• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

智能医疗保健系统的安全分析。

Security Analysis for Smart Healthcare Systems.

机构信息

Department of Mechatronics Engineering, German Jordanian University, Amman 11180, Jordan.

出版信息

Sensors (Basel). 2024 May 24;24(11):3375. doi: 10.3390/s24113375.

DOI:10.3390/s24113375
PMID:38894166
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11175093/
Abstract

The healthcare industry went through reformation by integrating the Internet of Medical Things (IoMT) to enable data harnessing by transmission mediums from different devices, about patients to healthcare staff devices, for further analysis through cloud-based servers for proper diagnosis of patients, yielding efficient and accurate results. However, IoMT technology is accompanied by a set of drawbacks in terms of security risks and vulnerabilities, such as violating and exposing patients' sensitive and confidential data. Further, the network traffic data is prone to interception attacks caused by a wireless type of communication and alteration of data, which could cause unwanted outcomes. The advocated scheme provides insight into a robust Intrusion Detection System (IDS) for IoMT networks. It leverages a honeypot to divert attackers away from critical systems, reducing the attack surface. Additionally, the IDS employs an ensemble method combining Logistic Regression and K-Nearest Neighbor algorithms. This approach harnesses the strengths of both algorithms to improve attack detection accuracy and robustness. This work analyzes the impact, performance, accuracy, and precision outcomes of the used model on two IoMT-related datasets which contain multiple attack types such as Man-In-The-Middle (MITM), Data Injection, and Distributed Denial of Services (DDOS). The yielded results showed that the proposed ensemble method was effective in detecting intrusion attempts and classifying them as attacks or normal network traffic, with a high accuracy of 92.5% for the first dataset and 99.54% for the second dataset and a precision of 96.74% for the first dataset and 99.228% for the second dataset.

摘要

医疗行业通过整合医疗物联网(IoMT)进行了改革,使数据能够通过来自不同设备的传输介质进行收集,包括患者到医疗保健人员设备,以便通过基于云的服务器进行进一步分析,从而对患者进行正确诊断,产生高效和准确的结果。然而,IoMT 技术在安全风险和漏洞方面存在一系列缺陷,例如侵犯和暴露患者敏感和机密数据。此外,网络流量数据容易受到无线通信和数据篡改引起的拦截攻击,这可能会导致不良后果。所提出的方案为 IoMT 网络提供了一种强大的入侵检测系统(IDS)。它利用蜜罐将攻击者从关键系统中转移开,从而减少攻击面。此外,IDS 采用了一种结合逻辑回归和 K-最近邻算法的集成方法。这种方法利用了两种算法的优势,以提高攻击检测的准确性和鲁棒性。这项工作分析了所使用模型对两个与 IoMT 相关的数据集的影响、性能、准确性和精度结果,这些数据集包含多种攻击类型,如中间人(MITM)、数据注入和分布式拒绝服务(DDOS)。结果表明,所提出的集成方法在检测入侵尝试并将其分类为攻击或正常网络流量方面非常有效,对于第一个数据集的准确率为 92.5%,对于第二个数据集的准确率为 99.54%,对于第一个数据集的精度为 96.74%,对于第二个数据集的精度为 99.228%。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/fa2960a2ce4d/sensors-24-03375-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/13075017cdf0/sensors-24-03375-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/3f927c85b6cb/sensors-24-03375-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/d887825f04a0/sensors-24-03375-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/3eb783e5d81e/sensors-24-03375-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/7643e7b78914/sensors-24-03375-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/bc168a49087b/sensors-24-03375-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/fa2960a2ce4d/sensors-24-03375-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/13075017cdf0/sensors-24-03375-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/3f927c85b6cb/sensors-24-03375-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/d887825f04a0/sensors-24-03375-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/3eb783e5d81e/sensors-24-03375-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/7643e7b78914/sensors-24-03375-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/bc168a49087b/sensors-24-03375-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c0fc/11175093/fa2960a2ce4d/sensors-24-03375-g007.jpg

相似文献

1
Security Analysis for Smart Healthcare Systems.智能医疗保健系统的安全分析。
Sensors (Basel). 2024 May 24;24(11):3375. doi: 10.3390/s24113375.
2
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network.物联网医疗网络中入侵检测的机器学习方法研究与比较
J Supercomput. 2022;78(15):17403-17422. doi: 10.1007/s11227-022-04568-3. Epub 2022 May 18.
3
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System.智能医疗系统中的安全蓝牙通信:一个新型社区数据集和入侵检测系统。
Sensors (Basel). 2022 Oct 28;22(21):8280. doi: 10.3390/s22218280.
4
Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things.增强医疗保健领域的网络安全:评估物联网中入侵检测的集成学习模型。
Sensors (Basel). 2024 Sep 13;24(18):5937. doi: 10.3390/s24185937.
5
Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.基于人工智能算法的经济可持续性否认攻击检测系统:云计算环境。
Sensors (Basel). 2022 Jun 21;22(13):4685. doi: 10.3390/s22134685.
6
Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.基于多种机器学习模型的医疗物联网中基于中间盒的攻击检测。
Comput Intell Neurosci. 2022 Nov 28;2022:2037954. doi: 10.1155/2022/2037954. eCollection 2022.
7
An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning.基于模糊学习的物联网自适应入侵检测系统。
Sensors (Basel). 2023 Nov 17;23(22):9247. doi: 10.3390/s23229247.
8
Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection.基于树型机器学习和基于滤波器的特征选择的物联网医疗网络优化入侵检测
Sensors (Basel). 2024 Sep 2;24(17):5712. doi: 10.3390/s24175712.
9
A Framework for Malicious Traffic Detection in IoT Healthcare Environment.物联网医疗环境中的恶意流量检测框架。
Sensors (Basel). 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025.
10
A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.基于深度学习的医疗系统入侵检测混合框架。
Front Public Health. 2022 Jan 12;9:824898. doi: 10.3389/fpubh.2021.824898. eCollection 2021.

引用本文的文献

1
Hybrid deep learning-enabled framework for enhancing security, data integrity, and operational performance in Healthcare Internet of Things (H-IoT) environments.用于增强医疗物联网(H-IoT)环境中的安全性、数据完整性和运营性能的混合深度学习框架。
Sci Rep. 2025 Aug 23;15(1):31039. doi: 10.1038/s41598-025-15292-2.
2
XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems.XAI-XGBoost:一种用于保障医疗物联网系统安全的创新型可解释入侵检测方法。
Sci Rep. 2025 Jul 1;15(1):22278. doi: 10.1038/s41598-025-07790-0.
3
Digital approaches in post-COVID healthcare: a systematic review of technological innovations in disease management.

本文引用的文献

1
The applications of machine learning techniques in medical data processing based on distributed computing and the Internet of Things.基于分布式计算和物联网的机器学习技术在医学数据处理中的应用。
Comput Methods Programs Biomed. 2023 Nov;241:107745. doi: 10.1016/j.cmpb.2023.107745. Epub 2023 Aug 9.
2
Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security.用于入侵检测的集成学习框架,以增强物联网设备的安全性。
Sensors (Basel). 2023 Jun 14;23(12):5568. doi: 10.3390/s23125568.
3
Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.
新冠疫情后医疗保健中的数字方法:疾病管理技术创新的系统综述
Biol Methods Protoc. 2024 Oct 1;9(1):bpae070. doi: 10.1093/biomethods/bpae070. eCollection 2024.
国家卫生系统中医院网络攻击的经济影响:描述性案例研究
JMIR Form Res. 2023 Jun 30;7:e41738. doi: 10.2196/41738.
4
A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.基于机器学习的零日攻击检测综述:挑战与未来方向
Comput Commun. 2023 Jan;198. doi: 10.1016/j.comcom.2022.11.001.
5
Using honeypots to model botnet attacks on the internet of medical things.利用蜜罐模拟对医疗物联网的僵尸网络攻击。
Comput Electr Eng. 2022 Sep;102:108212. doi: 10.1016/j.compeleceng.2022.108212. Epub 2022 Jul 8.
6
Leveraging 5G technology for robotic surgery and cancer care.利用5G技术进行机器人手术和癌症护理。
Cancer Rep (Hoboken). 2022 Aug;5(8):e1595. doi: 10.1002/cnr2.1595. Epub 2022 Mar 9.
7
A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.基于深度学习的医疗系统入侵检测混合框架。
Front Public Health. 2022 Jan 12;9:824898. doi: 10.3389/fpubh.2021.824898. eCollection 2021.
8
Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.使用物联网入侵检测系统预防MQTT漏洞
Sensors (Basel). 2022 Jan 12;22(2):567. doi: 10.3390/s22020567.
9
A Framework for Malicious Traffic Detection in IoT Healthcare Environment.物联网医疗环境中的恶意流量检测框架。
Sensors (Basel). 2021 Apr 26;21(9):3025. doi: 10.3390/s21093025.
10
Cybersecurity: The need for data and patient safety with cardiac implantable electronic devices.网络安全:心脏植入式电子设备的数据和患者安全需求。
Heart Rhythm. 2021 Mar;18(3):473-481. doi: 10.1016/j.hrthm.2020.10.009. Epub 2020 Oct 12.