Main Article Content

Abstract

The growing integration of Internet of Things (IoT) devices in healthcare has revolutionized patient care and operational efficiency. However, this advancement comes with vast cybersecurity demanding situations, as IoT devices are exceedingly susceptible to diverse cyber-attacks, which include statistics breaches, denial-of-provider (DoS) attacks, and unauthorized get right of entry to. This look at proposes a robust cyber-assault detection machine through leveraging Random Forest (RF) and Long Short-Term Memory (LSTM) algorithms, which integrate static sample popularity with sequential facts analysis. RF is utilized for its performance in coping with dependent statistics, along with network visitors and tool logs, at the same time as LSTM excels in analyzing time-collection facts, allowing the detection of evolving threats. The proposed hybrid RF-LSTM version became evaluated using real-global IoT healthcare datasets. RF established high accuracy in detecting static anomalies, accomplishing an accuracy of ninety four% and a precision of ninety three%. LSTM excelled in coping with temporal dependencies, reaching an F1 score of 91% and minimizing fake negatives. The integration of both algorithms more desirable the gadget's capability to stumble on a huge variety of attacks, reaching an common detection accuracy of ninety seven% in real-time scenarios. This research highlights the capability of hybrid fashions in ensuring IoT safety and mitigating cyber threats in healthcare environments, making sure patient protection and information integrity.

Keywords

Cybersecurity Cyber-Attack Detection Encryption Healthcare Internet of Things (IoT) Random Forest (RF)

Article Details

How to Cite
[1]
A. Hammad, “Random Forest and LSTM Hybrid Model for Detecting DDoS Attacks in Healthcare IoT Networks”, Cybersys. J, vol. 1, no. 2, pp. 1–8, Dec. 2024, doi: 10.57238/csj.0kdtzj06.

How to Cite

[1]
A. Hammad, “Random Forest and LSTM Hybrid Model for Detecting DDoS Attacks in Healthcare IoT Networks”, Cybersys. J, vol. 1, no. 2, pp. 1–8, Dec. 2024, doi: 10.57238/csj.0kdtzj06.

References

  1. H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, "A survey on internet of things security: Requirements, challenges, and solutions," Internet of Things, vol. 14, p. 100129, 2021, doi: https://doi.org/10.1016/j.iot.2019.100129
  2. A. Boukerche and R. Coutinho, "Design Guidelines for Machine Learning-based Cybersecurity in Internet of Things," IEEE Network, vol. 35, pp. 393-399, 2020, doi: http://dx.doi.org/10.1109/MNET.011.2000396
  3. F. Wu, C. Qiu, T. Wu, and M. R. Yuce, "Edge-based hybrid system implementation for long-range safety and healthcare IoT applications," IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9970-9980, 2021, doi: https://doi.org/10.1109/JIOT.2021.3050445
  4. M. Waqas et al., "Botnet attack detection in Internet of Things devices over cloud environment via machine learning," Concurrency and Computation: Practice and Experience, vol. 34, no. 4, p. e6662, 2022, doi: https://doi.org/10.1002/cpe.6662
  5. K. Prathapchandran and T. Janani, "A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST," Computer Networks, vol. 198, p. 108413, 2021, doi: https://doi.org/10.1016/j.comnet.2021.108413
  6. X. Wang, T. Liu, C. Feng, D. Fang, and X. Chen, "RF-CM: Cross-modal framework for rf-enabled few-shot human activity recognition," Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 7, no. 1, pp. 1-28, 2023, doi: https://doi.org/10.1145/3580859
  7. Y. Zhang et al., "Efficient and intelligent attack detection in software defined IoT networks," in 2020 IEEE International Conference on Embedded Software and Systems (ICESS), Shanghai, China, 2020: IEEE, pp. 1-9, doi: https://doi.org/10.1109/ICESS49830.2020.9301591
  8. S. Djaballah, L. Saidi, K. Meftah, A. Hechifa, M. Bajaj, and I. Zaitsev, "A hybrid LSTM random forest model with grey wolf optimization for enhanced detection of multiple bearing faults," Scientific Reports, vol. 14, p. 23997, 2024, doi: https://doi.org/10.1038/s41598-024-75174-x
  9. C. U. Om Kumar, J. Durairaj, S. A. Ahamed Ali, Y. Justindhas, and S. Marappan, "Effective intrusion detection system for IoT using optimized capsule auto encoder model," Concurrency and Computation: Practice and Experience, vol. 34, no. 13, p. e6918, 2022, doi: https://doi.org/10.1002/cpe.6918
  10. W. Li, S. Vishwakarma, C. Tang, K. Woodbridge, R. J. Piechocki, and K. Chetty, "Using RF transmissions from IoT devices for occupancy detection and activity recognition," IEEE Sensors Journal, vol. 22, no. 3, pp. 2484-2495, 2021, doi: https://doi.org/10.1109/JSEN.2021.3134895
  11. A. K. Kalusivalingam, A. Sharma, N. Patel, and V. Singh, "Employing Random Forests and Long Short-Term Memory Networks for Enhanced Predictive Modeling of Disease Progression," International Journal of AI and ML, vol. 2, no. 3, 2021
  12. B. Barnes-Cook and T. O'Shea, "Scalable wireless anomaly detection with generative-LSTMs on RF post-detection metadata," in 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 2022: IEEE, pp. 483-488, doi: https://doi.org/10.1109/WCNC51071.2022.9771754
  13. N. Varshney, P. Madan, A. Shrivastava, A. P. Srivastava, C. P. KUMAR, and K. Khan, "Real-Time Anomaly Detection in IoT Healthcare Devices With LSTM," in 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), Raipur, India, 2023, vol. 1: IEEE, pp. 1-6, doi: https://doi.org/10.1109/ICAIIHI57871.2023.10489823
  14. I. A. Kandhro et al., "Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures," IEEE Access, vol. 11, pp. 9136-9148, 2023, doi: https://doi.org/10.1109/ACCESS.2023.3238664
  15. F. Sattari, A. H. Farooqi, Z. Qadir, B. Raza, H. Nazari, and M. Almutiry, "A hybrid deep learning approach for bottleneck detection in IoT," IEEE Access, vol. 10, pp. 77039-77053, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3188635
  16. M. K. Saeed, A. Al Mazroa, B. M. Alghamdi, F. S. Alallah, A. Alshareef, and A. Mahmud, "Predictive analytics of complex healthcare systems using deep learning based disease diagnosis model," Scientific Reports, vol. 14, p. 27497, 2024, doi: https://doi.org/10.1038/s41598-024-78015-z
  17. M. Al Razib, D. Javeed, M. T. Khan, R. Alkanhel, and M. S. A. Muthanna, "Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework," IEEE Access, vol. 10, pp. 53015-53026, 2022, doi: https://doi.org/10.1109/ACCESS.2022.3172304
  18. N. Sun et al., "Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives," IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1748-1774, 2023, doi: https://doi.org/10.1109/COMST.2023.3273282
  19. S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, "Comparative evaluation of ai-based techniques for zero-day attacks detection," Electronics, vol. 11, no. 23, p. 3934, 2022, doi: https://doi.org/10.3390/electronics11233934
  20. W. Ding and H. Sun, "Prediction of PM2. 5 concentration based on the weighted RF-LSTM model," Earth Science Informatics, vol. 16, pp. 3023-3037, 2023, doi: https://doi.org/10.1007/s12145-023-01111-7
  21. M. Almehdhar et al., "Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks," IEEE Open Journal of Vehicular Technology, vol. 5, pp. 869-906, 2024, doi: https://doi.org/10.1109/OJVT.2024.3422253
  22. F. Zahra, N. Jhanjhi, N. Khan, S. N. Brohi, M. Masud, and S. Aljahdali, "Protocol-specific and sensor network-inherited attack detection in IoT using machine learning," Applied Sciences, vol. 12, no. 22, p. 11598, 2022, doi: https://doi.org/10.3390/app122211598