• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网医疗环境中的恶意流量检测框架。

A Framework for Malicious Traffic Detection in IoT Healthcare Environment.

机构信息

Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan.

Instituto de Telecomunicações, Universidade da Beira Interior, 6200-001 Covilhã, Portugal.

出版信息

Sensors (Basel). 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025.

DOI:10.3390/s21093025
PMID:33925813
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8123414/
Abstract

The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices' security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the resource constraint property of IoT devices and the distinct behavior of IoT protocols, the existing security mechanisms cannot be deployed directly for securing the IoT devices and network from the cyber-attacks. To enhance the level of security for IoT, researchers need IoT-specific tools, methods, and datasets. To address the mentioned problem, we provide a framework for developing IoT context-aware security solutions to detect malicious traffic in IoT use cases. The proposed framework consists of a newly created, open-source IoT data generator tool named IoT-Flock. The IoT-Flock tool allows researchers to develop an IoT use-case comprised of both normal and malicious IoT devices and generate traffic. Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. Afterwards, we applied different machine learning techniques to the generated dataset to detect the cyber-attacks and protect the healthcare system from cyber-attacks. The proposed framework will help in developing the context-aware IoT security solutions, especially for a sensitive use case like IoT healthcare environment.

摘要

物联网(IoT)作为一个备受关注的话题,在研究和工业界引起了广泛的关注,因为它对人类生活产生了革命性的影响。IoT 技术的快速发展通过引入智能设备、智能医疗、智能工业、智能城市、智能电网等概念,彻底改变了人类的生活。如今,物联网设备的安全性已成为一个严重的问题,特别是在医疗保健领域,最近的攻击暴露了物联网安全漏洞的破坏性。传统的网络安全解决方案已经成熟。然而,由于 IoT 设备的资源约束特性和 IoT 协议的独特行为,现有的安全机制不能直接部署用于保护 IoT 设备和网络免受网络攻击。为了提高物联网的安全性,研究人员需要物联网特定的工具、方法和数据集。为了解决上述问题,我们提供了一个开发物联网上下文感知安全解决方案的框架,以检测物联网用例中的恶意流量。所提出的框架由一个新创建的、开源的物联网数据生成工具 IoT-Flock 组成。IoT-Flock 工具允许研究人员开发由正常和恶意 IoT 设备组成的物联网用例并生成流量。此外,所提出的框架提供了一个开源实用程序,用于将 IoT-Flock 生成的捕获流量转换为物联网数据集。在这项研究中,我们首先生成了一个包含正常和物联网攻击流量的物联网医疗保健数据集。然后,我们将不同的机器学习技术应用于生成的数据集,以检测网络攻击并保护医疗保健系统免受网络攻击。所提出的框架将有助于开发上下文感知的物联网安全解决方案,特别是对于物联网医疗保健环境等敏感用例。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/ffe1a395e46b/sensors-21-03025-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/98ec54a921cb/sensors-21-03025-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/d4e5144521bf/sensors-21-03025-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/a941d4e0aa96/sensors-21-03025-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/553078942c27/sensors-21-03025-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/66621c7ec5d2/sensors-21-03025-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/033dec3f2447/sensors-21-03025-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/ffe1a395e46b/sensors-21-03025-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/98ec54a921cb/sensors-21-03025-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/d4e5144521bf/sensors-21-03025-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/a941d4e0aa96/sensors-21-03025-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/553078942c27/sensors-21-03025-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/66621c7ec5d2/sensors-21-03025-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/033dec3f2447/sensors-21-03025-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e7f/8123414/ffe1a395e46b/sensors-21-03025-g007.jpg

相似文献

1
A Framework for Malicious Traffic Detection in IoT Healthcare Environment.物联网医疗环境中的恶意流量检测框架。
Sensors (Basel). 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025.
2
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.区块链与集中式认证架构在智慧城市物联网智能设备中的比较分析:全面回顾、最新进展和未来研究方向。
Sensors (Basel). 2022 Jul 10;22(14):5168. doi: 10.3390/s22145168.
3
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
4
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
5
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
6
Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.网络-互联网安全框架,利用机器学习技术攻克物联网相关网络攻击。
Comput Intell Neurosci. 2022 Sep 29;2022:8803586. doi: 10.1155/2022/8803586. eCollection 2022.
7
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.利用以太坊区块链技术防止物联网设备的 DDoS 攻击。
Sensors (Basel). 2022 Sep 8;22(18):6806. doi: 10.3390/s22186806.
8
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.迈向基于深度学习驱动的物联网入侵检测
Sensors (Basel). 2019 Apr 27;19(9):1977. doi: 10.3390/s19091977.
9
Internet of Things: Security and Solutions Survey.物联网:安全与解决方案调查。
Sensors (Basel). 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433.
10
Trustworthy Intrusion Detection in E-Healthcare Systems.可信的电子医疗保健系统入侵检测。
Front Public Health. 2021 Dec 3;9:788347. doi: 10.3389/fpubh.2021.788347. eCollection 2021.

引用本文的文献

1
A battery-free wireless sensor for encrypted signal transmission via Maxwell's displacement current.一种用于通过麦克斯韦位移电流进行加密信号传输的无电池无线传感器。
Microsyst Nanoeng. 2025 Jun 30;11(1):130. doi: 10.1038/s41378-025-00987-3.
2
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security.一种用于智能医疗安全的基于智能注意力的深度卷积学习(IADCL)模型。
Sci Rep. 2025 Jan 8;15(1):1363. doi: 10.1038/s41598-024-84691-8.
3
The intelligent evaluation in ice and snow tourism based on LSTM network.

本文引用的文献

1
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.新冠疫情时代的网络安全:疫情期间网络犯罪与网络攻击的时间线及分析
Comput Secur. 2021 Jun;105:102248. doi: 10.1016/j.cose.2021.102248. Epub 2021 Mar 3.
2
MQTTset, a New Dataset for Machine Learning Techniques on MQTT.MQTTset,一个用于MQTT机器学习技术的新数据集。
Sensors (Basel). 2020 Nov 18;20(22):6578. doi: 10.3390/s20226578.
3
Healthcare Data Breaches: Insights and Implications.医疗保健数据泄露:见解与影响
基于长短期记忆网络的冰雪旅游智能评价
Sci Rep. 2024 Jul 28;14(1):17342. doi: 10.1038/s41598-024-68457-w.
4
Restoring private autism dataset from sanitized database using an optimized key produced from enhanced combined PSO-GWO framework.利用增强型组合粒子群优化灰狼优化算法生成的优化密钥,从清理后的数据库中还原私人自闭症数据集。
Sci Rep. 2024 Jul 9;14(1):15763. doi: 10.1038/s41598-024-66603-y.
5
Security Analysis for Smart Healthcare Systems.智能医疗保健系统的安全分析。
Sensors (Basel). 2024 May 24;24(11):3375. doi: 10.3390/s24113375.
6
Research on Anomaly Network Detection Based on Self-Attention Mechanism.基于自注意力机制的异常网络检测研究。
Sensors (Basel). 2023 May 25;23(11):5059. doi: 10.3390/s23115059.
7
Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues.智能医疗保健中基于联邦学习的人工智能方法:概念、分类、挑战与开放问题。
Cluster Comput. 2022 Aug 17:1-41. doi: 10.1007/s10586-022-03658-4.
8
FIDChain: Federated Intrusion Detection System for Blockchain-Enabled IoT Healthcare Applications.FIDChain:用于支持区块链的物联网医疗保健应用的联邦入侵检测系统。
Healthcare (Basel). 2022 Jun 15;10(6):1110. doi: 10.3390/healthcare10061110.
9
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.物联网系统中的入侵检测:关于利用多接入边缘计算、机器学习和数据集的设计方法的综述
Sensors (Basel). 2022 May 14;22(10):3744. doi: 10.3390/s22103744.
10
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.使用物联网入侵检测系统预防MQTT漏洞
Sensors (Basel). 2022 Jan 12;22(2):567. doi: 10.3390/s22020567.
Healthcare (Basel). 2020 May 13;8(2):133. doi: 10.3390/healthcare8020133.