10.25673/121720">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.51-62

Multi-Class Intrusion Detection System in Internet of Medical Things Based on Hybrid Deep Learning Techniques


Aisha Essa Mohammad and Amer Abdulmajeed Abdulrahman


Abstract: The IoMT improves healthcare through smart medical devices, enabling real-time monitoring and data transmission. However, increased connectivity exposes IoMT systems to cyber threats, jeopardizing patient data confidentiality, system integrity, and availability. Traditional IDS struggle to detect sophisticated attacks, thus requiring advanced solutions. This study presents a hybrid deep learning model that integrates LSTM and DNN to improve intrusion detection in IoMT networks. The CICIoMT2024 dataset, comprising network traffic of 40 IoMT devices under 18 types of cyberattacks, was used for training and evaluation. Data preprocessing included label encoding, normalization. The LSTM component captures sequential traffic patterns, while the DNN extracts advanced features for classification. Batch normalization, dropout layers, and early stopping were implemented to improve model performance. Experimental results show that the proposed model outperforms the conventional intrusion detection system, achieving 99.6% accuracy in binary classification, 99.4% in 6-class classification, and 98.4% in 19-class classification. Compared with stand-alone models, the hybrid approach demonstrates superior accuracy and robustness. This research underscores the effectiveness of LSTM-DNN in securing IoMT networks. Future work will focus on real-time deployment, optimization of computational efficiency, and expansion of the dataset to improve cyber threat detection in medical settings.

Keywords: Internet of Medical Things (IoMT), Intrusion Detection System (IDS), Deep Learning (DL), Deep Neural Network (DNN), Long Short-Term Memory (LSTM).

DOI: 10.25673/121720

Download: PDF

References:

  1. A. A. Abdualrahman and M. K. Ibrahem, “Intrusion detection system using data stream classification,” Iraqi J. Sci., pp. 319–328, 2021, doi: 10.24996/ijs.2021.62.1.30.
  2. G. Akar, S. Sahmoud, M. Onat, Ü. Cavusoglu, and E. Malondo, “L2D2: A Novel LSTM Model for Multi-Class Intrusion Detection Systems in the Era of IoMT,” IEEE Access, vol. 13, pp. 7002–7013, 2025, doi: 10.1109/ACCESS.2025.3526883.
  3. M. Barnett, J. Womack, C. Brito, K. Miller, L. Potter, and X. L. Palmer, “Botnets in healthcare: Threats, vulnerabilities, and mitigation strategies,” in European Conf. Cyber Warfare and Security, 2024, pp. 58–65, doi: 10.34190/eccws.23.1.2345.
  4. S. F. Behadil and N. K. Mhalhal, “Mobility prediction based on deep learning approach using GPS phone data,” Ibn Al-Haitham J. Pure Appl. Sci., vol. 37, no. 4, pp. 423–438, 2024, doi: 10.30526/37.4.3916.
  5. S. Dadkhah, E. C. P. Neto, R. Ferreira, R. C. Molokwu, S. Sadeghi, and A. A. Ghorbani, “CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT,” Internet Things, vol. 28, p. 101351, 2024, doi: 10.1016/j.iot.2024.101351.
  6. S. De and S. Smith, “Batch normalization biases residual blocks towards the identity function in deep networks,” Adv. Neural Inf. Process. Syst., vol. 33, pp. 19964–19975, 2020.
  7. J. M. Ehrenfeld, “Wannacry, cybersecurity and health information technology: A time to act,” J. Med. Syst., vol. 41, no. 7, p. 1, 2017, doi: 10.1007/s10916-017-0752-1.
  8. M. L. Hernandez-Jaimes, A. Martínez-Cruz, K. A. Ramírez-Gutiérrez, and E. Guevara-Martínez, “Enhancing machine learning approach based on Nilsimsa fingerprinting for ransomware detection in IoMT,” IEEE Access, 2024, doi: 10.1109/ACCESS.2024.3480889.
  9. W. F. Kamil and I. J. Mohammed, “Adapted CNN-SMOTE-BGMM deep learning framework for network intrusion detection using unbalanced dataset,” Iraqi J. Sci., pp. 4846–4864, 2023, doi: 10.24996/ijs.2023.64.9.43.
  10. W. F. Kamil and I. J. Mohammed, “Deep learning model for intrusion detection system utilizing convolution neural network,” Open Eng., vol. 13, no. 1, p. 20220403, 2023, doi: 10.1515/eng-2022-0403.
  11. D. Koutras, G. Stergiopoulos, T. Dasaklis, P. Kotzanikolaou, D. Glynos, and C. Douligeris, “Security in IoMT communications: A survey,” Sensors, vol. 20, no. 17, p. 4828, 2020, doi: 10.3390/s20174828.
  12. E. Poslavskaya and A. Korolev, “Encoding categorical data: Is there yet anything ‘hotter’ than one-hot encoding?,” arXiv preprint arXiv:2312.16930, 2023, doi: 10.48550/arXiv.2312.16930.
  13. A. D. Saleem and A. A. Abdulrahman, “Attacks detection in Internet of Things using machine learning techniques: a review,” J. Appl. Eng. Technol. Sci., vol. 6, no. 1, pp. 684–703, 2024, doi: 10.37385/jaets.v6i1.4878.
  14. K. Saurabh, S. Sood, P. A. Kumar, U. Singh, R. Vyas, O. P. Vyas, and R. Khondoker, “LBDMIDS: LSTM-based deep learning model for intrusion detection systems for IoT networks,” in 2022 IEEE World AI IoT Congress (AIIoT), 2022, pp. 753–759, doi: 10.48550/arXiv.2207.00424.
  15. V. Sze, Y.-H. Chen, T.-J. Yang, and J. S. Emer, “Efficient processing of deep neural networks: A tutorial and survey,” Proc. IEEE, vol. 105, no. 12, pp. 2295–2329, 2017, doi: 10.1109/JPROC.2017.2761740.
  16. P. Udayakumar and R. Anandan, “Evaluation of protocol-centric IDS for the IoMT leveraging ML techniques,” in 2024 IEEE World AI IoT Congress (AIIoT), 2024, pp. 546–551, doi: 10.1109/AIIoT61789.2024.10578945.
  17. H. Naeem, A. Alsirhani, F. M. Alserhani, F. Ullah, and O. Krejcar, “Augmenting Internet of Medical Things security: Deep ensemble integration and methodological fusion,” Comput. Model. Eng. Sci., vol. 141, no. 3, pp. 2185–2223, 2024.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.