Adaptive secure malware efficient machine learning algorithm for healthcare data
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F23%3A10252102" target="_blank" >RIV/61989100:27240/23:10252102 - isvavai.cz</a>
Výsledek na webu
<a href="https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cit2.12200" target="_blank" >https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cit2.12200</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1049/cit2.12200" target="_blank" >10.1049/cit2.12200</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Adaptive secure malware efficient machine learning algorithm for healthcare data
Popis výsledku v původním jazyce
Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices. On the other hand, IoT-based heartbeat digital healthcare applications have been steadily increasing in popularity. These applications make a lot of data, which they send to the fog cloud to be processed further. In healthcare networks, it is critical to examine healthcare data for malicious intent. The malware is a peace code with polymorphic and metamorphic attack forms. Existing malware analysis techniques did not find malware in the content-aware heartbeat data. The Adaptive Malware Analysis Dynamic Machine Learning (AMDML) algorithm for content-aware heartbeat data in fog cloud computing is described in this article. Based on heartbeat data from health records, an adaptive method can train both pre- and post-train malware models. AMDML is based on a rule called 'federated learning,' which says that malware analysis models are made at both the local fog node and the remote cloud to meet the performance workload safely. The simulation results show that AMDML outperforms machine learning malware analysis models in terms of accuracy by 60%, delay by 50%, and detection of original heartbeat data by 66% compared to existing malware analysis schemes. (C) 2023 The Authors. CAAI Transactions on Intelligence Technology published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology and Chongqing University of Technology.
Název v anglickém jazyce
Adaptive secure malware efficient machine learning algorithm for healthcare data
Popis výsledku anglicky
Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices. On the other hand, IoT-based heartbeat digital healthcare applications have been steadily increasing in popularity. These applications make a lot of data, which they send to the fog cloud to be processed further. In healthcare networks, it is critical to examine healthcare data for malicious intent. The malware is a peace code with polymorphic and metamorphic attack forms. Existing malware analysis techniques did not find malware in the content-aware heartbeat data. The Adaptive Malware Analysis Dynamic Machine Learning (AMDML) algorithm for content-aware heartbeat data in fog cloud computing is described in this article. Based on heartbeat data from health records, an adaptive method can train both pre- and post-train malware models. AMDML is based on a rule called 'federated learning,' which says that malware analysis models are made at both the local fog node and the remote cloud to meet the performance workload safely. The simulation results show that AMDML outperforms machine learning malware analysis models in terms of accuracy by 60%, delay by 50%, and detection of original heartbeat data by 66% compared to existing malware analysis schemes. (C) 2023 The Authors. CAAI Transactions on Intelligence Technology published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology and Chongqing University of Technology.
Klasifikace
Druh
J<sub>imp</sub> - Článek v periodiku v databázi Web of Science
CEP obor
—
OECD FORD obor
20200 - Electrical engineering, Electronic engineering, Information engineering
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2023
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
CAAI Transactions on Intelligence Technology
ISSN
2468-6557
e-ISSN
2468-2322
Svazek periodika
2023
Číslo periodika v rámci svazku
3
Stát vydavatele periodika
US - Spojené státy americké
Počet stran výsledku
12
Strana od-do
—
Kód UT WoS článku
000941079300001
EID výsledku v databázi Scopus
2-s2.0-85149415025