CYBERSECURITY IN SMART HEALTHCARE: A MACHINE LEARNING APPROACH

Authors

  • Iwan Handoyo Putro UK Petra

DOI:

https://doi.org/10.9744/jte.18.1.40-45

Keywords:

Healthcare IoT, machine learning, cybersecurity, threat detection

Abstract

The adoption of Internet of Things (IoT) technologies in medical devices has greatly enhanced healthcare capabilities. This enables continuous patient monitoring, real-time diagnostics, and remote care. However, this connectivity also introduces significant cybersecurity threats that can compromise patient safety and system integrity. This paper presents a machine learning-based framework for detecting threats in IoT-enabled medical devices. This study utilizing the WUSTL-EHMS-2020 dataset that taking a collection of network traffic from real-world healthcare IoT systems. A comparative evaluation of multiple classifiers was conducted to assess detection effectiveness and computational efficiency. In terms of accuracy value, the Decision Tree (DT) achieves highest value of 0.97. The Random Forest (RF) model demonstrated more optimum performance across metrics with accuracy at 0.94, precision of 0.95, recall of 0.56, and F1-score of 0.70. Meanwhile, XGBoost (XGB) achieved the highest Area Under the Curve (AUC) score at 0.95, indicating strong overall classification performance. Conversely, Gaussian Naive Bayes (GNB) exhibited the weakest results, with an accuracy of 0.86, F1-score of 0.46, and the lowest AUC score of 0.73. Notably, K-Nearest Neighbors (KNN) achieved the fastest training time of just 0.001 seconds, offering a preferable option for deployment in time-sensitive environments. These results highlight the trade-offs between accuracy, speed, and robustness in machine learning-based intrusion detection systems. This study underscores the potential of intelligent threat detection models in strengthening the security of modern medical IoT infrastructures, all while balancing computational constraints.

References

[1] M. A. Ferrag, L. Maglaras, and A. Derhab, “Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study,” Journal of Information Security and Applications, vol. 50, p. 102419, 2020.

[2] B. Al-Shargabi and S. Abuarqoub, ‘IoT-Enabled Healthcare: Benefits, Issues and Challenges‏’, in Proceedings of the 4th International Conference on Future Networks and Distributed Systems, 2020, pp. 1–5.

[3] S. M. Karunarathne, N. Saxena and M. K. Khan, "Security and Privacy in IoT Smart Healthcare," in IEEE Internet Computing, vol. 25, no. 4, pp. 37-48, 1 July-Aug. 2021, doi: 10.1109/MIC.2021.3051675.

[4] K. A. Da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. De Albuquerque, ‘Internet of Things: A survey on machine learning-based intrusion detection approaches’, Computer Networks, vol. 151, pp. 147–157, 2019.

[5] S. Goyal, N. Sharma, B. Bhushan, A. Shankar, and M. Sagayam, ‘IoT enabled technology in secured healthcare: Applications, challenges and future directions’, in Cognitive internet of medical things for smart healthcare: services and applications, Cham: Springer International Publishing, 2020, pp. 25–48.

[6] A. Al-Garadi et al., “A survey of machine and deep learning methods for Internet of Things (IoT) security,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646–1685, 2020.

[7] A. Aldahiri, B. Alrashed, and W. Hussain, ‘Trends in using IoT with machine learning in health prediction system’, Forecasting, vol. 3, no. 1, pp. 181–206, Mar. 2021.

[8] G. Zachos, I. Essop, G. Mantas, K. Porfyrakis, J. C. Ribeiro, and J. Rodriguez, ‘An anomaly-based intrusion detection system for Internet of Medical Things networks’, Electronics (Basel), vol. 10, no. 21, p. 2562, Oct. 2021.

[9] M. Tabassum, S. Mahmood, A. Bukhari, B. Alshemaimri, A. Daud, and F. Khalique, ‘Anomaly-based threat detection in smart health using machine learning’, BMC Medical Informatics and Decision Making, vol. 24, no. 1, 2024.

[10] B. R. Kikissagbe and M. Adda, "Machine learning-based intrusion detection methods in IoT systems: A comprehensive review," Electronics, vol. 13, no. 18, p. 3601, 2024. [Online]. Available: https://doi.org/10.3390/electronics13183601

[11] M. Alalhareth and S.-C. Hong, ‘Enhancing the Internet of Medical Things (IoMT) security with meta-learning: A performance-driven approach for ensemble intrusion detection systems’, Sensors (Basel), vol. 24, no. 11, p. 3519, May 2024.

[12] A. Chatterjee and B. S. Ahmed, "IoT anomaly detection methods and applications: A survey," Internet of Things, vol. 13, pp. 100-116, 2022. [Online]. Available: https://doi.org/10.1016/j.iot.2021.100116

[13] A. Shahrani, A. M. Rizwan, A. Sánchez-Chero, M. Rosas-Prado, C. E. Salazar, and E. B. Awad, ‘An internet of things (IoT)-based optimization to enhance security in healthcare applications’, Mathematical Problems in Engineering, vol. 2022, no. 1, 2022.

[14] M. Kumar, S. K. Singh, and S. Kim, ‘Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare’, Future Generation Computer Systems, vol. 166, 2025.

[15] Z. ElSayed, N. Elsayed, and S. Bay, ‘A novel zero-trust machine learning green architecture for healthcare IoT cybersecurity: Review, analysis, and implementation’, in SoutheastCon 2024, Atlanta, GA, USA, 2024, pp. 686–692.

[16] S. Al-Juboori and S. Jimoh., ‘Cyber-securing medical devices using machine learning: A case study of pacemaker’, Journal of Informatics and Web Engineering, vol. 3, no. 3, pp. 271–289, Oct. 2024.

[17] M. Elhoseny et al., ‘Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions’, Sustainability, vol. 13, no. 21, 2021.

[18] E. Gelenbe, M. Nakıp, and M. Siavvas, "DISFIDA: Distributed self-supervised federated intrusion detection algorithm with online learning for health Internet of Things and Internet of Vehicles," Internet of Things, vol. 15, p. 100-115, 2024. [Online]. Available: https://doi.org/10.1016/j.iot.2024.100115

[19] R. Jain, WUSTL EHMS 2020 Dataset for Internet of Medical Things (IoMT) Cybersecurity Research, https://www.cse.wustl.edu/~jain/ehms/index.html

(accessed Jan.7, 2025).

Downloads

Published

2025-03-24

Issue

Section

Articles