International Journal of Computational Intelligence and Applications

An Effective Deep Learning-Based Intrusion Detection System for the Healthcare Environment

K. Balaji 1
S. Satheesh Kumar 2
D Vivek 1
S. Prem Kumar Deepak 1
K. V. Daya Sagar 3
S. Thabassum Khan 4
1
 
Department of Computer Science & Engineering, B V Raju Institute of Technology, Narsapur, Tuljaraopet 502313, Telangana, India
2
 
Department of CSIT, Institute of Aeronautical Engineering, Dundigal, Hyderabad 500043, Telangana, India
Publication typeJournal Article
Publication date2024-11-26
scimago Q3
SJR0.279
CiteScore2.6
Impact factor0.8
ISSN14690268, 17575885
Abstract

In the medical field, Internet of Things (IoT) applications allow for real-time diagnosis and remote patient monitoring, commonly called Internet of Health Things (IoHT). However, cybersecurity attacks may interrupt hospital operations and threaten patients’ health and well-being due to this integration. Hence, developing an Intrusion Detection System (IDS) suited explicitly for healthcare systems is essential to ensure efficiency and accuracy. Nevertheless, it is challenging to integrate anomaly-based IDS frameworks in healthcare systems as they necessitate additional processing time, temporal feature retention, and increased complexity. Therefore, a deep learning system based on SqueezeNet and NasNet is presented in this paper to detect intrusions in a healthcare setting. In this, SqueezeNet is employed to extract more significant features. On the other hand, network breaches while data transmission across distinct locations are detected by the NasNet-based classifier. In addition, the Rider Optimization Algorithm (ROA) is applied to adjust the classifier’s hyperparameters, guaranteeing that it would accurately detect attacks. Moreover, the Auxiliary Classifier Generative Adversarial Network (ACGAN) approach is integrated into the proposed framework to avoid data imbalance. Applying different performance constraints, the proposed approach is thoroughly assessed on three publicly available datasets (TON-IoT, ECU-IoHT, and WUSTL-EHMS). The results show that the proposed deep learning-based cybersecurity model outperforms traditional methods and produces better outcomes.

Found 
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Share
Cite this
GOST | RIS | BibTex
Found error?