| Literature DB >> 34926397 |
Faiza Akram1, Dongsheng Liu1, Peibiao Zhao1, Natalia Kryvinska2, Sidra Abbas3, Muhammad Rizwan4.
Abstract
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS) play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a massive technology with security threats on the network layer, as it is considered the most common source for communication and data storage platforms. The security of data servers in all sectors (mainly healthcare) has become one of the most crucial challenges for researchers. This paper proposes an approach for effective intrusion detection in the e-healthcare environment to maintain PHR in a safe IoT-net using an adaptive neuro-fuzzy inference system (ANFIS). In the proposed security model, the experiments present a security tool that helps to detect malicious network traffic. The practical implementation of the ANFIS model on the MATLAB framework with testing and training results compares the accuracy rate from the previous research in security.Entities:
Keywords: ANFIS; IoT based networks; intrusion detection; network security; privacy
Mesh:
Year: 2021 PMID: 34926397 PMCID: PMC8678532 DOI: 10.3389/fpubh.2021.788347
Source DB: PubMed Journal: Front Public Health ISSN: 2296-2565
Recent research on ANFIS and network security issues.
|
|
|
|
|---|---|---|
| Srilakshmi and Muthukuru ( | Worm-hole and malicious nodes | Hybrid reactive search and bat (HRSB) mechanism used to detect malicious nodes and ANFIS for testing and training data |
| Pawar and Jagadeesan ( | Black-hole attack | Used a self-adaptive multi-verse optimizer with ANFIS to detect intrusion attacks in WSN |
| Maheswari and Karthika ( | Intrusion detection in network | ANFIS clustering methodology used for selecting cluster heads |
| Parfenov et al. ( | Denial of service attack | ANFIS used to improve network traffic attack detection and performance evaluation |
| Nandi and Kannan ( | Packet flooding attacks | ANFIS classifier used for feature extraction and classification in MANET |
| Hemalatha et al. ( | Routing attack | ANFIS used for initial feature selection and trust evaluation |
| Barraclough et al. ( | Phishing attacks | ANFIS-based classification approach for higher accuracy rate |
Recent research on network security risks.
|
|
|
|
|---|---|---|
| Data security | Unauthorized access, data leakage, data disclosure, privacy disclosure | Hybrid approach of the DSA algorithm with reverse flow ( |
| Platform security | Data sharing, software, hardware, application | Combination of AES, Blowfish and Twofish security algorithms for secure data sharing ( |
| Application security | Configuring, system accessing, management | Hybrid framework of ECC and AES for advance encryption approach ( |
| Infrastructure security | Cloud framework, fault injection, false model, resource handling | Proposed RDFI strategies with chaos engineering algorithm (CEA) for deployed infrastructure ( |
| Physical security | Sensitive data leakage, privacy breaching, hacking, intrusion | Lightweight cryptographic algorithms for physical security analysis ( |
Figure 1Five layer-based working of the ANFIS architecture.
Figure 2The controller architecture of the ANFIS technique (ANFIS-C).
Figure 3Flow chart of ANFIS-based system.
Input/Output parameters and membership functions.
|
|
|
|---|---|
| [Input 1] [Normal] | Range: [0 1], MFs: 3 (low, medium, high) |
| [Input 2] [Probe] | Range: [0 1], MFs: 3 (low, medium, high) |
| [Input 3] [DoS] | Range: [0 1], MFs: 3 (low, medium, high) |
| [Input 4] [U2R] | Range: [0 1], MFs: 3 (low, medium, high) |
| [Input 5] [R2L] | Range: [0 1], MFs: 3 (low, medium, high) |
| [Output] [Attack_type] | Range: [0 1], MFs: 3 (low, medium, high) |
Figure 4Input parameters.
Figure 5Set of rules based on membership functions.
Figure 6(A–E) Set of rules based on membership functions.
Figure 7Proposed ANFIS model.
Figure 8Training results of the KDDcup 99 dataset. (A) On x-axis “normal”. (B) On x-axis “probe”. (C) On x-axis “U2R”. (D) On x-axis “DoS”. (E) On x-axis “R2L”.
Testing and training results from the KDDcup 99 datasets.
|
|
|
|
|
|---|---|---|---|
| Normal | Stable connectivity | 97,278 | 60,593 |
| Probe | Configuration and analysis details of the system and network | 4,107 | 4,166 |
| DoS | Affecting network resources | 391,458 | 229,853 |
| U2R | Accessibility to servers and connected nodes | 52 | 258 |
| R2L | Illegal accessibility to remote devices | 1,126 | 16,189 |
Comparison of FIS and ANFIS models.
|
|
|
|
|---|---|---|
| MSE | 0.0183 | 0.0123 |
| NMSE | 0.3185 | 0.2650 |
| MAE | 0.1170 | 0.0747 |
| Error (min. obs) | 0.0110 | 0.0021 |
| Error (max. obs) | 0.1279 | 0.1706 |
| R-value | 0.6133 | 0.7336 |