2021
DOI: 10.28945/4838
|View full text |Cite
|
Sign up to set email alerts
|

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Abstract: Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…There are 41 characteristics in total, 38 of which are numeric, and 3 of which are not (protocol type, service type, and fag). There are also fundamental traffic features (23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41), content features (11)(12)(13)(14)(15)(16)(17)(18)(19)(20)(21)(22), features (1-10), and a class label for each item.…”
Section: Dataset Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are 41 characteristics in total, 38 of which are numeric, and 3 of which are not (protocol type, service type, and fag). There are also fundamental traffic features (23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)(35)(36)(37)(38)(39)(40)(41), content features (11)(12)(13)(14)(15)(16)(17)(18)(19)(20)(21)(22), features (1-10), and a class label for each item.…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…Despite the tremendous research programs, IDS still needs help with detection performance while reducing warning rates and recognizing disruption [12]. An efficient way to combat the rising tide of cyberattacks plaguing the healthcare ecosystem is to implement AI expertise in smart healthcare systems [13].…”
Section: Introductionmentioning
confidence: 99%
“…Similar to upstream detection, downstream detection identifies how many links are next in a chain. Because the intruder's host sends Send and Echo packets independently of one another, upstream detection is more difficult and complex [ 20 – 22 ].…”
Section: Related Workmentioning
confidence: 99%
“…Similar to upstream detection, downstream detection identifes how many links are next in a chain. Because the intruder's host sends Send and Echo packets independently of one another, upstream detection is more difcult and complex [20][21][22]. Te identifcation of an attacker's Echo packets has no relation to the detection of the attacker's Send packets from the upstream connection.…”
Section: Related Workmentioning
confidence: 99%
“…Since 2005, IoT has been widely used in various elds, such as industry, automobile, medical treatment, energy, and health care. Other industries have also begun to integrate with IoT; for example, sensors and robots are connected with multiple devices [1,2]. On the one hand, the wide application of IoT improves work e ciency and brings convenience to people's life; on the other hand, the network is facing increasingly serious security threats.…”
Section: Introductionmentioning
confidence: 99%