论文标题
基于机器学习的医学互联网侵入检测方法的调查
Survey of Machine Learning Based Intrusion Detection Methods for Internet of Medical Things
论文作者
论文摘要
医学事物互联网(IOMT)通过使用传感器启用生理数据收集来彻底改变了医疗保健行业,这些传感器已传输到远程服务器,以供医师和医疗保健专业人员进行连续分析。这项技术为慢性病患者提供了许多好处,包括早期疾病检测和自动药物。但是,IOMT技术还带来了重大的安全风险,例如违反患者隐私或将敏感数据暴露于无线通信引起的拦截攻击中,这可能对患者致命。此外,由于沟通及其有限的计算,存储和能源容量,传统的安全措施(例如加密术)在医疗设备中实施具有挑战性。这些保护方法对新的和零日的攻击也无效。必须采取强大的安全措施,以确保数据完整性,机密性和可用性在数据收集,传输,存储和处理过程中。在这种情况下,使用基于机器学习(ML)的入侵检测系统(IDS)可以带来适合IOMT系统独特特征的互补安全解决方案。因此,本文研究了基于ML的ID如何解决IOMT系统中的安全性和隐私问题。首先,提供了IOMT的通用三层体系结构,并概述了IOMT系统的安全要求。然后,确定可能影响IOMT安全性的各种威胁,并在构成IOMT的三层中使用ML中使用的每个解决方案中使用的优势,缺点,方法和数据集。最后,本文讨论了在IOMT的每一层中使用ML应用ID的挑战和局限性,这可以用作将来的研究方向。
The Internet of Medical Things (IoMT) has revolutionized the healthcare industry by enabling physiological data collection using sensors, which are transmitted to remote servers for continuous analysis by physicians and healthcare professionals. This technology offers numerous benefits, including early disease detection and automatic medication for patients with chronic illnesses. However, IoMT technology also presents significant security risks, such as violating patient privacy or exposing sensitive data to interception attacks due to wireless communication, which could be fatal for the patient. Additionally, traditional security measures, such as cryptography, are challenging to implement in medical equipment due to the heterogeneous communication and their limited computation, storage, and energy capacity. These protection methods are also ineffective against new and zero-day attacks. It is essential to adopt robust security measures to ensure data integrity, confidentiality, and availability during data collection, transmission, storage, and processing. In this context, using Intrusion Detection Systems (IDS) based on Machine Learning (ML) can bring a complementary security solution adapted to the unique characteristics of IoMT systems. Therefore, this paper investigates how IDS based on ML can address security and privacy issues in IoMT systems. First, the generic three-layer architecture of IoMT is provided, and the security requirements of IoMT systems are outlined. Then, the various threats that can affect IoMT security are identified, and the advantages, disadvantages, methods, and datasets used in each solution based on ML at the three layers that make up IoMT are presented. Finally, the paper discusses the challenges and limitations of applying IDS based on ML at each layer of IoMT, which can serve as a future research direction.