[go: up one dir, main page]

Bogan, 2025 - Google Patents

Using Machine Learning to Improve Detection of Cyberattacks Against the Internet of Medical Things (IoMT)

Bogan, 2025

View HTML
Document ID
13189061628850826160
Author
Bogan R
Publication year

External Links

Snippet

Abstract The Internet of Medical Things is a subset of the Internet of Things vulnerable to cyberattacks. This poses risks to patient safety and creates legal challenges for healthcare organizations. Strengthening this essential infrastructure is crucial to maximizing the benefits …
Continue reading at search.proquest.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications

Similar Documents

Publication Publication Date Title
Ozkan-Okay et al. A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions
Khaleel et al. Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
Anandita Iyer et al. Role of AI and its impact on the development of cyber security applications
Alshuaibi et al. Machine learning for cybersecurity issues: A systematic review
Kuraku et al. Phishing website url’s detection using nlp and machine learning techniques
Li et al. Threats and defenses in the federated learning life cycle: a comprehensive survey and challenges
Gotarane et al. A hybrid framework leveraging whale optimization and deep learning with trust-index for attack identification in iot networks
Yang et al. Graph neural backdoor: Fundamentals, methodologies, applications, and future directions
Amjath et al. Graph representation federated learning for malware detection in internet of health things
Bethu Malicious Attack Detection in IoT by Generative Adversarial Networks
Al-Sarray et al. Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning
Almazmomi Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach
Ali Machine learning for internet of things (IoT) security: a comprehensive survey
Khan et al. Predicting anomalies in computer networks using autoencoder-based representation learning
Bogan Using Machine Learning to Improve Detection of Cyberattacks Against the Internet of Medical Things (IoMT)
Bastian et al. Military and security applications: Cybersecurity
Anusha et al. Android malware detection for timely detection using multi-class deep learning methods
Chaudhary et al. Towards Adapting Federated & Quantum Machine Learning for Network Intrusion Detection: A Survey
Garg A Comprehensive Review on Security of Internet of Things using Machine Learning: Threats, Recent Advancements and Challenges.
Elmendili et al. Social Network's Security Related to Healthcare
Khaled et al. A Novel Approach for Cyber-Attack Detection in IoT Networks with Neutrosophic Neural Networks
Shara Deep learning methods for cybersecurity
Mohi-ud-din et al. A Novel Learning-Based Attack Detection System for Enhancing Security in Cyber-Physical Environments
Bassi et al. The empirical analysis of multi-objective hyperparameter optimization in software vulnerability prediction
Baazeem An Ensemble Boosting Algorithm based Intrusion Detection System for Smart Internet of Things Environment.