Determining Malware Attacks in Iot Health Care System Using Self Attention Based Depth Poly O (Optimized)-network

Author:

Rodrigues Paul1,Bangali Harun1,Basha Syed Asif1,Gopalakrishnan T2ORCID,V Pandimurugan3,S Rajasoundaran3,SVN Santhosh Kumar4

Affiliation:

1. King Khalid University

2. Manipal Institute of Technology Bengaluru

3. SRM Institute of Science and Technology (Deemed to be University) SRM Medical College Hospital and Research Centre

4. Vellore Institute of Technology

Abstract

Abstract The Internet of Things (IoT) is becoming more important in numerous sectors, including healthcare, industry, the military, and education. The framework successfully safeguards the privacy, authenticity, and accessibility of data in a networked setting. Health care is only one of many sectors that may benefit from the given solutions, which are essential for protecting the personal information of patients and maintaining the integrity of their medical records. The privacy, security, and reliability of the whole health care system online are still at danger owing to a broad variety of intermediary assaults and infiltration activities, despite the fact that the Internet of Things (IoT) offers trustworthy mechanisms for keeping data secure. In this research, we employ a hyper-tuned optimal classifier based on deep learning to overcome these issues. Here the real time patients sensor data are retrieved and it can be preprocessed for removing the error by using the Minmax Hat normalization. Then the features can be selected using wrapper discriminant component analysis. Then the proposed classifier can be optimized using the Hybrid CUADA (Cuckoo Adam) optimization algorithm. After classification parameter optimization, the collected features are fed into the newly-introduced self-attention based depth poly O (optimized)-Network to detect malware intrusions and monitor patient records. The system's effectiveness has been assessed based on experimental findings and subsequent discussions.

Publisher

Research Square Platform LLC

Reference60 articles.

1. Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges;Pundir S;IEEE Access,2019

2. Rughoobur P, Nagowah L (2017) "A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare," in International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS), 2017, pp. 811–817

3. Semi-supervised learning based distributed attack detection framework for IoT;Rathore S;Appl Soft Comput,2018

4. A local feature engineering strategy to improve network anomaly detection;Carta S;Future Internet,2020

5. Alrashdi I, Alqazzaz A, Alharthi R, Aloufi E, Zohdy MA, Ming H, "FBAD (2019) : IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2019, pp. 0515–0522

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. ADSBAN: Anomaly detection system for body area networks utilizing IoT and machine learning;Concurrency and Computation: Practice and Experience;2024-03-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3