An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications
Abstract
:1. Introduction
Our Contributions
- 1.
- The different generations of networks of the healthcare system have been discussed in the paper. To propose a new security model for healthcare and analysis of previous models are the key points of the article.
- 2.
- 5G-IoT plays a major role in providing the fast network to conduct various operations in the field of healthcare applications where sensitive data is stored at a remote location, thus layers of 5G-IoT are vulnerable to attacks. A variety of different types of attacks along with some of the possible solutions are proposed.
- 3.
- Among various security threats to the 5G-IoT Healthcare, malware is the most prominent. The creation of millions of malware files destroys the fields related to healthcare, the Internet of Things, social media, banking, intelligent transportation, smart homes, etc. It becomes crucial to detect this attack, which is done with deep learning.
- 4.
- A deep learning CNN model is proposed for the malware detection (CNN-DMA) in an image whose input is in the binary form which is converted into grayscale and then among 25 families of one malware attack is detected with an accuracy of 99%.
2. Generations and Challenges of Healthcare Systems
- Healthcare 1.0: It is a traditional method of healthcare. It was initiated in the 1990s, where patients suffering from any illness go to the clinical center to meet with the doctor for treatment. Then, the doctor will diagnose the patient based on a generated report after testing the patient, where the medical history of the patient is kept paper. A doctor’s medical knowledge can be judged by his/her diagnoses and what is given to the patients.
- Healthcare 2.0: The next version is Healthcare 2.0 of the 2000s where all doctors, patients, caregivers collaborate, where the medical history involves social networking in which each patient can participate. The best part of this is that patient is involved in their own healthcare decision. This also includes the data analytics between the patient and the physician as the patient can share his/her electronic health records (EHRs) with the doctor and medical researchers. It is easily affordable for the patients and provides quality care.
- Healthcare 3.0: The current healthcare system, in which organization of EHRs is conducted for the creation of an Open System so that healthcare facilities can be easily accessed by all. The use of virtual tools in such a way made interaction between doctors and patients much better. In Healthcare 3.0, two technologies play a vital role: information and communication. The motive behind this particular vision is that the experience and capabilities of doctors must be utilized and the administrative burden should be lessened [10].
- Healthcare 4.0: It is the next future version of healthcare introducing augmented and virtual reality. EHR repositories are being used to share the patient’s health information among the doctors anytime and anywhere. The best part of this version of the healthcare system is that the patient’s health records are being shared among different doctors so that the best medication, diagnosis, and treatment can be given to a patient. However, there are problems with data sharing as it affects data security, authenticity and authorization of data, secure communication, etc. This system also supports health assistance through applications and websites.
2.1. Challenges of Healthcare
- Non-Patient-Centered: It is not good for those patients who have some significant illness such a case when a patient needs to go to a doctor but he/she is not in a position to go as he is prescribed to take some rest. At the same time, a supervisor of a patient needs to schedule an appointment in their busy day-to-day life before visiting a doctor.
- Non-customized: A doctor’s prescription for an individual patient is not based upon the type of problem he/she is suffering from but based on the population average that might not fit for the patient. These days treatment for any individual illness or disease is costly and non-affordable for lower and middle-class people.
- Non-accessible: Disabled patients who cannot visit the hospital alone cannot use some facilities, and thus these facilities may only be utilized by few groups of patients. That is why limited access to basic facilities is a risk to many patients.
- Huge Connectivity: IoT is a connection of billions of different devices together in the network to produce required information, and it is important to give guaranteed connectivity and high mobility to the devices connected in healthcare like fast ambulance facilities and immediate emergency treatment to the patient.
- Power and Cost: In IoT, large number of devices and sensors are connected incurring a high cost. Operating a large number of devices and sensors consumes a large amount of power, so in healthcare achieving low power and low cost despite having many connections is a big challenge.
- Security and Privacy: Both of these parameters are important in every field like smart home, smart transportation, healthcare, and more. Various heterogeneous devices are connected in IoT, therefore security is a major concern. Sometimes the IoT architecture lacks private communication, data integrity, and authenticity, making the healthcare domain more vulnerable to attacks [12]. The use of IoT in communication between healthcare devices and the cloud must be secure to make people more confident in e-health services. However, less risk should be there to prevent the system from new attacks [13].
2.2. 5G-IoT for Healthcare: Applications
- Data Communication and Storage: Data must be encrypted for strong communication between the patient and healthcare provider so that intruders cannot intrude into the network.
- Policy Guidelines: Whatever technology is being used policy guidelines should be prior declared, e.g., restricting user access must be informed before the policy violation and management of wireless network interface should be under policy guidelines.
- App Installation: This involves trusted entities that would make sure the applications we are installing are trustworthy by verifying them with the digital signature [23].
- Encrypted Data: The mHealth data must be stored and the packets transmitted must be in an encrypted manner. Encryption is mandatory all the time except for when data are urgently needed [25]. As it is an application, the organization who owns the particular app can be given access to decrypt the data.
- Confidentiality: It must be maintained so that the unauthorized user cannot access the patient’s sensitive health data; only the authorized user can have access, read, modify the patient’s data [26]
- Authorization: Only the authorized user has the right to access the private health data of a patient [27].
2.3. Security Issues of 5G-IoT Healthcare
- Large connectivity of 5G network: The large-scale connectivity of the 5G network leads to distributed denial-of-service (DDOS) attacks. 5G technology supports huge connectivity, i.e., 1 million connections/km and hence vulnerable to attacks that launch huge traffic at the same time and affects the network capability.
- Low latency and high bandwidth: These characteristics can put the security at stake which may increase the difficulty of security protection, cryptography (encryption and decryption), content identification. 5G’s ultra-reliable low latency feature required the strong need for network security, malicious traffic attack prevention, ability to encrypt and decrypt transmitted data that automatically increases the need for network security.
- D2D and edge cloud communication: Introduction of both these changed the original architecture and modes of communication [34] that has more impact on content security as compared to the centralized server. It makes the centralized monitoring system ineffective. Therefore, it made traffic security difficult in edge cloud service and D2D communication.
- The risk to patients’ private health records and theft of medical data needs to be monitored on the large scale: There exist wide applications of 5G as discussed above which involve the patient’s information and it is required to be private such as EHRs, laboratory data, and medical-related images. The leakage of sensitive health records of any patient will automatically lead to one of the threats to healthcare.
- Attacks on the 5G healthcare network: 5G healthcare applications, including remote surgery and emergency treatment, lead to the requirement of reliability and security to avoid transmission delay in the 5G network. In case of the security attacks on the infrastructure of the applications lead to a serious impact on the patient’s health and even the death of the patient.
- Malicious attacks on the records: Various capabilities of 5G made the collection of medical data possible on a large scale, from different sources as well. Therefore, the collected data can be used to detect and outline public health-related events, i.e., unknown diseases in a punctual manner and epidemics. Due to the collection of huge data in one place, data manipulations in medical records are possible by the attacker which leads to distortion, sometimes resulting in failure of the emergency response mechanisms. Note here that the threats discussed above can be from both external and internal networks.
3. Security Issues in Healthcare
- Confidentiality: Protecting confidential data is the major issue. In healthcare systems, WBAN nodes are considered important as they contain the private information of patients therefore protection of data is a must and must be protected from unauthorized access. At the time of transmission, vulnerable data is a huge overhead that damages the network and the patient’s trust. The best solution to this is the use of encryption between WBAN and the coordinators [40].
- Integrity: To protect any packet’s content and its accuracy, its integrity must be maintained. The problem of external modification is not solved by data confidentiality as modifications are easily being done when integrating message fragments, changes made in data within the packet, and even at the time of sending message fragments. In the healthcare system, it is a big issue as modifications in patients’ health-related status that can even lead to death in some cases.
- Authentication: Whether it is a healthcare system or any other field or application data authentication is a must requirement. Therefore, the nodes having information and part of wireless body area networks must be knowing which is trustworthy and which is not.
3.1. Attacks on 5G-IoT Healthcare Layers
- 1.
- Physical Layer: This is the physical layer having sensors, actuators, controllers, and devices that are used for communication with the next layer. To reduce power consumption and increase computation power, some small devices like Nano-chips are being used which produce huge processed data [43]. There are different types of e-health sensors which means the connection of the biosensors and IoT enabled healthcare such as clinical diagnostics, cardiac activity monitoring, sleep monitoring, woman health monitoring, infant monitoring, continuous glucose monitoring, fitness tracking, etc.
- 2.
- Network-Virtual Layer: Works on the principle of LoRAWAN have low power, and works on the central server have high communication and connectivity. IoT system’s efficiency can be increased from the heterogeneous devices used that communicate with each other. To improve the D2D communication 5G is the technology that is being used to provide better connectivity for Machine type communications.
- 3.
- Transport-Service Layer: Information is being transferred from the following layer as this is the heart of the architecture. Without this, no network can communicate properly.
- 4.
- Application Layer: The application layer uses network integration of all devices and sensors. As the name suggests containing all the IoT smart applications like smart cities, smart industries, smart homes, etc.Low latency must be provided as it should be considered important because it is the transmission time to transmit the information in the packets between sensors and processing unit by speeding the transmission up.
- Signal insertion attacks: To degrade the services, the quality of connections is affected and attacked by feeding damaging signals inside the network.
- Signal splitting attacks: It refers to breaking of the communication and getting rid of the signal in a network so that attacks like eavesdropping could happen where an intruder can get access or listen to a conversation secretly or signal can degrade.
- Spoofing attack: In the existing network, an intruder can intrude with the help of a copy of each packet that affects confidentiality and privacy, which is a must in a healthcare system [44]. In a sensor spoofing attack, the physical environment is altered in a way that means the medical system cannot work properly [45]. In [46], a sensor spoofing attack against the infrared drop (ID) sensor was introduced in an infusion pump.
- Single component attack: This attack can take place by damaging a switch or breaks down fiber by cutting or any other means which lead to component failure. As in the case of wireless telesurgery, attackers can attack the healthcare network system while operating robotic surgery which can be harmful to the patient’s life.
- Distributed Denial of Service: It enables the victim to use the resources and affects network connectivity by flooding of messages. In the case of healthcare, an attacker can interrupt the patient’s side while obtaining the information online.
- SQL Injections: It is a structured query language through which attackers can hack the database and personal information can be stolen. For example, the patient’s database containing health-related information is maintained so that it can be attacked by the attacker for obtaining that patient’s information.
- Cross-site scripting: An attack in which malicious code is attached to the victim’s browser resulting in stealing passwords, cookies, etc. [2]. This attack can be more dangerous at the time of payment where account details including passwords can be fetched by the patient.
- Routing attacks: The attacker modifies the route of packet transmission from sender to the receiver so that the packet cannot travel from source to destination.
- Message disclosure: In this attack, the patient’s log files access rights are breached and sensitive information is stolen by an attacker.
- Message modification: A message traveling from a patient to a doctor is modified by an attacker which can harm the patients because of the wrong treatment based on the wrong diagnosis from the alterations made by the intruder.
- Eavesdropping: Through an open smart healthcare system, the intruder listens to all the sensitive information provided [47].
- Replaying attack: After eavesdropping, modified information is forwarded by the intruder. The survey in [48] introduced One-touch Ping insulin pumps and blood glucose meters that allow attackers to record the transmission and replay them later that do not use any timestamp.
- Compromised node attack: In this type of attack, the attacker injects false data by attacking a particular node.
- Denial of service (DoS) attack: This attack involves the flooding of so many requests at the same time to a server generates so much traffic so that server cannot be able to respond to the particular request [49].
- Black and gray hole attack: A network is affected by putting an infected node that changes the entries in a routing table containing information of all of its neighboring nodes and the information is being sent to the compromised node. Both Blackhole and Gray hole attacks can be differentiated, as gray hole attacks reply with some data that is non critical to its neighboring nodes whereas black hole attacks do not reply.
- Sybil attack: These attacks modify the entries in a routing table by using an infected sensor that impersonates multiple sensors.
- Social engineering: This type of attack exploits the user in such a way that they share their personal information with the attacker which would benefit the attacker [50].
- Traffic analysis: In this type of attack, intruders just want the information from the characteristics such as locations of both sender and receiver intruder observes and no manipulation of data takes place [44]. All the possible attacks on healthcare systems are being discussed above.
3.2. Malware Attack
4. Deep Learning in Secure Healthcare
4.1. Types of Deep Learning Handling the Attacks in Healthcare
4.2. Deep Learning’s Convolutional Neural Network Classifier in Secure Healthcare for Detection of Malware (CNN-DMA)
- Pooling Layer: The addition of a pooling layer between the CNN and after the convolution layer takes place. Reduction of dimensionality to achieve low computation and less number of parameters is the main goal of this layer. The most important pooling is max pooling. It is used to pick up the maximum value in each window.
- Fully Connected Layer: The last layer after convolutional and pooling is the Fully Connected Layer to classify input images. In a fully connected layer, having neurons that are connected to the previous layer activation functions. The following section will work upon how artificial neural networks or deep learning classifier convolutional neural networks for detecting malware attacks as the network 5G, IoT, healthcare domain is vulnerable to many attacks. Along with the detection of malware, it will also provide the security of information to detect and classify malicious code.Though every organization contains personal information or data and that information or data both are vulnerable to so many attacks as in the healthcare field patients’ life will be at stake. As a result, many attackers or criminals gain new techniques every time to attack the target. Many ways are being used by the security vendors to defend against these types of attacks but are unable to because of the billions of malware discovered on the monthly basis, and it is impossible to achieve that. Therefore, approaches like deep learning are a must to provide security and privacy. The architecture of CNN is shown in Figure 5 where the input will be an image of size 32*32*1 fed to the convolutional layer 1 then to the rectified linear unit
5. Results and Analysis
5.1. Malware Detection and Family Classification
5.2. Steps to Load Data
5.3. Feature Extraction
5.4. Analysis and Discussion
Performance Metrics
- Accuracy: “The number of correct predictions over total number of True Positive predictions by the model is known as accuracy”,where TP = True positive class prediction, TN = True Negative class prediction, FP = False positive class prediction, FN = False negative class prediction.
- Recall: “Number of true predictions over an actual number of true predictions made by the model is known as recall”.
- Precision:“The actual true predictions over total true predictions made by the model known as precision”.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Adebusola, J.A.; Ariyo, A.A.; Elisha, O.A.; Olubunmi, A.M.; Julius, O.O. An Overview of 5G Technology. In Proceedings of the ternational Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), Akaslompolo, Finland, 18 March 2020; pp. 1–4. [Google Scholar]
- Hossain, M.S.; Muhammad, G. Deep Learning Based Pathology Detection for Smart Connected Healthcares. IEEE Netw. 2020, 34, 120–125. [Google Scholar] [CrossRef]
- Latif, S.; Qadir, J.; Farooq, S.; Imran, M.A. How 5g wireless (and concomitant technologies) will revolutionize healthcare? Future Internet 2017, 9, 93. [Google Scholar] [CrossRef] [Green Version]
- Marescaux, J.; Leroy, J.; Rubino, F.; Smith, M.; Vix, M.; Simone, M.; Mutter, D. Transcontinental robot-assisted remote telesurgery: Feasibility and potential applications. Ann. Surg. 2002, 235, 487. [Google Scholar] [CrossRef] [PubMed]
- Tuli, S.; Wander, G.; Wander, P.; Gill, S.S.; Dustdar, S.; Sakellariou, R.; Rana, O. Next generation technologies for smart healthcare: Challenges, vision, model, trends and future directions. Internet Technol. Lett. 2020, 3, e145. [Google Scholar] [CrossRef] [Green Version]
- Shakeel, P.M.; Baskar, S.; Dhulipala, V.S.; Mishra, S.; Jaber, M.M. Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 2018, 42, 1–10. [Google Scholar]
- Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
- Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Newton, MA, USA, 2015. [Google Scholar]
- Chen, X.W.; Lin, X. Big data deep learning: Challenges and perspectives. IEEE Access 2014, 2, 514–525. [Google Scholar] [CrossRef]
- Tanwar, S. Fog Computing for Healthcare 4.0 Environments; Springer Nature Switzerland AG: Basingstoke, UK, 2020. [Google Scholar]
- Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the Internet of Things: Communication technologies and challenges. IEEE Access 2017, 6, 3619–3647. [Google Scholar] [CrossRef]
- Wang, H.; Fapojuwo, A.O. A survey of enabling technologies of low power and long range machine-to-machine communications. IEEE Commun. Surv. Tutor. 2017, 19, 2621–2639. [Google Scholar] [CrossRef]
- Rahman, M.A.; Hossain, M.S.; Loukas, G.; Hassanain, E.; Rahman, S.S.; Alhamid, M.F.; Guizani, M. Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access 2018, 6, 72469–72478. [Google Scholar] [CrossRef]
- Hu, L.; Qiu, M.; Song, J.; Hossain, M.S.; Ghoneim, A. Software defined healthcare networks. IEEE Wirel. Commun. 2015, 22, 67–75. [Google Scholar] [CrossRef]
- Kumar, B.; Singh, S.P.; Mohan, A. Emerging mobile communication technologies for health. In Proceedings of the 2010 International Conference on Computer and Communication Technology (ICCCT); IEEE: Piscataway, NJ, USA, 2010; pp. 828–832. [Google Scholar]
- Hamdi, O.; Chalouf, M.A.; Ouattara, D.; Krief, F. eHealth: Surveyon research projects, comparative study of telemonitoring architecturesand main issues. J. Netw. Comput. Appl. 2014, 46, 100–112. [Google Scholar] [CrossRef]
- Alemdar, H.; Ersoy, C. Wireless sensor networks for healthcare: A survey. Comput. Networks 2010, 54, 2688–2710. [Google Scholar] [CrossRef]
- Chen, H.; Abbas, R.; Cheng, P.; Shirvanimoghaddam, M.; Hardjawana, W.; Bao, W.; Li, Y.; Vucetic, B. Ultra-reliable low latency cellular networks: Use cases, challenges and approaches. IEEE Commun. Mag. 2018, 56, 119–125. [Google Scholar] [CrossRef] [Green Version]
- Lin, D.; Tang, Y.; Labeau, F.; Yao, Y.; Imran, M.; Vasilakos, A.V. Internet of vehicles for e-health applications: A potential game for optimal network capacity. IEEE Syst. J. 2015, 11, 1888–1896. [Google Scholar] [CrossRef]
- Soldani, D.; Fadini, F.; Rasanen, H.; Duran, J.; Niemela, T.; Chan-dramouli, D.; Nanavaty, N. 5G Mobile Systems for Health-care. In Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), Sydney, Australia, 4–7 June 2017. [Google Scholar] [CrossRef]
- De Mattos, W.D.; Gondim, P.R. M-health solutions using 5G networks and M2M communications. IT Professional. 2016, 18, 24–29. [Google Scholar] [CrossRef]
- Gupta, R.; Tanwar, S.; Tyagi, S.; Kumar, N. Tactile-internet-based telesurgery system for healthcare 4.0: An architecture, research challenges, and future directions. IEEE Netw. 2019, 33, 22–29. [Google Scholar] [CrossRef]
- Scarfone, K.; Souppaya, M. Guidelines for Managing the Se-curity of Mobile Devices in the Enterprise. 2013. Available online: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800–124r1.pdf (accessed on 26 March 2016).
- Mapp, G.; Aiash, M.; Ondiege, B.; Clarke, M. Exploring a New SecurityFramework for Cloud Storage Using Capabilities. In Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering, Oxford, UK, 7–11 April 2014; pp. 484–489. [Google Scholar]
- Vithanwattana, N.; Mapp, G.; George, C. mHealth-Investigating an information security framework for mHealth data: Challenges and possible solutions. In Proceedings of the 12th International Conference on Intelligent Environments (IE), London, UK, 14–16 September 2016; pp. 258–261. [Google Scholar]
- Karmakar, K.K.; Varadharajan, V.; Tupakula, U.; Nepal, S.; Thapa, C. Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). In Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020; pp. 257–261. [Google Scholar]
- Hossain, M.S.; Muhammad, G. Emotion-aware connected healthcare big data towards 5G. IEEE Internet Things J. 2017, 5, 2399–2406. [Google Scholar] [CrossRef]
- Hossain, M.S. Cloud-supported cyber–physical localization framework for patients monitoring. IEEE Internet Things J. 2015, 11, 118–127. [Google Scholar] [CrossRef]
- Biswas, S.; Misra, S. Designing of a prototype of e-health monitoring system. In Proceedings of the 2015 In international Conference on Research in Computational Intelligence and Communication Networks, Kolkata, India, 20–22 November 2015; pp. 267–272. [Google Scholar]
- Brito, J.M. Trends in wireless communications towards 5G networks—The influence of e-health and IoT applications. In Proceedings of the 2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech), Split, Croatia, 13–15 July 2016; pp. 1–7. [Google Scholar]
- Sukhmani, S.; Sadeghi, M.; Erol-Kantarci, M.; El Saddik, A. Edge caching and computing in 5G for mobile AR/VR and tactile internet. IEEE Multimed. 2018, 26, 21–30. [Google Scholar] [CrossRef]
- Al Osman, H.; Eid, M.; El Saddik, A. U-biofeedback: A multimedia-based reference model for ubiquitous biofeedback systems. Multimed. Tools Appl. 2014, 72, 3143–3168. [Google Scholar] [CrossRef]
- Dananjayan, S.; Raj, G.M. 5G in healthcare: How fast will be the transformation? Ir. J. Med. Sci. 2021, 190, 497–501. [Google Scholar] [CrossRef]
- Fang, D.; Qian, Y.; Hu, R.Q. Security for 5G mobile wireless networks. IEEE Access 2017, 6, 4850–4874. [Google Scholar] [CrossRef]
- Azeez, N.A.; Van der Vyver, C. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis. Egypt Inform. J. 2019, 20, 97–108. [Google Scholar] [CrossRef]
- Pussewalage, H.S.; Oleshchuk, V.A. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 2016, 36, 1161–1173. [Google Scholar] [CrossRef]
- Gardašević, G.; Katzis, K.; Bajić, D.; Berbakov, L. Emerging Wireless Sensor Networks and Internet of Things Technologies—Foundations of Smart Healthcare. Sensors 2020, 20, 3619. [Google Scholar] [CrossRef] [PubMed]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Zheng, D.; Deng, R.H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet Things J. 2018, 5, 2130–2145. [Google Scholar] [CrossRef]
- Al-Janabi, S.; Al-Shourbaji, I.; Shojafar, M.; Shamshirband, S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt Informatics J. 2017, 18, 113–122. [Google Scholar] [CrossRef] [Green Version]
- Wang, D.; Chen, D.; Song, B.; Guizani, N.; Yu, X.; Du, X. From IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and 5G technologies. IEEE Commun. Mag. 2018, 56, 114–120. [Google Scholar] [CrossRef]
- Puppala, M.; He, T.; Yu, X.; Chen, S.; Ogunti, R.; Wong, S.T. Data security and privacy management in healthcare applications and clinical data warehouse environment. In Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), 24–27 February 2016; Las Vegas, NV, USA, 2016; pp. 5–8. [Google Scholar]
- Rahimi, H.; Zibaeenejad, A.; Safavi, A.A. A novel IoT architecture based on 5G-IoT and next generation technologies. In Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018; pp. 81–88. [Google Scholar]
- Papaioannou, M.; Karageorgou, M.; Mantas, G.; Sucasas, V.; Essop, I.; Rodriguez, J.; Lymberopoulos, D. A survey on security threats and countermeasures in internet of medical things (IoMT). Trans. Emerg. Telecommun. Technol. 2020, 23, e4049. [Google Scholar] [CrossRef]
- Sikder, A.K.; Babun, L.; Aksu, H.; Uluagac, A.S. Aegis: A context-aware security framework for smart home systems. In Proceedings of the 35th Annual Computer Security Applications Conference, San Juan, PR, USA, 9–13 December 2019; pp. 28–41. [Google Scholar]
- Park, Y.; Son, Y.; Shin, H.; Kim, D.; Kim, Y. This ain’t your dose: Sensor spoofing attack on medical infusion pump. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT 16), Washington, DC, USA, 8–9 August 2016. [Google Scholar]
- Liu, J.; Kwak, K.S. Hybrid security mechanisms for wireless body area networks. In Proceedings of the 2010 Second international Conference on Ubiquitous and Future Networks (ICUFN), Jeju, Korea, 16–18 June 2010; pp. 98–103. [Google Scholar]
- Multiple Vulnerabilities in Animas Onetouch Pinginsulinpump. Available online: https://blog.rapid7.com/2016/10/04/r7–2016–07-multiplevulnerabilities-in-animas-onetouch-ping-insulin-pump/ (accessed on 10 October 2016).
- Sundararajan, T.V.; Shanmugam, A. A novel intrusion detection system for wireless body area network in health care monitoring. J. Comput. Sci. 2010, 6, 1355. [Google Scholar] [CrossRef]
- Algarni, A. A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 2019, 7, 101879–101894. [Google Scholar] [CrossRef]
- Thamilarasu, G.; Chawla, S. Towards deep-learning-driven intrusion detection for the internet of things. Sensors 2019, 19, 1977. [Google Scholar] [CrossRef] [Green Version]
- Otoum, Y.; Liu, D.; Nayak, A. DL-IDS: A deep learning-based intrusion detection framework for securing IoT. Trans. Emerg. Telecommun. Technol. 2019, e3803. [Google Scholar] [CrossRef]
- Patterson, J.; Gibson, A. Deep Learning: A Practitioner’s Approach; O’Reilly Media, Inc.: Newton, MA, USA, 2017. [Google Scholar]
- Silver, D.; Huang, A.; Maddison, C.J.; Guez, A.; Sifre, L.; Van Den Driessche, G.; Schrittwieser, J.; Antonoglou, I.; Panneershelvam, V.; Lanctot, M.; et al. Mastering the game of Go with deep neural networks and tree search. Nature 2016, 529, 484–489. [Google Scholar] [CrossRef]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 2012, 25, 1097–1105. [Google Scholar] [CrossRef]
- Ma, J.; Sheridan, R.P.; Liaw, A.; Dahl, G.E.; Svetnik, V. Deep neural nets as a method for quantitative structure–activity relationships. J. Chem. Inf. Model. 2015, 55, 263–274. [Google Scholar] [CrossRef]
- Storcheus, D.; Rostamizadeh, A.; Kumar, S. A survey of modern questions and challenges in feature extraction. In Proceedings of the 1st International Workshop on Feature Extraction: Modern Questions and Challenges at NIPS 2015, Virtual, 11 December 2015; pp. 1–18. [Google Scholar]
- Li, H.; Ota, K.; Dong, M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Netw. 2018, 32, 96–101. [Google Scholar] [CrossRef] [Green Version]
- Yin, X.C.; Liu, Z.G.; Ndibanje, B.; Nkenyereye, L.; Riazul Islam, S.M. An IoT-based anonymous function for security and privacy in healthcare sensor networks. Sensors 2019, 19, 3146. [Google Scholar] [CrossRef] [Green Version]
- Newaz, A.K.; Sikder, A.K.; Rahman, M.A.; Uluagac, A.S. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. arXiv 2020, arXiv:2005.07359. [Google Scholar]
- Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Lane, N.D.; Bhattacharya, S.; Georgiev, P.; Forlivesi, C.; Kawsar, F. An early resource characterization of deep learning on wearables, smartphones and internet-of-things devices. In Proceedings of the 2015 International Workshop on Internet of Things Towards Applications, Seoul, Korea, 1 November 2015; pp. 7–12. [Google Scholar]
- Das, R.; Gadre, A.; Zhang, S.; Kumar, S.; Moura, J.M. A deep learning approach to IoT authentication. In Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
- HaddadPajouh, H.; Dehghantanha, A.; Khayami, R.; Choo, K.K. A deep recurrent neural network based approach for internet of things malware threat hunting. Future Gener. Comput. Syst. 2018, 85, 88–96. [Google Scholar] [CrossRef]
- Malasri, K.; Wang, L. Design and implementation of a securewireless mote-based medical sensor network. Sensors 2009, 9, 6273–6297. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Rahman, M.A.; Hossain, M.S.; Islam, M.S.; Alrajeh, N.A.; Muhammad, G. Secure and provenance enhanced internet of health things framework: A blockchain managed federated learning approach. IEEE Access 2020, 8, 205071–205087. [Google Scholar] [CrossRef] [PubMed]
- He, D.; Qiao, Q.; Gao, Y.; Zheng, J.; Chan, S.; Li, J.; Guizani, N. Intrusion detection based on stacked autoencoder for connected healthcare systems. IEEE Netw. 2019, 33, 64–69. [Google Scholar] [CrossRef]
- Zhang, Q.; Yang, L.T.; Chen, Z.; Li, P. A survey on deep learning forbig data. Inf. Fusion 2018, 42, 146–157. [Google Scholar] [CrossRef]
- Newaz, A.I.; Sikder, A.K.; Babun, L.; Uluagac, A.S. Heka: A novel intrusion detection system for attacks to personal medical devices. In Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 29 June–1 July 2020; pp. 1–9. [Google Scholar]
- Habibzadeh, H.; Soyata, T. Toward uniform smart healthcare ecosystems: A survey on prospects, security and privacy considerations. In Connected Health in Smart Cities; Springer: Berlin/Heidelberg, Germany, 2020; pp. 75–112. [Google Scholar]
- Deng, L.; Abdel-Hamid, O.; Yu, D. A deep convolutional neural network using heterogeneous pooling for trading acoustic invariance with phonetic confusion. In Proceedings of the international Conference on Acoustics, Speech and Signal Processing, Vancouver, BC, Canada, 26–31 May 2013; pp. 6669–6673. [Google Scholar]
- Kancherla, K.S.; Mukkamala, S. Image visualization based malware detection. In Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Singapore, 16–19 April 2013; pp. 40–44. [Google Scholar]
5G Applications | Data-Bases | Keywords | Technique | Advantages | Disadvantages |
---|---|---|---|---|---|
TELE-MEDICINE SYSTEM [1] | NoSQL | IoT,Deep Learning | Qualitative Analysis | • No waiting time • Convenient • The patient is not able to catch the new disease • Non-dependency on others • No transportation required | • Lack in the face-to-face treatment • Protection of patient private data • A problem in case of emergency • Weak connectivity • Inability to examine the patient |
ONLINE HEALTH MONITORING [3] | SQL and Wireless sensor networks, | Smart devices | Health Monitoring Architecture | • Good for post-operative apps. • Good Patient outcomes • Better quality of care | • Less Information exchange coordination • Connectivity should be good, not possible in rural areas. • The need for additional software |
WTS [5] | Distri- buted Database | Security, Distributed | Master–Slave Architecture | • Suitable for the patients who cannot travel far • Less pain with quick recovery • Less trauma | • Expensive installation of the robotic surgery system • Latency • Failure in system components leads to the patient’s death |
ONLINE CONSULTATION [19] | eXten- sible Mark-up Language | Doctor Consultation, Security and Privacy | Quanti- tative Approach | • Comfortable and convenient • Less infectious to patient • No waiting time | • Limited physical treatment as disease sometimes unclear • Network or communication issue |
REMOTE DIAGNOSIS [29] | Distri- buted | Security, Smart Devices | • No stress being treated at home • Better utilization of ICU and wards • More patients attended by a specialized professional | • Lack of awareness and trust • Service centers are inadequate in number • Shortage of skilled healthcare doctors | |
AUGMEN- TED REALITY [31] | Privacy,IoT | Compre- hens ive Review | • Enhance user’s information • Real-time sharing over a long distance | • A little expensive • Lack of human interaction | |
VIRTUAL REALITY [33] | Central | Virtual reality | Cognitive Approach | • Can give results in an artificial environment • Detailed view • Effective Communication • Made education easy | • Cant deal with real-time as works virtually • Considering technology as an experiment • Expensive |
Ref.No | Healthcare Application | Security Threats | Requirements | Possible Solutions |
---|---|---|---|---|
[7] | Online health monitoring | Denial-of-service | Availability | Redundancy Intrusion detection |
[49] | Tele-medicine System | Unauthenticated and Unauthorized access | Key establishment | Public Key cryptography Random key distribution |
[46] | Remote Diagnosis | Intrusion and high level attacks | ID | Secure group communication |
[44] | M-health | Message manipulation | Authenticity and Integrity | Secure hash function and Digital signature |
[51] | Online Consultation | Message disclosure | Privacy and Confidentiality | Access control Encryption |
[39] | Augmented Reality | Compromised or attacked node | Resilient | Detection Tamper-proofing |
[52] | Virtual Reality | Routing attacks | Secure routing | Secure protocols |
Ref. No. | Deep Learning Classifier | Type of Attacks | Dataset | Accuracy |
---|---|---|---|---|
[59] | Deep Q Network | Malware Detection | DREBIN | 98.79% |
Multi-layer perceptron | 90.1% | |||
Back Propagation Neural Network | 92.5% | |||
[60] | Convolutional Neural Network | Spoofing,Sinkhole and Malicious Code | NSL-KDD | 98.3% |
[63] | Support Vector Machines | IoT authentication | KDD-CUP99 | 97.36% |
Multi-layer perceptron | 98.40% | |||
[64] | Recurrent Neural Network-Long Short-Term Memory | Malware Detection | DREBIN | 98.18% |
[51] | Deep Belief Network | Blackhole, DDoS, Wormhole | EMBER | 98.47% |
[69] | Support Vector Machines | DoS, | AAGM | 96.7% |
False Data Injection | 97.2% | |||
Replay attack | 98.3% | |||
Man-in-the-middle | 97.1% | |||
Proposed Model | Convolutional Neural Network | Malware Detection | Malimg | 99% |
Parameter | Value |
---|---|
batch size | 64 |
epoch | 20 |
num classes | 25 |
Families | (1) | (2) | (3) | (4) | (5) | (6) | Prec | Rec |
---|---|---|---|---|---|---|---|---|
Adialer.C(1) | 38 | 0 | 0 | 0 | 0 | 0 | 0.989 | 1.00 |
Agent.FYI(2) | 0 | 44 | 0 | 0 | 0 | 0 | 1.00 | 0.956 |
Allaple.A(3) | 0 | 0 | 852 | 0 | 0 | 0 | 0.84 | 0.87 |
Allaple.L (4) | 0 | 0 | 1 | 477 | 0 | 0 | 0.79 | 0.81 |
Aleuron.gen!J(5) | 0 | 0 | 0 | 0 | 68 | 0 | 0.92 | 0.88 |
Autorun.K(6) | 0 | 0 | 0 | 0 | 0 | 68 | 0.998 | 0.978 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Anand, A.; Rani, S.; Anand, D.; Aljahdali, H.M.; Kerr, D. An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications. Sensors 2021, 21, 6346. https://doi.org/10.3390/s21196346
Anand A, Rani S, Anand D, Aljahdali HM, Kerr D. An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications. Sensors. 2021; 21(19):6346. https://doi.org/10.3390/s21196346
Chicago/Turabian StyleAnand, Ankita, Shalli Rani, Divya Anand, Hani Moaiteq Aljahdali, and Dermot Kerr. 2021. "An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications" Sensors 21, no. 19: 6346. https://doi.org/10.3390/s21196346
APA StyleAnand, A., Rani, S., Anand, D., Aljahdali, H. M., & Kerr, D. (2021). An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications. Sensors, 21(19), 6346. https://doi.org/10.3390/s21196346