Journal Pre-Proof: Microprocessors and Microsystems
Journal Pre-Proof: Microprocessors and Microsystems
PII: S0141-9331(22)00159-4
DOI: https://doi.org/10.1016/j.micpro.2022.104622
Reference: MICPRO 104622
Please cite this article as: Sohail Saif , Priya Das , Suparna Biswas , Manju Khari ,
Vimal Shanmuganathan , HIIDS: Hybrid intelligent intrusion detection system empowered with
machine learning and metaheuristic algorithms for application in IoT based healthcare, Microproces-
sors and Microsystems (2022), doi: https://doi.org/10.1016/j.micpro.2022.104622
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition
of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of
record. This version will undergo additional copyediting, typesetting and review before it is published
in its final form, but we are providing this version to give early visibility of the article. Please note that,
during the production process, errors may be discovered which could affect the content, and all legal
disclaimers that apply to the journal pertain.
Abstract
This paper presents machine learning and metaheuristic algorithms based hybrid intelligent Intrusion Detection System
(HIIDS) for Internet of Things based applications such as healthcare. In IoT based smart healthcare, biomedical sensors
sense vital health parameters which are sent to the cloud server for storage and analysis. Health data saved as Electronic
Health Record (EHR) is privacy and security sensitive. This work focuses on the detection of security attacks on cloud
servers through anomaly based intrusion detection. Popular NSL-kDD dataset containing 41 features with 125,973
samples have been utilized for performance evaluation of proposed HIIDS.To reduce computation cost, metaheuristic
algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evaluation (DE) are
used for best feature selection and supervised learning algorithms such as Known Nearest Neighbor (kNN), Decision
Tree (DT) are used for accurate classification of normal and attack class based on selected features. Also a hybrid
approach has been presented for feature selection and classification. After dataset pre-processing using python,
MATLAB 2019b is used to implement six variants of proposed hybrid algorithms combining GA, PSO, DE with kNN,
DT. Performance evaluation has been done based on accuracy, execution time, memory usage and CPU utilization. GA-
DT variant gives highest accuracy of 99.88%, 86.40%, 95.39%, 96.90%, 100% of accuracy for DoS, U2R,R2L, Probe
and Normal class with the help of 8-10 features compared to other variants such as GA-kNN, PSO-kNN, PSO-DT, DE-
kNN, DE-DT. Also outperforms similar state-of-the-art works in terms of classification accuracy, simulation results are
given in support. Finally an IoT based healthcare architecture is designed using best performing hybrid GA-DT variant
based HIIDS to detect and prevent malicious traffic.
Keywords
Intrusion Detection System; Internet of Things; Genetic Algorithm; Decision Tree ; kNN; Healthcare;
1 Introduction
Internet of things plays a pivotal role in transforming almost all applications in smart ones whereas machine
learning adds intelligence to them for efficient data handling [1]. Several applications associated with daily human life
have been converted to smart applications redefining the quality of living such as smart healthcare, smart surveillance,
smart transportation, smart home, etc. Smart applications have layered architecture, the lowest one is the sensing layer to
acquire data, the next layer is the communication layer to transmit data to the processing layer which consists of several
2
processing elements such as local or cloud server. This also acts as a storage of raw or processed data and knowledge
extracted to be accessed by legitimate users. To handle big sensor data in IoT-based smart applications, the concern is
twofold mainly: i) Efficient data handling ensuring higher accuracy in analysis, knowledge building along with low
resource consumption-here machine learning and meta-heuristic algorithms have a significant role to play. ii) To detect
any security attack or threat on data being transmitted to cloud server through open wireless link-Intrusion detection
system (IDS) plays an important role. Traditional cryptographic techniques are computationally intensive hence not
suitable for resource-constrained sensors. Also cryptographic measures cannot protect the system from insider attacks. In
these kinds of attacks, sensor devices are compromised. Here Intrusion Detection System (IDS) plays a significant role.
This mechanism is widely used to monitor a network for the detection of malicious activities [2].
Heterogeneous data being transferred to the cloud server from different smart applications such as smart
healthcare, smart energy, smart traffic management or smart surveillance, etc., are equally likely to be compromised by
the possible security attacks. All application data are important and need to be protected. Specifically, in healthcare, any
unauthorized forgery causing any modification or alteration of health data may be fatal for human life hence to be
protected with utmost priority. Patient health vitals sensed using Medical Body Sensor Network (BSN) [3] and
transmitted to medical servers for processing and storage through the internet are vulnerable to security attacks and
threats as shown in Figure 1. Due to security attacks on communication channels or malware in the sensor devices, it can
lead to incorrect data collection by devices which can result in wrong diagnosis and treatment. So the security of health
data is of utmost concern which needs to be handled carefully. Recently, security attacks in healthcare have grown
exponentially [4]. Due to open and shared communication medium, data transmission is vulnerable to a range of attacks
such as interception, fabrication, modification, etc. For example, when data is sent through a public network,
unauthorized entities in the network can get access to those sensitive data of the patients. The absence of security
measures in these types of health monitoring systems may not only lead to breach of patients’ privacy but also may prove
to be life-threatening for the patient by allowing cybercriminals to put deceptive data or by altering actual data, which
can result in wrong diagnosis or treatment. Security requirements of Internet of things data (IoT-Data) stored in cloud
server are defined by confidentiality, integrity, authentication, and access control as described below:
Confidentiality: Due to the open nature of communication channels, eavesdropping by eavesdroppers while IoT in
transit data can lead to breach of confidentiality.
3
Authentication: It is important that access to application specific IoT-data should be given to authorized entities only.
For example, it could be very dangerous if intruders get access and alter the health data collected through health sensors.
So authentication factors are needed to prevent unwanted access from intruders.
Integrity: Integrity of IoT-data is of major concern in any application. This becomes of high importance in case of any
critical applications like healthcare where data correctness leads to an effective solution to be exerted.
Access Control: IoT applications may consist of several networks and groups of stakeholders working in different
sectors and hence IoT-data needs to be accessed by several entities. Only authentic entities should be given data access
permission according to their roles and responsibilities. For example, a doctor and a medical staff should not get the same
access role for the same patient data. A compromised entity in the system can steal important health data of a patient if a
proper access control mechanism is not present.
The main objective is to design a machine learning based Intrusion Detection System which can detect the insider attacks
in cloud server. For this purpose NSL-KDD dataset with selected features has been used to train the IDS model. Well-
known metaheuristic approaches have been employed to select the features for which the maximum accuracy can be
obtained.
1.1Motivation
IoT-based smart applications generate both way network traffic-from data acquisition unit to cloud server and
from the cloud server to authorized entities through the internet. For example, in IoT-based healthcare, all patient vitals
acquired through WBAN sensors are forwarded to a sink device which sends data to a medical cloud server from where
extracted knowledge, generated advice or alert are sent to patients, relatives, insurers, pharmacists, etc. Hence IDS is
essential to detect normal or malicious traffic so that malicious ones can be prevented from being saved into a cloud
server [5-7]. Malicious traffic may prove to be fatal in many smart applications and can be life-threatening in healthcare.
This motivates to design and implementation of intelligent IDS (HIIDS). Novel solutions are needed in this area to
provide better security with reduced computation cost and increased accuracy. This motivates us to generate a model
applying machine learning and meta-heuristics based techniques to detect normal and malicious traffic efficiently.
Widely acknowledged NSL-KDD [8] dataset which is basically traffic data has been considered for training, since the
attacks present in the dataset are familiar with the attacks found in cloud-based medical servers. Training dataset contains
41 features with 125,973 samples. This will require a lot of memory space and time for processing in classification
algorithms also irrelevant, redundant, and noisy features can affect the accuracy. Hence we need to reduce the number of
features by selecting the most appropriate ones.There could be nCd possibilities to make a reduced set of features, where n
is the number of features in the dataset and d is the number of features in the subset. So optimization techniques are
needed to identify most appropriate features. Features should be selected in an efficient way so that the features can
achieve maximum accuracy in the classification process with minimum cost. Meta Heuristic algorithms help for effective
feature selection.
1.2 Contribution
Followings are the major contributions of our work:
i) Various security threats in healthcare and proposed machine learning based framework for intrusion detection.
4
ii)Meta Heuristic algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Differential
Evaluation (DE) and Machine Learning algorithms [9] such as known Nearest Neighbor (kNN), Decision Tree (DT) have
been combined together to build six hybrid algorithms.
iii) Hybrid algorithms have been implemented using Matlab and performance in terms of accuracy has been evaluated.
iv) Maximum accuracy has been obtained with the reduced number of features applying the feature selection [10]
method.
v) Comparison of accuracy with state-of-the-art works has been conducted.
vi) Based on the results, best ML model with less number of features has been identified.
vii) Finally, architecture has been proposed for application in medical servers with the help of ML model.
By implementing their scheme they obtained 96.3% accuracy. Anthi et al. [24] developed Machine learning based
detection of probing and DoS attacks. They have used Wireshark to collect the traffic data and used that as a dataset.
Lastly, they applied several classification algorithms to obtain better detection rate. Diro et al. [25] described an attack
detection model for fog-to-things architecture. Authors used an open source dataset and applied swallow and deep neural
network to detect four kinds of attacks. During the comparative analysis of the experimental result, they observed that
deep neural network based model achieved 98.27% accuracy where the shallow neural network achieved 96.75%
accuracy. Angelo et al. [26] presented a network anomaly detection model using supervised machine learning. They used
batch relevance-based fuzzy-fied learning algorithm (U-BRAIN) in their scheme. Experimental results show that their
scheme performed well than other classification algorithms such as J48, SVP, Naive Bayes, and MLP. They used well-
known data set NSL-KDD and obtained 94.1% accuracy using U-BRAIN. Yang et al. [27] proposed an intrusion
detection model using Machine learning techniques based on the human-in-loop principle for IoT systems. Authors made
a combination of machine and human intelligence which can efficiently detect malicious devices in the network more
accurately. Li et al. [28] enhanced the performance of AI based two-layer intrusion detection system for IoT applications.
They used BAT algorithm with Swarm Division for feature selection. Liu et al.[29] used Fuzzy clustering and Principal
Component Analysis to build an efficient IDS. Authors used simulation to classify the data into low and high risk. Lopez
et al. [30] proposed a novel network based intrusion detection scheme for IoT systems. Their proposed scheme is based
on a Conditional Variational Autoencoder (CVAE) where they integrated malicious labels inside the decoder layer. That
proposed scheme also supports feature reconstruction which can be used in network monitoring systems. Quamar et al.
[31] presented an intrusion detection framework using self-taught deep learning method where an unsupervised feature
learning technique was applied to training data. They used NSL-KDD dataset for the performance evaluation of their
proposed model. Intruder Node Detection and Isolation Action scheme for Mobile Ad Hoc Network has been proposed
by Kavita et al. [32]. Feature optimization technique has been used applied here to choose the best features. PSO has
been used for this purpose, for classification between Trusted and Malicious nodes, Neural Network has been used.
Experimental results show that with feature optimization, packet delivery ratio can be increased, latency can be reduced
and energy consumption is less. Table.I show a comparative study based on various implementation strategies as
discussed earlier.
7
Authors, Year Implementation Strategy Detection Strategy Attacks Considered
permissions. Brute Force Attacks are performed through telnet to guess passwords. Imap is illegal access of user account
using vulnerabilities.FTP Write attack is another well-known attack on medical servers, where rhost file is created
anonymously to get local access.CGI script such as phf is enabled to execute arbitrary commands on a misconfigured
server.Rootkit is a malware attack, presence of this malware can give cyber criminals remote access to the server. Smurf
is a kind of Denial of Service(DoS) attack where the host is flooded with bogus ICMP echo packets. Neptune is also
flooding of SYN acknowledgments. Mis-fragmented UDP packets can lead to server crash or reboot, this is called
teardrop.
Here, methodologies have been designed for the selection of the most appropriate features applying Meta
heuristics, sample classification and statistical analysis. Three Meta heuristic algorithms, namely Genetic Algorithm
(GA), Particle Swarm Optimization (PSO), and Differential Evolution (DE) have been used. Two classifier kNN and
Decision Tree have been embedded in each algorithm for classification purpose. Finally, Six hybrid algorithms namely
GA-kNN, GA-DT, PSO-kNN, PSO-DT, DE-kNN, DE-DT have been implemented to perform comparative performance
analysis.
Several independent processes have been combined in this work. First, Dataset has been collected and observed
meticulously to find out the various features. Then Data preprocessing has been done on the dataset for data splitting and
normalization. Training dataset has been used in feature selection and classification algorithm.
16 num-root 37 dst-host-diff-src-port-rate
17 num-file-creations 38 dst-host-serror-rate
18 num-shells 39 dst-host-srv-serror-rate
19 num-access-files 40 dst-host-rerror-rate
20 num-outbound-cmds 41 dst-host-srv-rerror-rate
21 is-host-login
by randomly selected samples from Test dataset (Dtest) and multiplied by 100 to get percentage of accuracy. In a similar
way 20 subsets (Fset) is generated and their classification accuracy has been calculated. Out of those 20 subsets, the best
subset having maximum classification accuracy is considered as the best set of features. To improve the classification
accuracy we have conducted this experiment 200 times (iterations), thus a more appropriate set of features can be
achieved. We have also varied the number of features to be selected such as 8, 10, 15, 20, 25, 30 to generate the subset
(Fset). For better understanding, a flowchart has been given in Figure 1.
(1)
Algorithm 1 depicts the combination of GA with kNN and Decision Tree, algorithm 2 depicts the combination
of PSO with kNN and Decision Tree, algorithm 3 is the combination of DE with kNN and Decision Tree. Algorithm 4
and 5 are for kNN and Decision Tree respectively. Parameters used in these algorithms and their values are given in
Table V and Table VI.
Algorithm 1: GA-kNN or GA-DT
initialize the parameters N, Cn, Mn,En
mu = cr = 0
for i = 1 to N
11
for it = 1 to maxit
sort Nin dsc order
copy En from subm to Gennew
while (cr<Cn)
use rowlette wheel selection to select a pair of fset
generate two child fset and move to Gennew
cr = cr + 1
end while
while (mu <Mn)
select a random fsetfromGenp
finda random position(Rij) and replace with valid
featureindex
mu = mu + 1
end while
updated subm based on Genp
usefitckNN or fitcTree to evaluate the fitness
end for
return bestfset
end if
fitness = fitness + count
end for
return fitness
Parameters Description
N Number of feature set
Pe Elite probability
Pc Crossover probability
Pm Mutation probability
Cn Number of crossover ( )
Mn Number of mutation ( )
En Number of elite( )
Maxit Maximum number of iteration
W Inertia weight factor
c1 Cognitive parameter
c2 Social parameter
Pcr Crossover rate
F Scaling factor
n_test Number of rows in test dataset
n_train Number of rows in train dataset
Xi Rows in test dataset
Xj Rows in train dataset
31 experiments have been conducted where 6 hybrid algorithms have been executed with 8,10,15,20,25,30
number of features for each class as mentioned in Table III. Another experiment is executed with all (41) features
without applying any Meta heuristic approach. Experimental setup, parameter setting, and results have been described in
following the sections.
Fig.2. Performance comparison between kNN and Decision Fig.3 (a). Classification accuracy of DoS class using
Tree kNN and Meta Heuristic algorithms
Fig.3 (b). Classification accuracy of DoS class using Decision Fig.4 (a). Classification accuracy of U2R class using
Tree and Meta Heuristic algorithms kNN and Meta Heuristic algorithms
Fig.5 (b). Classification accuracy of R2L class using Decision Fig.6 (a). Classification accuracy of Probe class using
Tree and Meta Heuristic algorithms kNN and Meta Heuristic algorithms
Fig.6 (b). Classification accuracy of Probe class using Decision Fig.7 (a). Classification accuracy of Normal class
Tree and Meta Heuristic algorithms using kNN and Meta Heuristic algorithms
Figure 2 shows the comparison of accuracy obtained by kNN and GA with all features. Figure 3 (a) and 3 (b)
shows the classification accuracy obtained by the hybrid algorithms for DoS class usingkNN and Decision Tree. Figure 4
(a) and 4 (b) shows the accuracy of U2R class detection. Similarly, classification accuracy of R2L, Probe and Normal
class have been shown in Figure. 5(a), 5(b), 6(a), 6(b), 7(a), 7(b) respectively. Figure 8 shows the growth of fitness after
each generation. There we can see that accuracy has been increased significantly after 200 iterations. From Table VII we
can clearly see that GA-DT outperforms all other variants with 10 features for DoS, U2R, R2L, Probe class 8 features for
Normal Class. Comparison with similar state-of-art works in terms of accuracy has been provided in Table VIII and
18
Table IX shows the feature numbers selected by GA and classified by DT for which the highest accuracy has been
obtained.
Table X. Comparison of execution time, CPU usage and memory usage for all and reduced features
Fig.9 (a). Computation time for Decision Tree Fig.9 (b).Computation time for kNN
8 Conclusion
In this paper, an intelligent Intrusion Detection System (HIIDS) based on machine learning and meta-heuristic
algorithms is designed and implemented for application in IoT based healthcare system. Meta heuristic algorithms such
as GA, PSO, DE have been combined with Machine Learning algorithms such as kNN and Decision Tree using the
hybrid framework. This hybrid approach is used to obtain maximum accuracy using the minimum number of features.
This feature reduction process ensures reduced time and storage requirements thus making it suitable for time-critical
applications like healthcare. Experimental results show that GA-DT variant of hybrid approach has obtained 99.88%,
86.40%, 95.39%, 96.90%, 100% of accuracy for DoS, U2R,R2L, Probe and Normal class with the help of 8-10 features
thus outperforms similar state-of-the-art works in terms of classification accuracy. Hence Decision Tree based model is
more effective to identify similar kinds of traffic. We have explored the best features for each class based on the highest
classification accuracy obtained by GA-DT hybrid variant algorithm. So using those features, Decision Tree based ML
model has been built with the help of NSL-KDD training dataset. Finally to evaluate the model experiments have been
executed to record execution time, CPU usage and memory usage. Experimental results prove that this model can
classify attack and normal traffic in less time with high accuracy, also CPU usage and memory usage are relatively low
thus making it suitable for application in resource-constrained IoT based smart healthcare system.
Acknowledgement
This work has been carried out with partial support from the grant received from WBDST sanctioned research project on
secure remote healthcare with project sanction no. 230(Sanc)/ST/P/S&T/6G-14/2018.
Conflict of Interests: On behalf of all authors, the corresponding author states that there is no conflict of interest.
References
1. D. Thakur, S. Biswas, “Smartphone based human activity monitoring and recognition using ML and DL: a
comprehensive survey”, J Ambient Intell Human Comput, Springer, 2020.
2. Al-Obeidat, F., El-Alfy, E.M. Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies,
and protocols.PersUbiquitComput23, 777–791 (2019).https://doi.org/10.1007/s00779-017-1096-z.
21
3. S.Saif, S.Biswas, “ Secure data transmission beyond Tier 1 of medical body sensor network”, in proceedings of
International Ethical Hacking Conference (eHacon ) , Chapter no. 33, Chapter DOI: 10.1007/978-981-13-
1544-2_33, ISBN 978-981-13-1544-2, Springer, 2018.
4. M. Wazid, S. Zeadally, A.K. Das, V. Odely, Analysis of Security Protocols for Mobile Healthcare, Journal of
Medical Systems, Vol. 40,2016.
5. G Thamilarasu, A Odesile, A Hoang,An Intrusion Detection System for Internet of Medical Things.,IEEE
Access,8,181560-181576,2020
6. Saurabh Deya,Qiang Yea, Srinivas Sampallia,A machine learning based intrusion detection scheme for data
fusion in mobile clouds involving heterogeneous client networks,Information Fusion,49,205-215,2019
7. Jaber, A.N., Rehman, S.U. FCM–SVM based intrusion detection system for cloud computing environment.
Cluster Comput 23, 3221–3231,2020
8. M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,”
Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications
(CISDA), 2009.
9. M. H. Ali, M. Fadlizolkipi, A. Firdaus and N. Z. Khidzir, "A hybrid Particle swarm optimization -Extreme
Learning Machine approach for Intrusion Detection System," 2018 IEEE Student Conference on Research and
Development (SCOReD), Selangor, Malaysia,pp. 1-4,2018
10. Zhang, Ge, et al. Feature Selection for Microarray Data Classification Using Hybrid Information Gain and a
Modified Binary Krill Herd Algorithm,Interdisciplinary Sciences, Computational Life Sciences, 2020.
11. S.Saif,S.Biswas,Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network, Proceedings of
International Ethical Hacking Conference 2018,405-417,2019
12. S.Saif,R.Gupta,S.Biswas, Implementation of Cloud-Assisted Secure Data Transmission in WBAN for
Healthcare Monitoring,Advanced Computational and Communication Paradigms. Springer, Singapore,665-674,
2019.
13. S.Saif,,S.Biswas,On the Implementation and Performance Evaluation of Security Algorithms for
Healthcare,Proceedings of the 2nd International Conference on Communication Devices and Computing,629-
640, 2020
14. D. J. Brown, B. Suckow& T. Wang.A Survey of Intrusion Detection Systems.Technical report Department of
Computer Science, University of California, San Diego, 2002.
15. M.Bhatia, M.K. Rai, Identifying P2P traffic: A survey. Peer-to-Peer Netw. Appl. 10, pp.1182–1203,2017
16. P. Garc´ıa-Teodoro, J. D´ıaz-Verdejo, G. Macia-Fern ´ andez, and E. ´Vazquez, Anomaly-based network
intrusion detection: tech- ´niques, systems and challenges, Computers & Security, vol. 28, no. 1-2, pp. 18–28,
2009
17. A. Ukil, S. Bandyoapdhyay, C. Puri and A. Pal, "IoT Healthcare Analytics: The Importance of Anomaly
Detection," 2016 IEEE 30th International Conference on Advanced Information Networking and Applications
(AINA), Crans-Montana, pp. 994-997,2016.
18. F. A. Khan, N. A. H. Haldar, A. Ali, M. Iftikhar, T. A. Zia and A. Y. Zomaya, A Continuous Change Detection
Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments, IEEE Access,
vol. 5, pp. 13531-13544, 2017.
19. G.Thamilarasu, iDetect: an intelligent intrusion detection system for wireless body area networks, International
Journal of Security and Networks, Vol.11, pp. 82-93, 2016.
20. R. Mitchell, I.R. Chen, Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical
Cyber Physical Systems, IEEE Transactions on Dependable and Secure Computing, Vol.12, No.1, pp.16–
30,2015.
21. A.Christy,G.M. Gandhi,S. Vaithyasubramanian, Cluster based outlier detection algorithm for healthcare data,
Procedia Computer Science, Vol.50,pp.209-215,2015.
22. X. Liu, Y. Liu, A. Liu and L. T. Yang, Defending ON–OFF Attacks Using Light Probing Messages in Smart
Sensors for Industrial Communication Systems, IEEE Transactions on Industrial Informatics, Vol. 14, No. 9,
pp. 3801-3811, 2018.
23. M.O.Pahl , F.X. Aubet , All eyes on you: distributed multi-dimensional IoTmicroserviceanomalydetection, in:
Proceedings of the 2018 Fourteenth International Conference on Network and Service Management
(CNSM)(CNSM 2018), Rome, Italy,2018.
24. E.Anthi,L.Williams,P.Burnap,Pulse:an adaptive intrusion detection for the internet of things,Living in the
Internet of Things: Cybersecurity of the IoT - 2018, London, pp. 1-4, 2018.
25. A.A Diro, N.Chilamkurti, Distributed attack detection scheme using deep learning approach for Internet of
Things, Future Generation Computer Systems, Vol. 82,pp. 761-768,2018.
26. G.Angelo, F.Palmieri, M. Ficco, S.Rampone, An uncertainty-managing batch relevance-based approach to
network anomaly detection, Applied Soft Computing, Vol. 36,pp. 408-418,2015.
22
27. K.Yang,J.Ren,Y.Zhu,andW.Zhang,Active learning for wireless IoT intrusion detection, IEEE Wireless
CommunicationsMagazine,vol.25,no.6,pp.19–25,2018.
28. J. Li, Z. Zhao, R. Li, H. Zhang, AI-based two-stage intrusion detection for software definedIoT networks,
IEEEInternet of Tings Journal,vol.6,no.2,pp.2093–2102,2019.
29. L. Liu, B. Xu, X. Zhang, and X. Wu, An intrusion detection method for internet of things based on suppressed
fuzzy clustering, EURASIP Journal on Wireless Communications and Networking,vol.2018,no.1,2018.
30. M.L.Martin, B. Carro, A.S. Esguevillas, J. Lloret, Conditional VariationalAutoencoder for Prediction and
Feature Recovery Applied to Intrusion Detection in IoT. Sensors, Vol.17, 2017.
31. Q. Niyaz, W.Sun, A.Y. Javaid,M. Alam, Deep Learning Approach for Network Intrusion Detection System,
ACM 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New
York,2016.
32. T. Kavitha, K. Geetha, & R. Muthaiah, India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc
Networks Using Feature Optimization and Classification Approach. Journal of Medical System 43, 179, 2019.
33. HosseinJadidoleslamy, A hierarchical intrusion detection architecture for wireless sensor networks, International
Journal of Network Security & Its Applications, vol. 3, no. 5, p. 131, 2011.
34. M. S. I. Mamun, A. S. Kabir, “Hierarchical design based intrusion detection system for wireless ad hoc sensor
network,” International Journal of Network Security & Its Applications, vol.2, no. 3, pp. 102–117, 2010.
35. P. Kasinathan, C. Pastrone, M. A. Spirito, M. Vinkovits,Denial-of-service detection in 6LoWPAN based
internet ofthings, in Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile
Computing, Networking andCommunications (WiMob ’13), pp. 600–607, IEEE Computer,Lyon, France,
October 2013.
36. Krontiris, Z. Benenson, T. Giannetsos, F. C. Freiling, T. Dimitriou, “Cooperative intrusion detection in wireless
sensor networks,” in Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN
’09),Lecture Notes in Computer Science vol. 5432,pp. 263–278,2009
37. C. Wang, T. Feng, J. Kim, G. Wang,W. Zhang, Catching packet droppers and modifiers in wireless sensor
networks, in Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad
Hoc Communications and Networks, Rome, Italy, June 2009.
38. F. Bao, I. Chen, M. Chang, J. Cho, “Hierarchical trust management for wireless sensor networks and its
applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and Service
Management, vol. 9, no. 2, pp. 169–183,2012.
39. S. Khan and K.K. Loo, Real-time cross-layer design for a large scale food detection and attack trace-back
mechanism in IEEE 802.11 wireless mesh networks,” Network Security, vol. 2009, no.5, pp. 9–16, 2009.
40. D. E. Boubiche and A. Bilami, “Cross layer intrusion detection system for wireless sensor network,”
International Journal of Network Security & Its Applications, vol. 4, no. 2, p. 35, 2012.
41. Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks,” Wireless
Networks,vol. 9, no. 5, pp. 545–556, 2003.
42. Y. Zhang and W. Lee, “Intrusion detection in wireless adhoc networks,” in Proceedings of the 6th Annual
International Conference on Mobile Computing and Networking (MobiCom ’00), pp. 257–283, ACM, Boston,
Mass, USA, August 2000.
43. S. Shamshirband, A. Patel, N. B. Anuar, M. L. M. Kiah, A. Abraham, Cooperative game theoretic approach
usingfuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks, Engineering
Applications of Artifcial Intelligence, vol. 32, pp. 228–241, 2014.
44. A. Agah, S. K. Das, K. Basu, and M. Asadi, Intrusion detection in sensor networks: a non-cooperative game
approach,in Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications
(NCA ’04), pp. 343–346,IEEE Computer, Cambridge, Mass, USA, September 2004.
45. A.Abraham, C. Grosan,C. Martin-Vide, Evolutionary design of intrusion detection programs, International
Journal of Network Security, vol. 4, no. 3, pp. 328–339, 2007.
46. E. C. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in
Proceedings of the IEEE International Conference on Communications (ICC ’06), vol. 8, pp. 3383–3389, IEEE
Computer, Istanbul, Turkey,June 2006.
47. H. Deng, Q.A. Zeng, and D. P. Agrawal, SVM-based intrusion detection system for wireless ad hoc networks, in
Proceedings of the 2003 IEEE 58th Vehicular Technology Conference, VTC2003-Fall, vol. 3, pp. 2147–2151,
IEEE Computer, Orlando, Fla, USA,October 2003.
48. Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, A global hybrid intrusion detection system for wireless
sensor networks,Procedia Computer Science, vol. 52, pp. 1047–1052, 2015.
49. Abbas H, Latif R, Latif S, Masood A,Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT)
mechanism for distributed denial-of-service attack detection in health care systems,Annals of
Telecommunications,71,477-487,2016
23
50. A. Verner and D. Butvinik, "A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in
WBANs," 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun,
Mexico, pp. 161-169,2017.
51. Xuyang Hou, Jingjing Wang, Chunxiao Jiang, Sanghai Guanand Yong Reni,A sink node assisted lightweight
intrusion detection mechanism for WBAN,2018 IEEE International Conference on Communications (ICC),1-6,
2018.
52. I. Alrashdi, A. Alqazzaz, R. Alharthi, E. Aloufi, M. A. Zohdy and H. Ming, "FBAD: Fog-based Attack
Detection for IoT Healthcare in Smart Cities," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference (UEMCON), New York, NY, USA, pp. 0515-0522, 2019.
53. A. A. Hady, A. Ghubaish, T. Salman, D. Unal and R. Jain, "Intrusion Detection System for Healthcare Systems
Using Medical and Network Data: A Comparison Study," in IEEE Access, vol. 8, pp. 106576-106584, 2020
54. Q. Chen, J. Lambright and S. Abdelwahed, "Towards Autonomic Security Management of Healthcare
Information Systems," 2016 IEEE First International Conference on Connected Health: Applications, Systems
and Engineering Technologies (CHASE), Washington, DC, pp. 113-118,2016.
55. H. H. Pajouh, G. Dastghaibyfard, and S. Hashemi, Two-tier network anomaly detection model: a machine
learning approach, J. Intell. Inf. Syst., pp. 1–14, 2015.
56. E.Kim,S.Kim, A Novel Anomaly Detection System Based on HFR-MLR Method, Mobile Ubiquitous and
Intelligent Computing, Vol. 274, pp.279–286,2014.
57. A.N.Toosi,M.Kahani, A new approach to intrusion detection based on an evolutionary soft computing model
using neuro-fuzzy classifiers, Computer and Communications, Vol.30, No.10, pp.2201–2212,2007
58. J.Zhang, M.Zulkernine, Anomaly based network intrusion detection with unsupervised outlier detection, In
IEEE International Conference on Communications, ICC06,Vol. 5, pp. 2388–2393,2006.
59. M.R.Sabhnani,G.Serpen, Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset
within Misuse Detection Context, International Conference on Machine Learning: Models, Technologies, and
Applications, pp. 209–215, 2003.
60. S Manimurugan, Al-qdahMajdi, MustaffaMohmmed, C Narmatha, R Varatharajan, Intrusion detection in
networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system,
Microprocessors and Microsystems, Volume 79,103261,2020.
Sohail Saif is working as a Full Time Ph.D. Research Scholar at Maulana Abul Kalam Azad
University of Technology, West Bengal, India. He completed his B.Tech in Computer
Science and Engineering and M.Tech in Software Engineering from Maulana Abul Kalam
Azad University of Technology, WB in 2014 and 2018, respectively. His areas of research
interests are internet of things, network security and remote healthcare.
Priya Das
24
Priya Das worked as Research Scholar at Jadavpur University, Kolkata, India. She
completed her B.Tech in Information Technology and M.Tech in Computer Science &
Engineering from Government College of Engineering And Ceramic Technology and
Maulana Abul Kalam Azad University of Technology, WB in 2016 and 2018, respectively.
Her areas of research interests are soft computing, machine learning, network security and
IoT based healthcare.
Dr. Suparna Biswas is an Associate Professor and Head in the Department of Computer
Science and Engineering in Maulana Abul Kalam Azad University of Technology, India.
She completed her ME and Ph.D. from Jadavpur University, India. She had been an
ERASMUS MUNDUS Post Doctoral Research Fellow in cLINK project in Northumbria
University, Newcastle, UK during 2014 -15. She has authored a number of research papers
in reputed journals, conferences, book chapters of international repute. She is currently
25
executing two funded research projects on IoT based remote healthcare in the capacity of
principal and co-principal investigator. She has been lead editor in edited volumes of reputed
publishers such as springer, general chair, session chair in International conferences,
resource person at International Conference, webinars, workshop, FDP etc. She is a member
of IEEE and IAENG. Her areas of research interests include wireless networks, IoT,
security, healthcare.
Declaration of interests
☒ The authors declare that they have no known competing financial interests or personal relationships that
could have appeared to influence the work reported in this paper.
☐The authors declare the following financial interests/personal relationships which may be considered as
potential competing interests: