An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
Abstract
:1. Introduction
2. Related Work
2.1. Anomaly-Based Intrusion Detection Systems (AIDSs) for IoMT
2.2. Machine Learning Algorithms for IoT Intrusion Detection
2.2.1. Decision Tree (DT)
2.2.2. Random Forest (RF)
2.2.3. Naïve Bayes (NB)
2.2.4. Logistic Regression (LR)
2.2.5. Support Vector Machine (SVM)
2.2.6. K-Nearest Neighbor (KNN)
3. Evaluation Metrics
- Accuracy: shows the overall success of the model by comparing the amount of the correctly classified attack and normal instances to the total amount of instances.Accuracy = (TP + TN)/(TP + TN + FP + FN)
- Precision: estimates the overall effectiveness of the model by calculating the percentage that an observation recognized as an attack is actually an attack observation.Precision = TP/(TP + FP)
- Recall: shows the overall success of the model by computing the percentage that an actual attack observation is correctly classified.Recall = TP/(TP + FN)
- F1-score: is calculated by the precision and recall metrics as their harmonious mean. It is a statistical function for estimating the accuracy of the model. As the precision and recall of a model approach the value of 100%, the F1-score and accuracy are maximized, and every instance is classified correctly.F1-score = 2 × (Recall × Precision)/(Recall + Precision)
4. Datasets for AIDS in IoT
4.1. LWSNDR Dataset
4.2. A Dataset for Classifying IoT Devices Using Network Traffic Characteristics
4.3. Bot-IoT Dataset
4.4. A Dataset for Detecting DoS Attacks on IoT Devices Using Network Traffic Traces
4.5. ToN_IoT Telemetry Dataset
4.5.1. Testbed “Edge” Layer
4.5.2. Testbed “Fog” Layer
4.5.3. Testbed “Cloud” Layer
4.5.4. ToN_IoT Datasets
4.6. IoT Device Behavior Datasets
5. Scenario Architecture
- “bio-sensors”, a type of IoMT sensor, whose purpose is to collect vital signs (e.g., blood pressure, body temperature) of the patient;
- “context-aware sensors”, another type of IoMT sensor, for gathering context information (e.g., air pressure, humidity, or room temperature) from the patient environment;
- “IoMT actuators”, for supporting the real-time provisioning of medical treatment (e.g., an insulin pump, which may be controlled remotely to inject the patient with insulin).
6. Proposed Anomaly-Based IDS
6.1. System Description
6.2. Monitoring and Data Acquisition (MDA) Component
6.3. Central Detection (CD) Component
- Monitor the behavior of the gateway hosting it and collect relevant behavior data, such as the accumulated CPU energy consumption, during a specific monitoring period (i.e., sampling period);
- Monitor the network traffic passing through the gateway and gather relevant network traffic data, such as source IP address, destination IP address, connection status information, and packet content information, during a specific monitoring period (i.e., sampling period);
- Receive the reports transmitted by the MDA components running on the IoMT devices that are connected to the gateway;
- Leverage the aforementioned data in order to identify whether an attack incident has occurred in the IoMT edge network, and trigger a corresponding security alert.
7. Performance Evaluation
7.1. Dataset Pre-Processing and Normalisation
7.1.1. Dataset Pre-Processing
7.1.2. Normalization
7.2. Training Process of ML Algorithms
7.3. Performance Evaluation Results
8. Challenges and Future Work
9. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Rodrigues, J.J.P.C.; Segundo, D.B.D.R.; Junqueira, H.A.; Sabino, M.H.; Prince, R.M.I.; Al-Muhtadi, J.; De Albuquerque, V.H.C. Enabling Technologies for the Internet of Health Things. IEEE Access 2018, 6, 13129–13141. [Google Scholar] [CrossRef]
- Papaioannou, M.; Karageorgou, M.; Mantas, G.; Sucasas, V.; Essop, I.; Rodriguez, J.; Lymberopoulos, D. A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). Trans. Emerg. Telecommun. Technol. 2020, 4049. [Google Scholar] [CrossRef]
- Islam, S.M.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.-S. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of Threats to the Internet of Things. IEEE Commun. Surv. Tutor. 2019, 21, 1636–1675. [Google Scholar] [CrossRef]
- Zhang, M.; Raghunathan, A.; Jha, N.K. Trustworthiness of Medical Devices and Body Area Networks. Proc. IEEE 2014, 102, 1174–1188. [Google Scholar] [CrossRef]
- Karageorgou, M.; Mantas, G.; Essop, I.; Rodriguez, J.; Lymberopoulos, D. Cybersecurity attacks on medical IoT devices for smart city healthcare services. In IoT Technologies in Smart Cities: From Sensors to Big Data, Security and Trust; Institution of Engineering and Technology (IET): London, UK, 2020; pp. 171–187. [Google Scholar]
- Essop, I.; Ribeiro, J.C.; Papaioannou, M.; Zachos, G.; Mantas, G.; Rodriguez, J. Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks. Sensors 2021, 21, 1528. [Google Scholar] [CrossRef]
- Gope, P.; Hwang, T. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network. IEEE Sens. J. 2016, 16, 1368–1376. [Google Scholar] [CrossRef]
- Alsubaei, F.; Abuhussein, A.; Shiva, S. Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. In Proceedings of the 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), Singapore, 9 October 2017; pp. 112–120. [Google Scholar]
- Ribeiro, J.; Saghezchi, F.B.; Mantas, G.; Rodriguez, J.; Abd-Alhameed, R.A. HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android. IEEE Access 2020, 8, 23154–23168. [Google Scholar] [CrossRef]
- Ribeiro, J.; Saghezchi, F.B.; Mantas, G.; Rodriguez, J.; Shepherd, S.J.; Abd-Alhameed, R.A. An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. Mob. Netw. Appl. 2019, 25, 164–172. [Google Scholar] [CrossRef]
- Ribeiro, J.; Mantas, G.; Saghezchi, F.B.; Rodriguez, J.; Shepherd, S.J.; Abd-Alhameed, R.A. Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Springer: Cham, Switzerland, 2018; Volume 263, pp. 139–148. [Google Scholar]
- Asharf, J.; Moustafa, N.; Khurshid, H.; Debie, E.; Haider, W.; Wahab, A. A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics 2020, 9, 1177. [Google Scholar] [CrossRef]
- Thamilarasu, G.; Odesile, A.; Hoang, A. An Intrusion Detection System for Internet of Medical Things. IEEE Access 2020, 8, 181560–181576. [Google Scholar] [CrossRef]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A.N. TON-IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Kotsiantis, S.B. Decision trees: A recent overview. Artif. Intell. Rev. 2011, 39, 261–283. [Google Scholar] [CrossRef]
- Géron, A. Hands-On Machine Learning with Scikit-Learn and Tensor Flow: Concepts, Tools, and Techniques to Build Intelligent Systems; O’Reilly Media: Sebastopol, CA, USA, 2017. [Google Scholar]
- Breiman, L. Random Forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef] [Green Version]
- Doshi, R.; Apthorpe, N.; Feamster, N. Machine Learning DDoS Detection for Consumer Internet of Things Devices. In Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018; pp. 29–35. [Google Scholar] [CrossRef] [Green Version]
- D’Agostini, G. A multidimensional unfolding method based on Bayes’ theorem. Nucl. Inst. Methods Phys. Res. A 1995, 362, 487–498. [Google Scholar] [CrossRef]
- Subba, B.; Biswas, S.; Karmakar, S. Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression. In Proceedings of the 2015 Annual IEEE India Conference (INDICON), New Delhi, India, 17–20 December 2015. [Google Scholar]
- Huraj, L.; Horak, T.; Strelec, P.; Tanuska, P. Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci. 2021, 11, 1847. [Google Scholar] [CrossRef]
- Moustafa, N.; Hu, J.; Slay, J. A holistic review of Network Anomaly Detection Systems: A comprehensive survey. J. Netw. Comput. Appl. 2019, 128, 33–55. [Google Scholar] [CrossRef]
- Verma, A.; Ranga, V. Machine Learning Based Intrusion Detection Systems for IoT Applications. Wirel. Pers. Commun. 2020, 111, 2287–2310. [Google Scholar] [CrossRef]
- Bhuyan, M.H.; Bhattacharyya, D.K.; Kalita, J.K. Network Anomaly Detection: Methods, Systems and Tools. IEEE Commun. Surv. Tutor. 2013, 16, 303–336. [Google Scholar] [CrossRef]
- Suthaharan, S.; Alzahrani, M.; Rajasegarar, S.; Leckie, C.; Palaniswami, M. Labelled data collection for anomaly detection in wireless sensor networks. In Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010, Brisbane, QLD, Australia, 7–10 December 2010; pp. 269–274. [Google Scholar]
- Sivanathan, A.; Gharakheili, H.H.; Loi, F.; Radford, A.; Wijenayake, C.; Vishwanath, A.; Sivaraman, V. Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics. IEEE Trans. Mob. Comput. 2019, 18, 1745–1759. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
- Hamza, A.; Gharakheili, H.H.; Benson, T.A.; Sivaraman, V. Detecting Volumetric Attacks on IoT Devices via SDN-Based Monitoring of MUD Activity. In Proceedings of the 2019 ACM Symposium on SDN Research, San Jose, CA, USA, 3–4 April 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 36–48. [Google Scholar]
- Zachos, G.; Essop, I.; Mantas, G.; Porfyrakis, K.; Ribeiro, J.C.; Rodriguez, J. Generating IoT Edge Network Datasets based on the TON_IoT Telemetry Dataset. In Proceedings of the 2021 IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Virtual Event, 25–27 October 2021. [Google Scholar]
- Node-RED. Available online: https://nodered.org/ (accessed on 13 August 2021).
- ToN_IoT Datasets | IEEE DataPort. Available online: https://ieee-dataport.org/documents/toniot-datasets (accessed on 19 October 2021).
- What is VMware NSX? Network Security Virtualization Platform AU. Available online: https://www.vmware.com/au/products/nsx.html (accessed on 13 August 2021).
- Stojmenovic, I.; Wen, S. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
- Österlind, F.; Dunkels, A.; Eriksson, J.; Finne, N.; Voigt, T. Cross-Level Sensor Network Simulation with COOJA. In Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14–16 November 2006; pp. 641–648. [Google Scholar]
- Moteiv Corporation Tmote Sky—Ultra Low Power IEEE 802.15.4 Compliant Wireless Sensor Module. Available online: http://www.crew-project.eu/sites/default/files/tmote-sky-datasheet.pdf (accessed on 6 September 2021).
- International Telecommunications Union—Telecommunication Standardization Sector (ITU-T). Recommendation ITU-T Y.2060: Overview of the Internet of Things. Available online: https://www.itu.int/ITUT/recommendations/rec.aspx?rec=y.2060 (accessed on 19 October 2021).
- Scikit-Learn. Available online: https://scikit-learn.org/stable/ (accessed on 20 August 2021).
- Latif, S.; Zou, Z.; Idrees, Z.; Ahmad, J. A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access 2020, 8, 89337–89350. [Google Scholar] [CrossRef]
- Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605. [Google Scholar] [CrossRef]
ML Algorithm | Advantages | Drawbacks | Studies |
---|---|---|---|
Decision Tree | Simple to use. Performance is not different for linearly and non-linearly separated parameters. | Vulnerable to overfitting. Unstable (i.e., small data variation may result in the construction of extremely different DTs). | [16,17] |
Random Forest | Resistant to overfitting. Feature selection is performed inherently.Fewer inputs required. | Fast only in the case of a small number of trees. May require large datasets. | [13,15,17,18,19] |
Naïve Bayes | Can be used in both binary and multi- class classification. Simple to use. Few samples required to train. | The assumption about features independence can lead to low classification accuracy. “Zero frequency” problem. In the case where a class does not appear during training, it will be assigned a probability of zero. | [13,20] |
Logistic Regression | Simple to use. Easy to implement. | Difficult to perform classification in case of non-linearly separable classes. | [15,21,22] |
Support Vector Machine | Better performance in datasets with few classes and many instances per class. Scalable. Reduced storage requirements. | Finding the most appropriate kernel function is a challenge. | [13] |
K-Nearest Neighbor | Simple to use. Easy to implement. | Difficult to find the optimal k. The computational speed decreases as the number of the k variable, the number of data points, or the number of classes increases. | [13,15] |
Predicted Label | |||
---|---|---|---|
Positive (Attack) | Negative (Normal) | ||
Actual Label | Positive (Attack) | True Positive (TP) | False Negative (FN) |
Negative (Normal) | False Positive (FP) | True Negative (TN) |
ID | Feature | Description |
---|---|---|
1 | ts | Timestamp of connection between flow identifiers |
2 | src_ip | Source IP addresses that originate endpoints’ IP addresses |
3 | src_port | Source ports that originate endpoint’s TCP/UDP ports |
4 | dst_ip | Destination IP addresses that respond to endpoint’s IP addresses |
5 | dst_port | Destination ports that respond to endpoint’s TCP/UDP ports |
6 | proto | Transport layer protocols of flow connections |
7 | service | Dynamically detected protocols, such as DNS, HTTP, and SSL |
8 | duration | The time of the packet connections, which is estimated by subtracting “time of last packet seen” and “time of first packet seen” |
9 | src_bytes | Source bytes that are originated from payload bytes of TCP sequence numbers |
10 | dst_bytes | Destination bytes that are responded payload bytes from TCP sequence numbers |
11 | conn_state | Various connection states, such as S0 (connection without replay), S1 (connection established), and REJ (connection rejected) |
12 | missed_bytes | Number of missing bytes in content gaps |
13 | src_pkts | Number of original packets that is estimated from source systems |
14 | src_ip_bytes | Number of original IP bytes that is the total length of IP header field of source systems |
15 | dst_pkts | Number of destination packets that is estimated from destination systems |
16 | dst_ip_bytes | Number of destination IP bytes that is the total length of IP header field of destination systems |
17 | dns_query | Domain name subjects of the DNS queries |
18 | dns_qclass | Values that specify the DNS query classes |
19 | dns_qtype | Value that specifies the DNS query types |
20 | dns_rcode | Response code values in the DNS responses |
21 | dns_AA | Authoritative answers of DNS, where T denotes server is authoritative for query |
22 | dns_RD | Recursion desired of DNS, where T denotes request recursive lookup of query |
23 | dns_RA | Recursion available of DNS, where T denotes server supports recursive queries |
24 | dns_rejected | DNS rejection, where the DNS queries are rejected by the server |
25 | ssl_version | SSL version that is offered by the server |
26 | ssl_cipher | SSL cipher suite that the server chose |
27 | ssl_resumed | SSL flag indicates the session that can be used to initiate new connections, where T refers to the SSL connection being initiated |
28 | ssl_established | SSL flag indicates establishing connections between two parties, where T refers to establishing the connection |
29 | ssl_subject | Subject of the X.509 cert offered by the server |
30 | ssl_issuer | Trusted owner/originator of SLL and digital certificate (certificate authority) |
31 | http_trans_depth | Pipelined depth into the HTTP connection |
32 | http_method | HTTP request methods, such as GET, POST, and HEAD |
33 | http_uri | URIs used in the HTTP request |
34 | http_version | The HTTP versions utilized, such as V1.1 |
35 | http_request_body_len | Actual uncompressed content sizes of the data transferred from the HTTP client |
36 | http_response_body_len | Actual uncompressed content sizes of the data transferred from the HTTP server |
37 | http_status_code | Status codes returned by the HTTP server |
38 | http_user_agent | Values of the User-Agent header in the HTTP protocol |
39 | http_orig_mime_types | Ordered vectors of mime types from source system in the HTTP protocol |
40 | http_resp_mime_types | Ordered vectors of mime types from destination system in the HTTP protocol |
41 | weird_name | Names of anomalies/violations related to protocols that happened |
42 | weird_addl | Additional information is associated to protocol anomalies/violations |
43 | weird_notice | Indicates if the violation/anomaly was turned into a notice |
44 | label | Tags normal and attack records, where 0 indicates normal and 1 indicates attacks |
45 | type | Tags attack categories, such as normal, DoS, DDoS, and backdoor attacks, and normal records |
Feature | Description |
---|---|
sim time | simulation time |
clock_time() | clock time (i.e., by default, 128 ticks/second) |
ID | Mote ID |
P | label |
rimeaddr | rime address |
seqno | sequence number |
all_cpu | accumulated CPU energy consumption during the simulation |
all_lpm | accumulated low power mode energy consumption during the simulation |
all_transmit | accumulated transmission energy consumption during the simulation |
all_listen | accumulated listen energy consumption during the simulation |
all_idle_transmit | accumulated idle transmission energy consumption during the simulation |
all_idle_listen | accumulated idle listen energy consumption during the simulation |
cpu | CPU energy consumption for this cycle of 2 s |
lpm | LPM energy consumption for this cycle of 2 s |
transmit | transmission energy consumption for this cycle of 2 s |
listen | listen energy consumption for this cycle of 2 s |
idle_transmit | idle transmission energy consumption for this cycle of 2 s |
idle_listen | idle listen energy consumption for this cycle of 2 s |
Feature | Description |
---|---|
CPU usage | Amount/percentage of used CPU resources |
CPU processes | Amount of active CPU processes |
MEM usage | Amount/percentage of used internal memory resources |
Disk usage | Amount/percentage of used external storage resources |
Wi-Fi usage | Amount of bandwidth used by the Wi-Fi interface |
Set of energy consumption features | Set of features (e.g., “powertrace” features in [7]) regarding energy consumption during the different modes of the IoMT device |
Feature | Description |
---|---|
CPU usage | Amount/percentage of used CPU resources |
CPU processes | Amount of active CPU processes |
MEM usage | Amount/percentage of used internal memory resources |
Disk usage | Amount/percentage of used external storage resources |
Wi-Fi usage | Amount of bandwidth used by the Wi-Fi interface |
Set of energy consumption features | Set of features regarding energy consumption during the different modes of the gateway |
Feature | Description |
---|---|
Source IP address | Source IP address of the sender endpoint |
Destination IP address | Destination IP address of the sender endpoint |
Packet size | Length of packet in bytes |
Communication protocol information features | Features related to the protocol used for the transmission of the packet |
Function | Explanation of Usage |
---|---|
OrdinalEncoder() | Pre-processing of the data of the datasets |
ColumnTransformer() | Pre-processing of the data of the datasets |
MinMaxScaler() | Normalization of the data of the datasets |
train_test_split() | Split of a dataset into training and testing parts |
DecisionTreeClassifier() | Implementation of a decision tree algorithm to train and evaluate |
RandomForestClassifier() | Implementation of a random forest algorithm to train and evaluate |
LogisticRegression() | Implementation of a logistic regression algorithm to train and evaluate |
GaussianNB() | Implementation of a naïve Bayes algorithm to train and evaluate |
SVC() | Implementation of a support vector machine algorithm to train and evaluate |
KNeighborsClassifier() | Implementation of a k-nearest neighbor algorithm to train and evaluate |
StratifiedKFold() | Split of a training part of a dataset into k-folds to perform k-fold cross validation |
cross_validate() | Performing k-fold cross validation |
ML Algorithm | Hyperparameters |
---|---|
Decision Tree |
|
Random Forest |
|
Naïve Bayes | The Gaussian variant of the NB algorithm was used. |
Logistic Regression | - |
Support Vector Machine | The Gaussian radial basis function (RBF) was set as the kernel function. |
K-Nearest Neighbor |
|
ML Algorithm | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|
DT | 0.9997 | 0.9997 | 0.9991 | 0.9994 |
NB | 0.3444 | 0.2791 | 0.9997 | 0.4364 |
LR | 0.9870 | 0.9552 | 0.9955 | 0.9750 |
RF | 0.9996 | 0.9989 | 0.9995 | 0.9992 |
KNN | 0.9998 | 0.9995 | 0.9997 | 0.9996 |
SVM | 0.9873 | 0.9530 | 0.9993 | 0.9756 |
ML Algorithm | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|
DT | 0.9889 | 0.9742 | 0.9587 | 0.9664 |
NB | 0.9613 | 0.8218 | 0.9805 | 0.8942 |
LR | 0.9785 | 0.9378 | 0.9326 | 0.9352 |
RF | 0.9900 | 0.9718 | 0.9684 | 0.9701 |
KNN | 0.9887 | 0.9752 | 0.9566 | 0.9658 |
SVM | 0.9785 | 0.9375 | 0.9333 | 0.9354 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zachos, G.; Essop, I.; Mantas, G.; Porfyrakis, K.; Ribeiro, J.C.; Rodriguez, J. An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks. Electronics 2021, 10, 2562. https://doi.org/10.3390/electronics10212562
Zachos G, Essop I, Mantas G, Porfyrakis K, Ribeiro JC, Rodriguez J. An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks. Electronics. 2021; 10(21):2562. https://doi.org/10.3390/electronics10212562
Chicago/Turabian StyleZachos, Georgios, Ismael Essop, Georgios Mantas, Kyriakos Porfyrakis, José C. Ribeiro, and Jonathan Rodriguez. 2021. "An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks" Electronics 10, no. 21: 2562. https://doi.org/10.3390/electronics10212562
APA StyleZachos, G., Essop, I., Mantas, G., Porfyrakis, K., Ribeiro, J. C., & Rodriguez, J. (2021). An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks. Electronics, 10(21), 2562. https://doi.org/10.3390/electronics10212562