Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tileutay, Laura | - |
dc.contributor.author | Chandroth, Jisi | - |
dc.contributor.author | Lim, Keun Woo | - |
dc.contributor.author | Ko, Young Bae | - |
dc.contributor.author | Roh, Byeong Hee | - |
dc.date.issued | 2024-01-01 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/37117 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85205947467&origin=inward | - |
dc.description.abstract | The concept of the Internet Of Things (IoT) is becoming more and more popular in many services and applications of the future. One of the notable fields is the Internet of Medical Things (IoMT). The recognition of IoMT is due to its ability to enable Internet connectivity to smart healthcare systems, thus allowing remote monitoring of patients' health, provisioning assistance, and collecting more information about the patient's health status. However, these innovations come at the cost of security risks due to the high vulnerability of these systems. Therefore, it is crucial to develop effective security mechanisms that will be able to protect the confidentiality and privacy of patient data and prevent unauthorized access and attacks. We propose an intrusion detection system (IDS) that leverages the empirical distribution ranking (EDR) based on the J48 classification algorithm for detecting such attacks. The proposed framework selects the optimal features based on the empirical distributed ranks. The EDR ranks the features according to their importance to the target class. The J48 classifier classifies a new class by creating a decision tree from the selected feature values. The proposed method detected security risks with a high accuracy of 99.33% and a precision of 0.99. The testing time in the WUSTL-EHMS-2020 dataset is 0.04s, which meets the requirements of various IoMT-related applications. | - |
dc.description.sponsorship | This work was supported by the BK21 FOUR program of the National Research Foundation of Korea funded by the Ministry of Education(NRF5199991514504). | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Decision-tree algorithm | - |
dc.subject.mesh | Empirical distribution ranking | - |
dc.subject.mesh | Empirical distributions | - |
dc.subject.mesh | Internet connectivity | - |
dc.subject.mesh | Intrusion Detection Systems | - |
dc.subject.mesh | J48 | - |
dc.subject.mesh | Patient health | - |
dc.subject.mesh | Security risks | - |
dc.subject.mesh | Services and applications | - |
dc.subject.mesh | Smart healthcare | - |
dc.title | Empirical Distribution Ranking based Decision Tree Algorithm for building Intrusion Detection System in the Internet of Medical Things | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2024.7.24. ~ 2024.7.26. | - |
dc.citation.conferenceName | 2024 IEEE Annual Congress on Artificial Intelligence of Things, AIoT 2024 | - |
dc.citation.edition | Proceedings - 2024 IEEE Annual Congress on Artificial Intelligence of Things, AIoT 2024 | - |
dc.citation.endPage | 92 | - |
dc.citation.startPage | 87 | - |
dc.citation.title | Proceedings - 2024 IEEE Annual Congress on Artificial Intelligence of Things, AIoT 2024 | - |
dc.identifier.bibliographicCitation | Proceedings - 2024 IEEE Annual Congress on Artificial Intelligence of Things, AIoT 2024, pp.87-92 | - |
dc.identifier.doi | 10.1109/aiot63253.2024.00027 | - |
dc.identifier.scopusid | 2-s2.0-85205947467 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10677505 | - |
dc.subject.keyword | EDR | - |
dc.subject.keyword | Intrusion detection system | - |
dc.subject.keyword | J48 | - |
dc.subject.keyword | Smart Healthcare | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Artificial Intelligence | - |
dc.subject.subarea | Information Systems and Management | - |
dc.subject.subarea | Modeling and Simulation | - |
dc.subject.subarea | Control and Optimization | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.