ORIGINAL RESEARCH article

Front. Public Health, 03 December 2021
Sec. Digital Public Health
https://doi.org/10.3389/fpubh.2021.788347

Trustworthy Intrusion Detection in E-Healthcare Systems

Faiza Akram1, Dongsheng Liu1, Peibiao Zhao1, Natalia Kryvinska2*, Sidra Abbas3* and Muhammad Rizwan4
  • 1Department of Mathematics, School of Science, Nanjing University of Science and Technology, Nanjing, China
  • 2Department of Information Systems, Faculty of Management, Comenius University in Bratislava, Bratislava, Slovakia
  • 3Department of Computer Science, COMSATS University, Islamabad, Pakistan
  • 4Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan

In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS) play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a massive technology with security threats on the network layer, as it is considered the most common source for communication and data storage platforms. The security of data servers in all sectors (mainly healthcare) has become one of the most crucial challenges for researchers. This paper proposes an approach for effective intrusion detection in the e-healthcare environment to maintain PHR in a safe IoT-net using an adaptive neuro-fuzzy inference system (ANFIS). In the proposed security model, the experiments present a security tool that helps to detect malicious network traffic. The practical implementation of the ANFIS model on the MATLAB framework with testing and training results compares the accuracy rate from the previous research in security.

Introduction

Internet of Things (IoT)-based network systems (IoT-net) are considered as emerging advancements in the field of technology, where cloud network-based servers provide communication, storage, and problem-solving facilities, but these sorts of systems also contain security threats and issues as well (14). The network user can access its facility by using an internet source (5). The multiple hardware and software-based environments provide data and information to its end users. Some of the most prominent organizations like Apple, HP, Amazon, IBM, Oracle, Intel, etc., use cloud computing (CC) techniques. CC is based on three-layer models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Similarly, cloud networks are based on four types: private, public, hybrid, and community (6, 7).

In a cloud networking environment, problems in security and authorization are the key risks. Likewise, there are numerous risks which users and network service providers both face. Mainly, security issues arise from the data storage and networking side (8, 9). Many security enhancement-based algorithms have been proposed to make the IoT-net servers secure. Many cryptographic algorithms like RSA, AES, CRT-RSA, DES, blockchain, machine learning, and artificial intelligence-based code have been proposed to enhance security. Homomorphic encryption algorithms (1012) help to provide better security to detect non-authorization factors. Many machine learning (13) and artificial intelligence-based security algorithms help to provide better data networking with new classification and risk assessment techniques. However, many elements remain unsolved and require more improvement and advancement in areas such as cost management, resource utilization, speed prediction, and security, most importantly.

IoT also plays a magnificent role in the healthcare sector concerning data storage, online systems, software, laboratories, pathology, clinic sessions, etc. Medical patient health records (PHR) are an emerging version of IT and smart healthcare records (5). However, here we encounter problems of data security and privacy of PHR (1, 1418). To overcome the PHR security issue, many researchers have been working on using blockchain and many other artificial intelligence techniques, which allows clinical expertise, patients, laboratories, and the world to be connected.

One of the most effective artificial intelligence techniques is called the artificial neural inference system (ANFIS), which is the combination of an artificial neural network (ANN) and a fuzzy inference system (FIS). ANFIS is mainly used as a computational model for resolving uncertainties, reasoning, and reducing security threats from networks and cloud servers (1). It helps the systems and servers examine the risk of data and information. ANNs work on the principle of mathematical calculation. The ANFIS model is based on if-then rule statements and crisp values, and the final ANFIS surface model uses result accuracy rate. It uses most of its computational time for data classification and estimation.

Problem Statement

In smart e-healthcare systems, networking servers provide a better intermediary platform for data storage, communication, and many other aspects. The end users (doctors, clinical experts, patients, laboratories) get the opportunity to access the PHR and access the cloud servers. It can be any authorized person. It is essential to detect and classify malicious activities and network traffic. The classification of network traffic and attack type detection helps make the system more secure and detect network intrusion.

Motivation

In this research paper, we discuss the existing security risks in IoT-net-based PHR. We classify these issues in managing risk, end-user risk, organizational risk, privacy risk, and many more. Our main agenda is to propose a less risky cloud network for everyone. We represent the list of shortcomings in existing malicious network traffic, and this will benefit the networking service provider and security handler community to comprehend the security issue.

Contribution

In this research, we try to implement the ANFIS model to detect network attacks on database servers. The main agenda is to detect the unauthorized access of users by using an ANFIS-based intrusion detection system. The proposed security algorithm helps to collect malicious activities or information from network traffic. Based on the if-then rule statement and ANFIS-based data classification which can help detect the intrusion attack, the system can determine if the cloud server has been hit by an intruder or not. If there is an attack, identifying the type of attack helps researchers implement precautionary measures to overcome the loss or block the malicious incoming traffic.

Organization

The rest of the research paper is organized as follows: The section literature review discusses the literature review of the previously proposed security approaches. After that, section proposed methodology discusses the proposed work with the working of ANFIS and the proposed security algorithm along with its method. Similarly, section experimental analysis and results discusses the implementation, results, and discussion. Moreover, lastly, section conclusion discusses the conclusion and future work.

Literature Review

According to previous research (1), healthcare-based networking servers require more security and a safe network architecture to provide confidentiality, integrity, privacy, and authentication to its patients, doctors, and management. The author proposed the ANFIS-based data classifier and security provider tool or model for making cloud servers more secure with a higher accuracy rate and smaller error rate. Detection of security attacks and malicious network traffic is considered as the most topical issue for network security (1923). Therefore, previous research (24) presented an ANFIS-based security framework for classification of attacks and identifying their type.

In another study (25), the research mainly focuses on the interoperability of the cloud server platform and its reliability. The paper uses the hybrid approach of the squirrel search genetic algorithm with the combination of ANFIS to perform better functionality and remove uncertainties of servers by providing a higher accuracy rate. Also, in a previous work (26), an SDN anomaly detection system was proposed to detect malicious behavior and intrusion attacks using the cloud medium. The detection system identified the trusted edge for data or information sharing and communication. Based on multiple parameters, the implementation of the proposed systems showed better performance results. Here Table 1 represents the ANFIS methodology used for security purposes like in clustering, classification, accuracy, performance evaluation, etc.

TABLE 1
www.frontiersin.org

Table 1. Recent research on ANFIS and network security issues.

In many previous kinds of research, the communication between devices and multiple systems can also cause security threats and need efficient and enhanced network capacities during communication. Hence in a previous research (33), the author used 5G and the multiple-input multiple-output (MIMO) concept to enhance the network capacity and area coverage capacity. Similarly, in another paper (19), the author proposed the ANN technique to detect and identify intrusion attacks in android systems.

In a previous study (34), the author dealt with the security factor of the cloud to improve its performance using the AI technique. The proposed approach helped to overcome the flaw of data breaching and non-authorization access on cloud servers. They utilized different labels to restrict access to specific edge limits to ensure accuracy in decision making. It helped the systems to store a large amount of data securely on cloud servers.

In an earlier paper (35), the study presented fuzzy-based detection schemes by various machine learning techniques and data mining algorithms to cope with multiple types of malicious attacks or intrusion. This paper first categorized their contribution in two parts, intrusion and detection, and then used fuzzy techniques for classification and identification. Then they listed the shortcomings and merits of the ID detection based on fuzzy techniques and algorithms.

In another research paper (36), the author presented a detailed survey on anomaly detection schemes and fuzzy inference systems. This paper mainly focused on combining fuzzy inference systems and machine learning algorithms for the intrusion detection process. It summarized the research with the contributions and shed light on the shortcomings and benefits of FIS. Then, finally, it concluded with future findings and issues in the anomaly detection scheme.

CC is the computing solution that allows multiple end users to connect, share, communicate, and store data or information. Fault tolerance is considered the main concern in data reliability. Therefore, in a previous research (37), detailed analysis was presented to detect the nature of the error and proper implementation of the FIS technique to the response. The process of checkpoints was used to check the intensity of the error.

Table 2 represents the methodology used for cloud security based on previous research work.

TABLE 2
www.frontiersin.org

Table 2. Recent research on network security risks.

In earlier research (48), a comprehensive review discussed CC and IoT in the healthcare sector including smart systems, smart applications, smart software, smart hospitals, and smart record systems. The study presented the IoT-based smart cloud paradigm in the healthcare sector. Similarly, In an earlier work (49), an ANFIS-based healthcare system was proposed to avoid network security risks. The proposed system and already existing ANFIS-based system were compared to evaluate the performance.

Based on previous work, ANFIS is considered an advanced technique for data evaluation, classification, clustering, increased accuracy rate, and detecting various network or systems attacks or any malicious activities on cloud infrastructure to provide a trustful environment to its end users.

Proposed Methodology

We propose a tuned version of the ANFIS model to detect intrusion attacks in cloud database servers. We mainly focus on identifying the unauthorized access of end users to systems and diagnosing the type of network attack. The proposed security algorithm will help systems to detect malicious activities or irrelevant information from network traffic. The coming subsection will help understand the ANFIS model's working and the proposed technique's flow chart.

Architecture and Working of ANFIS-Based Systems

To study fuzzy rules-based non-linear systems, the fuzzy inference system (FIS) is considered an efficient methodology. Similarly, artificial neural networks (ANNs) work on neurons and the artificial Intelligence technique. So, an artificial neural fuzzy inference system (ANFIS) is the combination of FIS and ANN, which works on the principle of neural networks and follows the efficiency of FIS. ANFIS uses the hybrid Sugeno-type methodology to specify the input parameters. This method trains the membership function based on input parameters to get the trained dataset. ANFIS is also known for its the parameters which can validate the model. ANFIS is based on a multiple layer architecture, where every layer keeps forwarding the input parameters for continuous working. More detail about the architecture and working of the ANFIS architecture is presented in Figure 1.

FIGURE 1
www.frontiersin.org

Figure 1. Five layer-based working of the ANFIS architecture.

The architecture of the ANFIS methodology almost resembles that of the Sugeno-type model, as shown in Figure 1. The model-based rule sets are as follow:

• If x is A_1 and y is B_1 then f_1 = p_1 x + q_1 y + r_1

• If x is A_2 and y is B_2 then f_2 = p_2 x + q_2 y + r_2

The working of each layer is explained with mathematical equations as listed below: Layer 1 shows the input parameters and fuzzification, where Ni (N is node) is adaptive to N func (func is function), as represented in Equations 1 and 2.

L1,i=μAi(x),for i=1,2    (1)
L1,i=μBi-2(x),for i=3,4    (2)

Layer 2 shows the fuzzy rule generation phase, where every N computes and sets rules by the multiplication process, as represented in Equation 3.

L2,i=wi=μAi(x).μBi(y),i=1,2    (3)

Layer 3 shows the normalization phase, where every neuron is normalized based on the effect of the fuzzy rule sets, as represented in Equation 4.

L3,i=w̄=wiw1+w2,i=1,2    (4)

Layer 4 shows the implication phase, where every input value is set as an input parameter, as represented in Equation 5.

L4,i=wīfi=wī(pix+qiy+ri),i=1,2    (5)

Layer 5 shows the final result or output of the complete process, where the sum of the input values are computed, as represented in Equation 6.

L5,i=Σw̄fi=ΣwifiΣwi    (6)

Figure 2 shows the ANFIS-based controller, which helps the systems detect attacks (ANFIS-C). The controller helps to detect the type of attack based on input parameters and membership function. Through the learning process, ANFIS-C adjusts the initial and processed parameters. The least-square method is used here to obtain hybrid propagation. The ANFIS-C alters the initial and processed parameters based on the error rate (here, error rate is calculated with a difference of two output values before processing and after ANFIS-C).

FIGURE 2
www.frontiersin.org

Figure 2. The controller architecture of the ANFIS technique (ANFIS-C).

Figure 3 shows the working of the ANFIS-based intelligence system. The initial step involves loading input parameters, and the ANFIS-based classifier evaluates the functions and detects the error rate, intelligence method, and other learning attributes. After that, the training phase defines the initial and processed membership function along with its parameters. Then, after passing from the testing phase, it sets rules and defines membership functions. At last, the ANFIS-based system stores processed parameters and processed attributes.

FIGURE 3
www.frontiersin.org

Figure 3. Flow chart of ANFIS-based system.

Experimental Analysis and Results

The ANFIS model is used to detect the type of attack based on rule viewer, membership function, and surface viewer. For the practical implementation of the ANFIS model, we use the MATLAB framework for experiments and results. We use dataset pf KDDcup 99 for intrusion detection. This dataset consists of 41 features of the network and five network types of intrusions. The network is observed for around 7 weeks to collate more accurate and precise data. We use an ANFIS-based classifier for detection purposes. The basic structure and features of the ANFIS model in PHR network attacks can be examined. In Table 3 input parameters and membership functions are discussed.

TABLE 3
www.frontiersin.org

Table 3. Input/Output parameters and membership functions.

Similarly, Figure 4 shows the five input parameters (based on attacks type): normal, probe, DoS, U2R, and R2L.

FIGURE 4
www.frontiersin.org

Figure 4. Input parameters.

On the basis of input parameters, membership function is defined using the Sugeno-type ANFIS function in Figure 5. More than 140 rules are generated to generate the desired output value in the form of attack type. After selecting various combinations of input parameters, various rules are generated to get the results.

FIGURE 5
www.frontiersin.org

Figure 5. Set of rules based on membership functions.

Figure 6 shows the 3D surface views of all attributes. In section (Figure 6A), for attack type the x-axis displays “normal” and the y-axis shows “probe”; then in section (Figure 6B), the x-axis presents “probe” and the y-axis shows “normal”; in section (Figure 6C), the x-axis shows “U2R” and the y-axis shows “normal”; then in section (Figure 6D), the x-axis displays “DoS” and the y-axis presents “normal”; and lastly in section (Figure 6E), the x-axis displays “R2L” and the y-axis shows “normal.” The surface view shows the comparison of multiple attack type attributes. As the KDD99cup dataset consists of many types of network attacks. In our research, we choose five types of attacks based on their repetition. Moreover, the surface viewer helps predict the accuracy rate in classification and detection based on a rule (which is created by using the membership function).

FIGURE 6
www.frontiersin.org

Figure 6. (A–E) Set of rules based on membership functions.

Similarly, after defining rule sets, the structure of the proposed ANFIS-based model is established, as can be seen in Figure 7. In the final structure, after multiple input values, around 140 sets of rules are generated which leads toward the final output value, which indicates the type of intrusion attack.

FIGURE 7
www.frontiersin.org

Figure 7. Proposed ANFIS model.

Figure 8 represents the training results of the KDDcup 99 datasets collected from the Kaggle website for network intrusion detection based on ANFIS. The training model contains five input values and generates a single output. The training model shows the increasing flow of accuracy rate.

FIGURE 8
www.frontiersin.org

Figure 8. Training results of the KDDcup 99 dataset. (A) On x-axis “normal”. (B) On x-axis “probe”. (C) On x-axis “U2R”. (D) On x-axis “DoS”. (E) On x-axis “R2L”.

Finally, Table 4 shows the detailed statistical result of the KDDcup 99 datasets. The selected classes for testing and training are normal, probe, DoS, R2L, and U2R.

TABLE 4
www.frontiersin.org

Table 4. Testing and training results from the KDDcup 99 datasets.

The final result generated by the ANFIS model is either linear or non-linear. Therefore, the Sugeno-type ANFIS model helps to obtain a single output. The results show that the PHR in the healthcare system require an ANFIS-type framework to detect and prevent network attacks and maintain secrecy and a trustful environment for patients, doctors, laboratories, and all other interlinked sectors.

Comparison of Experimented FIS and ANFIS Model Decision-Making

Table 5 shows the performance comparison of the FIS and ANFIS models for better decision-making in network intrusion detection to make e-healthcare (PHR) more secure. The FIS model has been selected to conduct another experiment to show the comparison of the results of FIS and ANFIS based on performance. The mentioned table helps to evaluate the performance of both models. Other than selecting already proposed solutions, we train the FIS model on the same datasets to obtain results. The computed MSE value for FIS is 0.0183 and 0.0123 for ANFIS, the NMSE value is 0.3185 for FIS and 0.2650 for ANFIS, the MAE value is 0.1170 for FIS and 0.0747 for ANFIS, the error value (for minimum observation) is 0.0110 for FIS and 0.0021 for ANFIS, the error value (for maximum observation) is 0.1279 for FIS and 0.1706 for ANFIS, and then finally the R-value is 0.6133 for FIS and 0.7336 for ANFIS. Based on the performance results and output values, ANFIS is considered a more efficient model for efficient decision-making in e-healthcare systems.

TABLE 5
www.frontiersin.org

Table 5. Comparison of FIS and ANFIS models.

Conclusion

Security of network systems in all sectors has become one of the most crucial challenges for researchers. In smart e-healthcare systems, cloud servers provide a better intermediary platform for data storage, communication, and many other aspects. The end users (doctors, clinical experts, patients, laboratories) get the opportunity to access PHR and access the networking database servers. It can be any authorized person. It is essential to detect and classify malicious activities and network traffic. This research paper proposed ANFIS for effective intrusion detection in healthcare networks to maintain a patient record. The main agenda is to detect the unauthorized access of users by using an ANFIS-based intrusion detection system. The proposed security algorithm helps to collect malicious activities or information from network traffic. Based on the if-then rule statement and ANFIS-based data classification that helps to detect the intrusion attack, it can determine whether the networking database server was hit by an intruder or not. If the system identifies the type of attack, this can help researchers put precautionary measures into place to overcome the loss or block the malicious incoming traffic.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author/s.

Author Contributions

FA and DL: conceptualization. DL: data curation. FA: formal analysis, investigation, and methodology. NK: funding acquisition. NK and PZ: project administration. SA and PZ: resources. FA and MR: software. FA and NK: supervision. DL and SA: validation. DL and NK: visualization. PZ and SA: writing–review and editing. All authors contributed to the article and approved the submitted version.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

The handling editor declared a past co-authorship with one of the authors MR.

Publisher's Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J. Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Sys. (2021). doi: 10.1007/s40815-021-01104-y

CrossRef Full Text | Google Scholar

2. Javed A, Sarwar MU, ur Rehman S, Khan HU, Al-Otaibi YD, Alnumay WS. Pp-spa: privacy preserved smartphone-based personal assistant to improve routine life functioning of cognitive impaired individuals. Neural Proc Lett. (2021) 1–18. doi: 10.1007/s11063-020-10414-5

CrossRef Full Text | Google Scholar

3. Javed AR, Abid R, Aslam B, Khalid HA, Khan MZ, Alhazmi Rehman SU, et al. Personalisedcomfort: a personalised thermal comfort model to predict thermal sensation votes for smart building residents. Enterprise Inf Syst. (2020) 1-23. doi: 10.1080/17517575.2020.1852316

CrossRef Full Text | Google Scholar

4. Shabbir M, Shabbir A, Iwendi C, Javed AR, Rizwan M, Herencsar N, et al. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access. (2021) 9:8820-34. doi: 10.1109/ACCESS.2021.3049564

PubMed Abstract | CrossRef Full Text | Google Scholar

5. Mubashar A, Asghar K, Javed AR, Rizwan M, Srivastava G, Gadekallu TR, et al. Storage and proximity management for centralized personal health records using an IPFS-based optimization algorithm. J Circ Syst Comput. (2021) 2250010. doi: 10.1142/S0218126622500104

CrossRef Full Text | Google Scholar

6. Garg D, Sidhu J, Rani S. A note on cloud computing security. Int J Ad Hoc Ubiquit Comput. (2020) 3:133-54. doi: 10.1504/IJAHUC.2020.106644

CrossRef Full Text | Google Scholar

7. Ikram AA, Rehman A, Rizwan M, Abid R, Crichigno J, Srivastava G. Mobile cloud computing framework for securing data. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) Brno: IEEE (2021). p. 309-15.

Google Scholar

8. Wang Z, Wang N, Su X, Ge S. An empirical study on business analytics affordances enhancing the management of cloud computing data security. Int J Inf Manag. (2020) 50:387–394. doi: 10.1016/j.ijinfomgt.2019.09.002

CrossRef Full Text | Google Scholar

9. Naeem A, Rehman A, Rizwan M, Abbas S, Lin JCW, Gadekallu TR. DARE-SEP: a hybrid approach of distance aware residual energy-efficient SEP for WSN. IEEE Trans Green Commun Netw. (2021) 5:611–621. doi: 10.1109/TGCN.2021.3067885

PubMed Abstract | CrossRef Full Text | Google Scholar

10. Alabdulatif A, Khalil I, Yi X. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J Parallel Distrib Comput. (2020) 137:192–204. doi: 10.1016/j.jpdc.2019.10.008

CrossRef Full Text | Google Scholar

11. Yousuf H, Lahzi M, Salloum SA, Shaalan K. Systematic review on fully homomorphic encryption scheme and its application. In: Recent Advances in Intelligent Systems and Smart Applications. Cham: Springer. (2021) p. 537–51.

Google Scholar

12. Xiong H, Jin C, Alazab M, Yeh KH, Wang H, Gadekallu TRR, et al. On the design of blockchain-based ECDSA with fault-tolerant batch verication protocol for blockchain-enabled IoMT. IEEE J Biomed Health Inform. (2021). doi: 10.1109/JBHI.2021.3112693. [Epub ahead of print].

PubMed Abstract | CrossRef Full Text | Google Scholar

13. Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM, et al. A review of machine learning algorithms for cloud computing security. Electronics. (2020) 9:1379. doi: 10.3390/electronics9091379

PubMed Abstract | CrossRef Full Text | Google Scholar

14. Sabu S, Ramalingam H, Vishaka M, Swapna H, Hegde S. Implementation of a Secure and privacy-aware E-Health record and IoT data Sharing using Blockchain. EasyChair. (2021) doi: 10.1016/j.gltp.2021.08.033

CrossRef Full Text | Google Scholar

15. Muhammad A, Asad M, Javed A. Robust early stage botnet detection using machine learning. In: 2020 International Conference on Cyber Warfare and Security (ICCWS). Islamabad: IEEE (2020). p. 1–6.

Google Scholar

16. Basit A, Zafar M, Javed AR, Jalil Z. A novel ensemble machine learning method to detect phishing attack. In: 2020 IEEE 23rd International Multitopic Conference (INMIC). Bahawalpur: IEEE (2020). p. 1-5.

Google Scholar

17. Basit A, Zafar M, Liu X, Javed A, Jalil Z, Kifayat K. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst. (2021) 76:139–54. doi: 10.1007/s11235-020-00733-2

PubMed Abstract | CrossRef Full Text | Google Scholar

18. Abid R, Iwendi C, Javed AR, Rizwan M, Jalil Z, Anajemba JH, et al. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Pers Ubiquitous Comput. (2021) 1–14. doi: 10.1007/s00779-021-01607-3

CrossRef Full Text | Google Scholar

19. Imtiaz SI, ur Rehman S, Abdul R, Jalil Z, Liu X, Alnumay WS. DeepAMD: detection and identification of android malware using high-efficient deep artificial neural network. Future Gen Comput Syst. (2021) 115:844–56. doi: 10.1016/j.future.2020.10.008

CrossRef Full Text | Google Scholar

20. Ahmed W, Rasool A, Abdul R, Kumar N, Gadekallu TR, Jalil Z, et al. Security in next generation mobile payment systems: a comprehensive survey. IEEE Access. (2021) 9:115932–50. doi: 10.1109/ACCESS.2021.3105450

PubMed Abstract | CrossRef Full Text | Google Scholar

21. Mittal M, Iwendi C, Khan S, Rehman A. Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol. (2021) 32:e3997. doi: 10.1002/ett.3997

PubMed Abstract | CrossRef Full Text | Google Scholar

22. Iwendi C, Rehman SU, Javed AR, Khan S, Srivastava G. Sustainable security for the internet of things using artificial intelligence architectures. ACM Trans Intern Technol. (2021) 21:1–22. doi: 10.1145/3448614

CrossRef Full Text | Google Scholar

23. Afzal S, Asim M, Abdul R, Beg MO, Baker T. URLdeepDetect: a deep learning approach for detecting malicious urls using semantic vector models. J Netw Syst Manag. (2021) 29:1–27. doi: 10.1007/s10922-021-09587-8

CrossRef Full Text | Google Scholar

24. Parfenov D, Zabrodina L, Bolodurina I, Parfenov A. Development of Algorithmic Solutions for Solving the Problem of identifying Network Attacks Based on Adaptive Neuro-Fuzzy Networks ANFIS. In: 2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). Yekaterinburg: IEEE (2020).

Google Scholar

25. Ramalingam C, Mohan P. An efficient applications cloud interoperability framework using I-Anfis. Symmetry. (2021) 13:268. doi: 10.3390/sym13020268

CrossRef Full Text | Google Scholar

26. Qureshi KN, Jeon G, Piccialli F. Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput Netw. (2021) 184:107647. doi: 10.1016/j.comnet.2020.107647

CrossRef Full Text | Google Scholar

27. Srilakshmi R, Muthukuru J. Intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm. Int J Intell Unmanned Syst. (2021) doi: 10.1108/IJIUS-09-2020-0049

CrossRef Full Text | Google Scholar

28. Pawar MV, Jagadeesan A. Detection of blackhole and wormhole attacks in WSN enabled by optimal feature selection using self-adaptive multi-verse optimiser with deep learning. Int J Commun Netw Distrib Syst. (2021) 26:409–45. doi: 10.1504/IJCNDS.2021.115573

CrossRef Full Text | Google Scholar

29. Maheswari M, Karthika R. A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Pers Commun. (2021) 118:1535–57. doi: 10.1007/s11277-021-08101-2

CrossRef Full Text | Google Scholar

30. Nandi M, Kannan A. An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment. (2021). doi: 10.21203/rs.3.rs-586844/v1

CrossRef Full Text | Google Scholar

31. Hemalatha R, Umamaheswari R, Jothi S. ANFIS based optimal routing using group teaching and adaptive equilibrium optimization based trust aware routing protocol in MANET. (2021). doi: 10.21203/rs.3.rs-355720/v1

CrossRef Full Text | Google Scholar

32. Barraclough PA, Fehringer G, Woodward J. Intelligent cyber-phishing detection for online. Comput Secur. (2021) 104:102123. doi: 10.1016/j.cose.2020.102123

CrossRef Full Text | Google Scholar

33. Javed AR, Abid R, Aslam B, Khalid HA, Khan MZ, Alhazmi OH, et al. Green5g: enhancing capacity and coverage in device-to-device communication. Comput Mater Continua. (2021) 67:1933–50. doi: 10.32604/cmc.2021.015272

CrossRef Full Text | Google Scholar

34. Bhattacharya D, Biswas A, Rajkumar S, Selvanambi R. Dynamic cloud access security broker using artificial intelligence. In: Machine Learning for Predictive Analysis. Springer (2021). p. 335–42.

Google Scholar

35. Masdari M, Khezri H. A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl Soft Comput. (2020) 106301. doi: 10.1016/j.asoc.2020.106301

CrossRef Full Text | Google Scholar

36. Masdari M, Khezri H. Towards fuzzy anomaly detection-based security: a comprehensive review. Fuzzy Optimizat Decis Mak. (2021) 20:1–49. doi: 10.1007/s10700-020-09332-x

CrossRef Full Text | Google Scholar

37. Rezaeipanah A, Mojarad M, Fakhari A. Providing a new approach to increase fault tolerance in cloud computing using fuzzy logic. Int J Comput Appl. (2020) 1–9. doi: 10.1080/1206212X.2019.1709288

CrossRef Full Text | Google Scholar

38. Ferdous J, Khan MFN, Rezaul KM, Tamal MA, Aziz MA, Miah P. A hybrid framework for security in cloud computing based on different algorithms. Int J Netw Secur. (2020) 22:638–44.

PubMed Abstract | Google Scholar

39. Viswanath G, Krishna PV. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol Intell. (2020) p. 1-8. doi: 10.1007/s12065-020-00404-w

CrossRef Full Text | Google Scholar

40. Joel MR, Ebenezer V, Navaneethakrishnan M, Karthik N. Encrypting and decrypting different files over different algorithm on Cloud Platform. Int J Emerg Trends Eng Res. (2020) 8. doi: 10.30534/ijeter/2020/71842020

CrossRef Full Text | Google Scholar

41. Ramesh S, Jayasankar T, Bhavadharini R, Nagarajan N, Mani G. Securing medical data using extended role based access control model and twofish algorithms on cloud platform. Eur J MolClin Med. (2021) 8:1075–89.

Google Scholar

42. Chavan S, Tamane S. Enhancement in Cloud security for web application attacks. In: 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC). Aurangabad: IEEE (2020). p. 91–95.

Google Scholar

43. Orobosade A, Aderonke T, Boniface A, Gabriel AJ. Cloud application security using hybrid encryption. Communications. (2020) 7:25–31. doi: 10.5120/cae2020652866

PubMed Abstract | CrossRef Full Text | Google Scholar

44. Torkura KA, Sukmana MI, Cheng F, Meinel C. Cloudstrike: chaos engineering for security and resiliency in cloud infrastructure. IEEE Access. (2020) 8:123044–60. doi: 10.1109/ACCESS.2020.3007338

PubMed Abstract | CrossRef Full Text | Google Scholar

45. Torkura KA, Sukmana MI, Cheng F, Meinel C. Continuous auditing and threat detection in multi-cloud infrastructure. Comput Secur. (2021) 102:102124. doi: 10.1016/j.cose.2020.102124

CrossRef Full Text | Google Scholar

46. Pallavi K, Kumar VR, Srikrishna S. Comparative study of various lightweight cryptographic algorithms for data security between IoT and cloud. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES). Coimbatore: IEEE (2020). p. 589–93.

Google Scholar

47. Soman VK, Natarajan V. Analysis of hybrid data security algorithms for cloud. In: Second International Conference on Networks and Advances in Computational Technologies. Springer (2021). p. 231–42.

Google Scholar

48. Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput. (2019) 10:4151–66. doi: 10.1007/s12652-017-0659-1

CrossRef Full Text | Google Scholar

49. Kaur J, Khan AI, Abushark YB, Alam MM, Khan SA, Agrawal A, et al. Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: a design perspective. Risk Manag Healthc Policy. (2020) 13:355. doi: 10.2147/RMHP.S233706

PubMed Abstract | CrossRef Full Text | Google Scholar

Keywords: network security, privacy, ANFIS, intrusion detection, IoT based networks

Citation: Akram F, Liu D, Zhao P, Kryvinska N, Abbas S and Rizwan M (2021) Trustworthy Intrusion Detection in E-Healthcare Systems. Front. Public Health 9:788347. doi: 10.3389/fpubh.2021.788347

Received: 02 October 2021; Accepted: 25 October 2021;
Published: 03 December 2021.

Edited by:

Thippa Reddy Gadekallu, VIT University, India

Reviewed by:

Randhir Kumar, Bennett University, India
Misbah Abbas, University of Science and Technology of China, China
Muhammad Baqer Mollah, Nanyang Technological University, Singapore
Praveen Kumar, VIT University, India

Copyright © 2021 Akram, Liu, Zhao, Kryvinska, Abbas and Rizwan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Natalia Kryvinska, natalia.kryvinska@fm.uniba.sk; Sidra Abbas, sidra.abbas708@gmail.com

Download