Anomaly-Based Intrusion Detection System for the Internet of Medical Things


anomaly detection
internet of things
unethical hackers

How to Cite

Franklin, E., & Pranggono, B. (2024). Anomaly-Based Intrusion Detection System for the Internet of Medical Things. IJID (International Journal on Informatics for Development), 12(2), 374–383.


The use of the Internet of Things (IoT) in the health sector, known as the Internet of Medical Things (IoMT), allows for personalized and convenient (e)-health services for patients. However, there are concerns about security and privacy as unethical hackers can compromise these network systems with malware. To address these concerns, we proposed using hyperparameter-optimized Machine and Deep Learning models to build more robust security solutions. We used a representative Anomaly Intrusion Detection System (AIDS) dataset to train six state-of-the-art Machine Learning (ML) and Deep Learning (DL) architectures, with the Synthetic Minority Oversampling Technique (SMOTE) algorithm used to handle class imbalance in the training dataset. Our hyperparameter optimization using the Random search algorithm resulted in accurate classification of normal cases for all six models, with Random Forest (RF) and K-Nearest Neighbors (KNN) performing the best in terms of accuracy. The attention-based hybrid Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) model was the second-best performer, while the hybrid CNN-LSTM model performed the worst. However, there was no single best model in classifying all attack labels, as each model performed differently in terms of different metrics.


G. Zachos, I. Essop, G. Mantas, K. Porfyrakis, J. C. Ribeiro, and J. Rodriguez, “An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks,” Electronics, vol. 10, no. 21, Art. no. 21, Jan. 2021, doi: 10.3390/electronics10212562.

Liyakathunisa, A. Alsaeedi, S. Jabeen, and H. Kolivand, “Ambient assisted living framework for elderly care using Internet of medical things, smart sensors, and GRU deep learning techniques,” Journal of Ambient Intelligence and Smart Environments, vol. 14, no. 1, pp. 5–23, Jan. 2022, doi: 10.3233/AIS-210162.

B. Pranggono, K. McLaughlin, Y. Yang, and S. Sezer, “Intrusion Detection Systems for Critical Infrastructure,” in The State of the Art in Intrusion Prevention and Detection, Al-Sakib Khan Pathan, Ed., CRC Press, 2014, pp. 115–138.

P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 686–728, 2019, doi: 10.1109/COMST.2018.2847722.

B. Pranggono and A. Arabo, “COVID‐19 pandemic cybersecurity issues,” Internet Technology Letters, vol. 4, no. 2, p. e247, 2021.

A. Binbusayyis, H. Alaskar, T. Vaiyapuri, and M. Dinesh, “An investigation and comparison of machine learning approaches for intrusion detection in IoMT network,” J Supercomput, vol. 78, no. 15, pp. 17403–17422, Oct. 2022, doi: 10.1007/s11227-022-04568-3.

G. Thamilarasu, A. Odesile, and A. Hoang, “An Intrusion Detection System for Internet of Medical Things,” IEEE Access, vol. 8, pp. 181560–181576, 2020, doi: 10.1109/ACCESS.2020.3026260.

J. Wang, H. Jin, J. Chen, J. Tan, and K. Zhong, “Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network,” Information Sciences, vol. 617, pp. 133–149, Dec. 2022, doi: 10.1016/j.ins.2022.10.060.

S. Bacha, A. Aljuhani, K. B. Abdellafou, O. Taouali, N. Liouane, and M. Alazab, “Anomaly-based intrusion detection system in IoT using kernel extreme learning machine,” J Ambient Intel Human Comput, May 2022, doi: 10.1007/s12652-022-03887-w.

A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, “TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165130–165150, 2020, doi: 10.1109/ACCESS.2020.3022862.

N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic Minority Over-sampling Technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, Jun. 2002, doi: 10.1613/jair.953.

N. Jannah, S. Hadjiloucas, and J. Al-Malki, “Arrhythmia detection using multi-lead ECG spectra and Complex Support Vector Machine Classifiers,” Procedia Computer Science, vol. 194, pp. 69–79, Jan. 2021, doi: 10.1016/j.procs.2021.10.060.

J. Bergstra and Y. Bengio, “Random search for hyper-parameter optimization,” J. Mach. Learn. Res., vol. 13, no. null, pp. 281–305, Feb. 2012.

M. M. Forootan, I. Larki, R. Zahedi, and A. Ahmadi, “Machine Learning and Deep Learning in Energy Systems: A Review,” Sustainability, vol. 14, no. 8, Art. no. 8, Jan. 2022, doi: 10.3390/su14084832.

P. Madan, V. Singh, D. P. Singh, M. Diwakar, B. Pant, and A. Kishor, “A Hybrid Deep Learning Approach for ECG-Based Arrhythmia Classification,” Bioengineering, vol. 9, no. 4, Art. no. 4, Apr. 2022, doi: 10.3390/bioengineering9040152.

D. Bahdanau, K. Cho, and Y. Bengio, “Neural Machine Translation by Jointly Learning to Align and Translate.” arXiv, May 19, 2016. doi: 10.48550/arXiv.1409.0473.

M.-T. Luong, H. Pham, and C. D. Manning, “Effective Approaches to Attention-based Neural Machine Translation.” arXiv, Sep. 20, 2015. doi: 10.48550/arXiv.1508.04025.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.