Bogan, 2025 - Google Patents
Using Machine Learning to Improve Detection of Cyberattacks Against the Internet of Medical Things (IoMT)Bogan, 2025
View HTML- Document ID
- 13189061628850826160
- Author
- Bogan R
- Publication year
External Links
Snippet
Abstract The Internet of Medical Things is a subset of the Internet of Things vulnerable to cyberattacks. This poses risks to patient safety and creates legal challenges for healthcare organizations. Strengthening this essential infrastructure is crucial to maximizing the benefits …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ozkan-Okay et al. | A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions | |
| Khaleel et al. | Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods | |
| Anandita Iyer et al. | Role of AI and its impact on the development of cyber security applications | |
| Alshuaibi et al. | Machine learning for cybersecurity issues: A systematic review | |
| Kuraku et al. | Phishing website url’s detection using nlp and machine learning techniques | |
| Li et al. | Threats and defenses in the federated learning life cycle: a comprehensive survey and challenges | |
| Gotarane et al. | A hybrid framework leveraging whale optimization and deep learning with trust-index for attack identification in iot networks | |
| Yang et al. | Graph neural backdoor: Fundamentals, methodologies, applications, and future directions | |
| Amjath et al. | Graph representation federated learning for malware detection in internet of health things | |
| Bethu | Malicious Attack Detection in IoT by Generative Adversarial Networks | |
| Al-Sarray et al. | Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning | |
| Almazmomi | Advanced Persistent Threat Detection Using Optimized and Hybrid Deep Learning Approach | |
| Ali | Machine learning for internet of things (IoT) security: a comprehensive survey | |
| Khan et al. | Predicting anomalies in computer networks using autoencoder-based representation learning | |
| Bogan | Using Machine Learning to Improve Detection of Cyberattacks Against the Internet of Medical Things (IoMT) | |
| Bastian et al. | Military and security applications: Cybersecurity | |
| Anusha et al. | Android malware detection for timely detection using multi-class deep learning methods | |
| Chaudhary et al. | Towards Adapting Federated & Quantum Machine Learning for Network Intrusion Detection: A Survey | |
| Garg | A Comprehensive Review on Security of Internet of Things using Machine Learning: Threats, Recent Advancements and Challenges. | |
| Elmendili et al. | Social Network's Security Related to Healthcare | |
| Khaled et al. | A Novel Approach for Cyber-Attack Detection in IoT Networks with Neutrosophic Neural Networks | |
| Shara | Deep learning methods for cybersecurity | |
| Mohi-ud-din et al. | A Novel Learning-Based Attack Detection System for Enhancing Security in Cyber-Physical Environments | |
| Bassi et al. | The empirical analysis of multi-objective hyperparameter optimization in software vulnerability prediction | |
| Baazeem | An Ensemble Boosting Algorithm based Intrusion Detection System for Smart Internet of Things Environment. |