zero-day) attacks in healthcare systems [2]. The technique can recognise attacks merely by monitoring the modifications of data or simply by detecting alterations in the features of the network's traffic [3].…”
Section: Introductionmentioning
confidence: 99%