4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Framework for Malicious Traffic Detection in IoT Healthcare Environment

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the resource constraint property of IoT devices and the distinct behavior of IoT protocols, the existing security mechanisms cannot be deployed directly for securing the IoT devices and network from the cyber-attacks. To enhance the level of security for IoT, researchers need IoT-specific tools, methods, and datasets. To address the mentioned problem, we provide a framework for developing IoT context-aware security solutions to detect malicious traffic in IoT use cases. The proposed framework consists of a newly created, open-source IoT data generator tool named IoT-Flock. The IoT-Flock tool allows researchers to develop an IoT use-case comprised of both normal and malicious IoT devices and generate traffic. Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. Afterwards, we applied different machine learning techniques to the generated dataset to detect the cyber-attacks and protect the healthcare system from cyber-attacks. The proposed framework will help in developing the context-aware IoT security solutions, especially for a sensitive use case like IoT healthcare environment.

          Related collections

          Most cited references46

          • Record: found
          • Abstract: not found
          • Article: not found

          A survey of intrusion detection in Internet of Things

            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic

            The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affected society and business. The increased anxiety caused by the pandemic heightened the likelihood of cyber-attacks succeeding corresponding with an increase in the number and range of cyber-attacks. This paper analyses the COVID-19 pandemic from a cyber-crime perspective and highlights the range of cyber-attacks experienced globally during the pandemic. Cyber-attacks are analysed and considered within the context of key global events to reveal the modus-operandi of cyber-attack campaigns. The analysis shows how following what appeared to be large gaps between the initial outbreak of the pandemic in China and the first COVID-19 related cyber-attack, attacks steadily became much more prevalent to the point that on some days, three or four unique cyber-attacks were being reported. The analysis proceeds to utilise the UK as a case study to demonstrate how cyber-criminals leveraged salient events and governmental announcements to carefully craft and execute cyber-crime campaigns.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Healthcare Data Breaches: Insights and Implications

              The Internet of Medical Things, Smart Devices, Information Systems, and Cloud Services have led to a digital transformation of the healthcare industry. Digital healthcare services have paved the way for easier and more accessible treatment, thus making our lives far more comfortable. However, the present day healthcare industry has also become the main victim of external as well as internal attacks. Data breaches are not just a concern and complication for security experts; they also affect clients, stakeholders, organizations, and businesses. Though the data breaches are of different types, their impact is almost always the same. This study provides insights into the various categories of data breaches faced by different organizations. The main objective is to do an in-depth analysis of healthcare data breaches and draw inferences from them, thereby using the findings to improve healthcare data confidentiality. The study found that hacking/IT incidents are the most prevalent forms of attack behind healthcare data breaches, followed by unauthorized internal disclosures. The frequency of healthcare data breaches, magnitude of exposed records, and financial losses due to breached records are increasing rapidly. Data from the healthcare industry is regarded as being highly valuable. This has become a major lure for the misappropriation and pilferage of healthcare data. Addressing this anomaly, the present study employs the simple moving average method and the simple exponential soothing method of time series analysis to examine the trend of healthcare data breaches and their cost. Of the two methods, the simple moving average method provided more reliable forecasting results.
                Bookmark

                Author and article information

                Contributors
                Role: Academic Editor
                Role: Academic Editor
                Role: Academic Editor
                Role: Academic Editor
                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                26 April 2021
                May 2021
                : 21
                : 9
                : 3025
                Affiliations
                [1 ]Al-Khwarizmi Institute of Computer Science (KICS), University of Engineering & Technology (UET), Lahore 54890, Pakistan; ghazanfar.abbas@ 123456kics.edu.pk (S.G.A.); ghalib@ 123456kics.edu.pk (G.A.S.); ubaid.fayyaz@ 123456kics.edu.pk (U.U.F.); farrukh.shahzad@ 123456kics.edu.pk (F.S.)
                [2 ]Instituto de Telecomunicações, Universidade da Beira Interior, 6200-001 Covilhã, Portugal; ngarcia@ 123456di.ubi.pt
                [3 ]Computer Science Department, Polytechnic Institute of Viseu, 3504-510 Viseu, Portugal
                [4 ]UICISA: E Research Centre, School of Health, Polytechnic Institute of Viseu, 3504-510 Viseu, Portugal
                [5 ]Faculty of Computer Science and Engineering, University Ss Cyril and Methodius, 1000 Skopje, North Macedonia; eftim.zdravevski@ 123456finki.ukim.mk
                Author notes
                Author information
                https://orcid.org/0000-0001-9812-7488
                https://orcid.org/0000-0003-1835-5531
                https://orcid.org/0000-0002-3394-6762
                https://orcid.org/0000-0002-3195-3168
                https://orcid.org/0000-0001-7664-0168
                Article
                sensors-21-03025
                10.3390/s21093025
                8123414
                33925813
                af363807-220c-4a7e-9b9e-35427f225000
                © 2021 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( https://creativecommons.org/licenses/by/4.0/).

                History
                : 01 April 2021
                : 22 April 2021
                Categories
                Article

                Biomedical engineering
                internet of things (iot),iot healthcare systems,healthcare monitoring,machine learning,securing healthcare systems,iot healthcare dataset,iot traffic generator,iot flock,healthcare security,intrusion detection

                Comments

                Comment on this article