2023
DOI: 10.1016/j.asoc.2023.110227
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Machine Learning based intrusion detection methods for Internet of Medical Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…The link genome contains the input node ID, the output node ID, the link weight, the bit (presence/absence of link), and the update number. The node genome contains the node ID, node type, and function type [26], [27], [28]. The HyperNEAT method is an extended version of NEAT that uses multidimensional geometric structures.…”
Section: A Neuro-evolutionary Algorithm For Detecting Networkmentioning
confidence: 99%
“…The link genome contains the input node ID, the output node ID, the link weight, the bit (presence/absence of link), and the update number. The node genome contains the node ID, node type, and function type [26], [27], [28]. The HyperNEAT method is an extended version of NEAT that uses multidimensional geometric structures.…”
Section: A Neuro-evolutionary Algorithm For Detecting Networkmentioning
confidence: 99%
“…Intrusion detection systems for H-IoT are described in this section [240]. An intrusion typically targets a network or device's integrity, availability, or confidentiality by impairing its security.…”
Section: Intrusion Detection System In Healthcare-iotmentioning
confidence: 99%
“…This can include the use of secure communication standards, such as a secure socket layer (SSL) and transport layer security (TLS), to ensure that data are transmitted securely and cannot be tampered with or intercepted [ 20 , 21 , 22 ]. Another solution is to improve the security of the devices themselves, for example, by implementing secure boot mechanisms to prevent malware infections and ensuring that software updates are securely transmitted and installed [ 23 , 24 ]. In addition, researchers have proposed the use of machine learning and deep learning algorithms and intrusion detection systems to detect and respond to cyber threats in real time [ 25 ].…”
Section: Introductionmentioning
confidence: 99%
“…Deep learning algorithms can be used to model this normal behavior and detect anomalies in real time. In the field of IoMT security, deep learning algorithms can also be used to perform automated feature selection, which can help to reduce the risk of overfitting and improve the performance of intrusion detection systems [ 23 , 37 ]. Additionally, deep learning algorithms can be used to generate representations of the data that can be used as inputs for intrusion detection models, allowing these models to learn more effective representations of the data and improve their accuracy in detecting cyber threats [ 38 ].…”
Section: Introductionmentioning
confidence: 99%