| Literature DB >> 35186118 |
Osman Sirajeldeen Ahmed1, Emad Eldin Omer2, Samar Zuhair Alshawwa3, Malik Bader Alazzam4, Reefat Arefin Khan5.
Abstract
Computing model may train on a distributed dataset using Medical Applications, which is a distributed computing technique. Instead of a centralised server, the model trains on device data. The server then utilizes this model to train a joint model. The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. Botnet assaults are identified through deep autoencoding and decentralised traffic analytics. Rather than enabling data to be transmitted or relocated off the network edge, the problem of the study is in privacy and security in Medical Applications strategies. Computation will be moved to the edge layer to achieve previously centralised outcomes while boosting data security. Study Results in our suggested model detects anomalies with up to 98 percent accuracy utilizing MAC IP and source/destination/IP for training. Our method beats a traditional centrally controlled system in terms of attack detection accuracy.Entities:
Year: 2022 PMID: 35186118 PMCID: PMC8856810 DOI: 10.1155/2022/1201339
Source DB: PubMed Journal: Appl Bionics Biomech ISSN: 1176-2322 Impact factor: 1.781
Figure 1Working diagram of Medical Applications.
Figure 2Computing-based classification process.
Parameter analysis table for the proposed federated computing method.
| Parameters | Proposed federated computing method |
|---|---|
| Precision (%) | 94 |
| Recall (%) | 92 |
| Accuracy (%) | 99.9 |
| Detection time (s) | 32 |
| False positive (%) | 0.77 |
| Memory utilization (MB) | 11 |
Parameters.
| Parameters | Conventional methods | Proposed federated computing method | Improvement rate |
|---|---|---|---|
| Precision (%) | 85 | 94 | 6.38 |
| Recall (%) | 83 | 92 | 7.61 |
| Accuracy (%) | 95.34 | 99.9 | 5.91 |
| Detection time (s) | 65 | 32 | 33 |
| False positive (%) | 1.8 | 0.77 | 1.03 |
| Memory utilization (MB) | 30 | 11 | 19 |
Matrix comparison table between the existing and proposed method.
| Metric | Proposed method | Existing method |
|---|---|---|
| False positive (%) | 1.6 | 2.9 |
| Detection rate known (%) | 99.8 | 99.1 |
| Unknown (%) | 67 | 30.5 |
Figure 3Comparison graph between the existing and proposed methods.
Figure 4Comparison graph.
Figure 5Parameter analysis graph for the proposed method.