Abstract
The use of the Internet of Things (IoT) in the health sector, known as the Internet of Medical Things (IoMT), allows for personalized and convenient (e)-health services for patients. However, there are concerns about security and privacy as unethical hackers can compromise these network systems with malware. We proposed using hyperparameter-optimized Machine and Deep Learning models to address these concerns to build more robust security solutions. We used a representative Anomaly Intrusion Detection System (AIDS) dataset to train six state-of-the-art Machine Learning (ML) and Deep Learning (DL) architectures, with the Synthetic Minority Oversampling Technique (SMOTE) algorithm used to handle class imbalance in the training dataset. Our hyperparameter optimization using the Random search algorithm accurately classified normal cases for all six models, with Random Forest (RF) and K-Nearest Neighbors (KNN) performing the best in accuracy. The attention-based Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) model was the second-best performer, while the hybrid CNN-LSTM model performed the worst. However, there was no single best model in classifying all attack labels, as each model performed differently in terms of different metrics.
References
R. Dwivedi, D. Mehrotra, and S. Chandra, “Potential of Internet of Medical Things (IoMT) applications in building a smart healthcare system: A systematic review,” Journal of Oral Biology and Craniofacial Research, vol. 12, no. 2, p. 302, Dec. 2021, doi: 10.1016/j.jobcr.2021.11.010.
“Full article: Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies.” Accessed: Nov. 16, 2024. [Online]. Available: https://www.tandfonline.com/doi/full/10.1080/02564602.2021.1927863
“Internet of Medical Things (IoMT) - An overview | IEEE Conference Publication | IEEE Xplore.” Accessed: Nov. 16, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/9075733
J. Srivastava, S. Routray, S. Ahmad, and M. M. Waris, “Internet of Medical Things (IoMT)-Based Smart Healthcare System: Trends and Progress,” Computational Intelligence and Neuroscience, vol. 2022, p. 7218113, Jul. 2022, doi: 10.1155/2022/7218113.
Liyakathunisa, A. Alsaeedi, S. Jabeen, and H. Kolivand, “Ambient assisted living framework for elderly care using Internet of medical things, smart sensors, and GRU deep learning techniques,” Journal of Ambient Intelligence and Smart Environments, vol. 14, no. 1, pp. 5–23, Jan. 2022, doi: 10.3233/AIS-210162.
B. Pranggono, K. McLaughlin, Y. Yang, and S. Sezer, “Intrusion Detection Systems for Critical Infrastructure,” in The State of the Art in Intrusion Prevention and Detection, Al-Sakib Khan Pathan, Ed., CRC Press, 2014, pp. 115–138.
P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 686–728, 2019, doi: 10.1109/COMST.2018.2847722.
“Anomaly-Based Detection - an overview | ScienceDirect Topics.” Accessed: Nov. 16, 2024. [Online]. Available: https://www.sciencedirect.com/topics/computer-science/anomaly-based-detection
B. Pranggono and A. Arabo, “COVID‐19 pandemic cybersecurity issues,” Internet Technology Letters, vol. 4, no. 2, p. e247, 2021.
A. Si-Ahmed, M. A. Al-Garadi, and N. Boustia, “Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things,” Mar. 07, 2023, arXiv: arXiv:2202.09657. Accessed: Nov. 16, 2024. [Online]. Available: http://arxiv.org/abs/2202.09657
A. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecurity, vol. 4, no. 1, p. 18, Mar. 2021, doi: 10.1186/s42400-021-00077-7.
A. Binbusayyis, H. Alaskar, T. Vaiyapuri, and M. Dinesh, “An investigation and comparison of machine learning approaches for intrusion detection in IoMT network,” J Supercomput, vol. 78, no. 15, pp. 17403–17422, Oct. 2022, doi: 10.1007/s11227-022-04568-3.
G. Thamilarasu, A. Odesile, and A. Hoang, “An Intrusion Detection System for Internet of Medical Things,” IEEE Access, vol. 8, pp. 181560–181576, 2020, doi: 10.1109/ACCESS.2020.3026260.
G. Zachos, I. Essop, G. Mantas, K. Porfyrakis, J. C. Ribeiro, and J. Rodriguez, “An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks,” Electronics, vol. 10, no. 21, Art. no. 21, Jan. 2021, doi: 10.3390/electronics10212562.
J. Wang, H. Jin, J. Chen, J. Tan, and K. Zhong, “Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network,” Information Sciences, vol. 617, pp. 133–149, Dec. 2022, doi: 10.1016/j.ins.2022.10.060.
S. Bacha, A. Aljuhani, K. B. Abdellafou, O. Taouali, N. Liouane, and M. Alazab, “Anomaly-based intrusion detection system in IoT using kernel extreme learning machine,” J Ambient Intel Human Comput, May 2022, doi: 10.1007/s12652-022-03887-w.
A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, “TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165130–165150, 2020, doi: 10.1109/ACCESS.2020.3022862.
N. Moustafa, M. Keshky, E. Debiez, and H. Janicke, “Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications,” in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China: IEEE, Dec. 2020, pp. 848–855. doi: 10.1109/TrustCom50675.2020.00114.
N. Moustafa, M. Ahmed, and S. Ahmed, “Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets,” in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China: IEEE, Dec. 2020, pp. 727–735. doi: 10.1109/TrustCom50675.2020.00100.
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, Jun. 2002, doi: 10.1613/jair.953.
“SMOTE: synthetic minority over-sampling technique: Journal of Artificial Intelligence Research: Vol 16, No 1.” Accessed: Nov. 16, 2024. [Online]. Available: https://dl.acm.org/doi/10.5555/1622407.1622416
“A Comprehensive Analysis of Synthetic Minority Oversampling Technique (SMOTE) for handling class imbalance - ScienceDirect.” Accessed: Nov. 16, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S0020025519306838
“Normalization (with MinMaxScaler).” Accessed: Nov. 16, 2024. [Online]. Available: https://kaggle.com/code/kiranvairagade/normalization-with-minmaxscaler
M. U. Siregar, I. Setiawan, N. Z. Akmal, D. Wardani, Y. Yunitasari, and A. Wijayanto, “Optimized Random Forest Classifier Basedon Genetic Algorithm for Heart Failure Prediction,” in 2022 Seventh International Conference on Informatics and Computing (ICIC), Dec. 2022, pp. 01–06. doi: 10.1109/ICIC56845.2022.10006987.
N. Jannah, S. Hadjiloucas, and J. Al-Malki, “Arrhythmia detection using multi-lead ECG spectra and Complex Support Vector Machine Classifiers,” Procedia Computer Science, vol. 194, pp. 69–79, Jan. 2021, doi: 10.1016/j.procs.2021.10.060.
J. Bergstra and Y. Bengio, “Random search for hyper-parameter optimization,” J. Mach. Learn. Res., vol. 13, no. null, pp. 281–305, Feb. 2012.
M. M. Forootan, I. Larki, R. Zahedi, and A. Ahmadi, “Machine Learning and Deep Learning in Energy Systems: A Review,” Sustainability, vol. 14, no. 8, Art. no. 8, Jan. 2022, doi: 10.3390/su14084832.
P. Madan, V. Singh, D. P. Singh, M. Diwakar, B. Pant, and A. Kishor, “A Hybrid Deep Learning Approach for ECG-Based Arrhythmia Classification,” Bioengineering, vol. 9, no. 4, Art. no. 4, Apr. 2022, doi: 10.3390/bioengineering9040152.
D. Bahdanau, K. Cho, and Y. Bengio, “Neural Machine Translation by Jointly Learning to Align and Translate,” May 19, 2016, arXiv: arXiv:1409.0473. doi: 10.48550/arXiv.1409.0473.
M.-T. Luong, H. Pham, and C. D. Manning, “Effective Approaches to Attention-based Neural Machine Translation,” Sep. 20, 2015, arXiv: arXiv:1508.04025. doi: 10.48550/arXiv.1508.04025.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.