Adaptive secure malware efficient machine learning algorithm for healthcare data

dc.contributor.authorMohammed, Mazin Abed
dc.contributor.authorLakhan, Abdullah
dc.contributor.authorZebari, Dilovan Asaad
dc.contributor.authorAbdulkareem, Karrar Hameed
dc.contributor.authorNedoma, Jan
dc.contributor.authorMartinek, Radek
dc.contributor.authorTariq, Usman
dc.contributor.authorAlhaisoni, Majed
dc.contributor.authorTiwari, Prayag
dc.date.accessioned2023-12-13T13:21:16Z
dc.date.available2023-12-13T13:21:16Z
dc.date.issued2023
dc.description.abstractMalware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices. On the other hand, IoT‐based heartbeat digital healthcare applications have been steadily increasing in popularity. These applications make a lot of data, which they send to the fog cloud to be processed further. In healthcare networks, it is critical to examine healthcare data for malicious intent. The malware is a peace code with polymorphic and metamorphic attack forms. Existing malware analysis techniques did not find malware in the content‐aware heartbeat data. The Adaptive Malware Analysis Dynamic Machine Learning (AMDML) algorithm for content‐aware heartbeat data in fog cloud computing is described in this article. Based on heartbeat data from health records, an adaptive method can train both pre‐ and post‐ train malware models. AMDML is based on a rule called ‘federated learning,’ which says that malware analysis models are made at both the local fog node and the remote cloud to meet the performance workload safely. The simulation results show that AMDML out performs machine learning malware analysis models in terms of accuracy by 60%, delay by 50%, and detection of original heartbeat data by 66% compared to existing malware analysis schemes.cs
dc.description.sourceWeb of Sciencecs
dc.identifier.citationCAAI Transactions on Intelligence Technology. 2023.cs
dc.identifier.doi10.1049/cit2.12200
dc.identifier.issn2468-6557
dc.identifier.issn2468-2322
dc.identifier.urihttp://hdl.handle.net/10084/151823
dc.identifier.wos000941079300001
dc.language.isoencs
dc.publisherWileycs
dc.relation.ispartofseriesCAAI Transactions on Intelligence Technologycs
dc.relation.urihttps://doi.org/10.1049/cit2.12200cs
dc.rights© 2023 The Authors. CAAI Transactions on Intelligence Technology published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology and Chongqing University of Technology.cs
dc.rights.accessopenAccesscs
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/cs
dc.subjectbig datacs
dc.subjectInternet of Thingscs
dc.subjectmachine learningcs
dc.titleAdaptive secure malware efficient machine learning algorithm for healthcare datacs
dc.typearticlecs
dc.type.statusPeer-reviewedcs
dc.type.versionpublishedVersioncs

Files

Original bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
2468-6557-2023.pdf
Size:
1.88 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
license.txt
Size:
718 B
Format:
Item-specific license agreed upon to submission
Description: