- 1Department of Mathematics, School of Science, Nanjing University of Science and Technology, Nanjing, China
- 2Department of Information Systems, Faculty of Management, Comenius University in Bratislava, Bratislava, Slovakia
- 3Department of Computer Science, COMSATS University, Islamabad, Pakistan
- 4Department of Computer Science, Kinnaird College for Women, Lahore, Pakistan
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS) play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a massive technology with security threats on the network layer, as it is considered the most common source for communication and data storage platforms. The security of data servers in all sectors (mainly healthcare) has become one of the most crucial challenges for researchers. This paper proposes an approach for effective intrusion detection in the e-healthcare environment to maintain PHR in a safe IoT-net using an adaptive neuro-fuzzy inference system (ANFIS). In the proposed security model, the experiments present a security tool that helps to detect malicious network traffic. The practical implementation of the ANFIS model on the MATLAB framework with testing and training results compares the accuracy rate from the previous research in security.
Introduction
Internet of Things (IoT)-based network systems (IoT-net) are considered as emerging advancements in the field of technology, where cloud network-based servers provide communication, storage, and problem-solving facilities, but these sorts of systems also contain security threats and issues as well (1–4). The network user can access its facility by using an internet source (5). The multiple hardware and software-based environments provide data and information to its end users. Some of the most prominent organizations like Apple, HP, Amazon, IBM, Oracle, Intel, etc., use cloud computing (CC) techniques. CC is based on three-layer models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Similarly, cloud networks are based on four types: private, public, hybrid, and community (6, 7).
In a cloud networking environment, problems in security and authorization are the key risks. Likewise, there are numerous risks which users and network service providers both face. Mainly, security issues arise from the data storage and networking side (8, 9). Many security enhancement-based algorithms have been proposed to make the IoT-net servers secure. Many cryptographic algorithms like RSA, AES, CRT-RSA, DES, blockchain, machine learning, and artificial intelligence-based code have been proposed to enhance security. Homomorphic encryption algorithms (10–12) help to provide better security to detect non-authorization factors. Many machine learning (13) and artificial intelligence-based security algorithms help to provide better data networking with new classification and risk assessment techniques. However, many elements remain unsolved and require more improvement and advancement in areas such as cost management, resource utilization, speed prediction, and security, most importantly.
IoT also plays a magnificent role in the healthcare sector concerning data storage, online systems, software, laboratories, pathology, clinic sessions, etc. Medical patient health records (PHR) are an emerging version of IT and smart healthcare records (5). However, here we encounter problems of data security and privacy of PHR (1, 14–18). To overcome the PHR security issue, many researchers have been working on using blockchain and many other artificial intelligence techniques, which allows clinical expertise, patients, laboratories, and the world to be connected.
One of the most effective artificial intelligence techniques is called the artificial neural inference system (ANFIS), which is the combination of an artificial neural network (ANN) and a fuzzy inference system (FIS). ANFIS is mainly used as a computational model for resolving uncertainties, reasoning, and reducing security threats from networks and cloud servers (1). It helps the systems and servers examine the risk of data and information. ANNs work on the principle of mathematical calculation. The ANFIS model is based on if-then rule statements and crisp values, and the final ANFIS surface model uses result accuracy rate. It uses most of its computational time for data classification and estimation.
Problem Statement
In smart e-healthcare systems, networking servers provide a better intermediary platform for data storage, communication, and many other aspects. The end users (doctors, clinical experts, patients, laboratories) get the opportunity to access the PHR and access the cloud servers. It can be any authorized person. It is essential to detect and classify malicious activities and network traffic. The classification of network traffic and attack type detection helps make the system more secure and detect network intrusion.
Motivation
In this research paper, we discuss the existing security risks in IoT-net-based PHR. We classify these issues in managing risk, end-user risk, organizational risk, privacy risk, and many more. Our main agenda is to propose a less risky cloud network for everyone. We represent the list of shortcomings in existing malicious network traffic, and this will benefit the networking service provider and security handler community to comprehend the security issue.
Contribution
In this research, we try to implement the ANFIS model to detect network attacks on database servers. The main agenda is to detect the unauthorized access of users by using an ANFIS-based intrusion detection system. The proposed security algorithm helps to collect malicious activities or information from network traffic. Based on the if-then rule statement and ANFIS-based data classification which can help detect the intrusion attack, the system can determine if the cloud server has been hit by an intruder or not. If there is an attack, identifying the type of attack helps researchers implement precautionary measures to overcome the loss or block the malicious incoming traffic.
Organization
The rest of the research paper is organized as follows: The section literature review discusses the literature review of the previously proposed security approaches. After that, section proposed methodology discusses the proposed work with the working of ANFIS and the proposed security algorithm along with its method. Similarly, section experimental analysis and results discusses the implementation, results, and discussion. Moreover, lastly, section conclusion discusses the conclusion and future work.
Literature Review
According to previous research (1), healthcare-based networking servers require more security and a safe network architecture to provide confidentiality, integrity, privacy, and authentication to its patients, doctors, and management. The author proposed the ANFIS-based data classifier and security provider tool or model for making cloud servers more secure with a higher accuracy rate and smaller error rate. Detection of security attacks and malicious network traffic is considered as the most topical issue for network security (19–23). Therefore, previous research (24) presented an ANFIS-based security framework for classification of attacks and identifying their type.
In another study (25), the research mainly focuses on the interoperability of the cloud server platform and its reliability. The paper uses the hybrid approach of the squirrel search genetic algorithm with the combination of ANFIS to perform better functionality and remove uncertainties of servers by providing a higher accuracy rate. Also, in a previous work (26), an SDN anomaly detection system was proposed to detect malicious behavior and intrusion attacks using the cloud medium. The detection system identified the trusted edge for data or information sharing and communication. Based on multiple parameters, the implementation of the proposed systems showed better performance results. Here Table 1 represents the ANFIS methodology used for security purposes like in clustering, classification, accuracy, performance evaluation, etc.
In many previous kinds of research, the communication between devices and multiple systems can also cause security threats and need efficient and enhanced network capacities during communication. Hence in a previous research (33), the author used 5G and the multiple-input multiple-output (MIMO) concept to enhance the network capacity and area coverage capacity. Similarly, in another paper (19), the author proposed the ANN technique to detect and identify intrusion attacks in android systems.
In a previous study (34), the author dealt with the security factor of the cloud to improve its performance using the AI technique. The proposed approach helped to overcome the flaw of data breaching and non-authorization access on cloud servers. They utilized different labels to restrict access to specific edge limits to ensure accuracy in decision making. It helped the systems to store a large amount of data securely on cloud servers.
In an earlier paper (35), the study presented fuzzy-based detection schemes by various machine learning techniques and data mining algorithms to cope with multiple types of malicious attacks or intrusion. This paper first categorized their contribution in two parts, intrusion and detection, and then used fuzzy techniques for classification and identification. Then they listed the shortcomings and merits of the ID detection based on fuzzy techniques and algorithms.
In another research paper (36), the author presented a detailed survey on anomaly detection schemes and fuzzy inference systems. This paper mainly focused on combining fuzzy inference systems and machine learning algorithms for the intrusion detection process. It summarized the research with the contributions and shed light on the shortcomings and benefits of FIS. Then, finally, it concluded with future findings and issues in the anomaly detection scheme.
CC is the computing solution that allows multiple end users to connect, share, communicate, and store data or information. Fault tolerance is considered the main concern in data reliability. Therefore, in a previous research (37), detailed analysis was presented to detect the nature of the error and proper implementation of the FIS technique to the response. The process of checkpoints was used to check the intensity of the error.
Table 2 represents the methodology used for cloud security based on previous research work.
In earlier research (48), a comprehensive review discussed CC and IoT in the healthcare sector including smart systems, smart applications, smart software, smart hospitals, and smart record systems. The study presented the IoT-based smart cloud paradigm in the healthcare sector. Similarly, In an earlier work (49), an ANFIS-based healthcare system was proposed to avoid network security risks. The proposed system and already existing ANFIS-based system were compared to evaluate the performance.
Based on previous work, ANFIS is considered an advanced technique for data evaluation, classification, clustering, increased accuracy rate, and detecting various network or systems attacks or any malicious activities on cloud infrastructure to provide a trustful environment to its end users.
Proposed Methodology
We propose a tuned version of the ANFIS model to detect intrusion attacks in cloud database servers. We mainly focus on identifying the unauthorized access of end users to systems and diagnosing the type of network attack. The proposed security algorithm will help systems to detect malicious activities or irrelevant information from network traffic. The coming subsection will help understand the ANFIS model's working and the proposed technique's flow chart.
Architecture and Working of ANFIS-Based Systems
To study fuzzy rules-based non-linear systems, the fuzzy inference system (FIS) is considered an efficient methodology. Similarly, artificial neural networks (ANNs) work on neurons and the artificial Intelligence technique. So, an artificial neural fuzzy inference system (ANFIS) is the combination of FIS and ANN, which works on the principle of neural networks and follows the efficiency of FIS. ANFIS uses the hybrid Sugeno-type methodology to specify the input parameters. This method trains the membership function based on input parameters to get the trained dataset. ANFIS is also known for its the parameters which can validate the model. ANFIS is based on a multiple layer architecture, where every layer keeps forwarding the input parameters for continuous working. More detail about the architecture and working of the ANFIS architecture is presented in Figure 1.
The architecture of the ANFIS methodology almost resembles that of the Sugeno-type model, as shown in Figure 1. The model-based rule sets are as follow:
• If x is A_1 and y is B_1 then f_1 = p_1 x + q_1 y + r_1
• If x is A_2 and y is B_2 then f_2 = p_2 x + q_2 y + r_2
The working of each layer is explained with mathematical equations as listed below: Layer 1 shows the input parameters and fuzzification, where Ni (N is node) is adaptive to N func (func is function), as represented in Equations 1 and 2.
Layer 2 shows the fuzzy rule generation phase, where every N computes and sets rules by the multiplication process, as represented in Equation 3.
Layer 3 shows the normalization phase, where every neuron is normalized based on the effect of the fuzzy rule sets, as represented in Equation 4.
Layer 4 shows the implication phase, where every input value is set as an input parameter, as represented in Equation 5.
Layer 5 shows the final result or output of the complete process, where the sum of the input values are computed, as represented in Equation 6.
Figure 2 shows the ANFIS-based controller, which helps the systems detect attacks (ANFIS-C). The controller helps to detect the type of attack based on input parameters and membership function. Through the learning process, ANFIS-C adjusts the initial and processed parameters. The least-square method is used here to obtain hybrid propagation. The ANFIS-C alters the initial and processed parameters based on the error rate (here, error rate is calculated with a difference of two output values before processing and after ANFIS-C).
Figure 3 shows the working of the ANFIS-based intelligence system. The initial step involves loading input parameters, and the ANFIS-based classifier evaluates the functions and detects the error rate, intelligence method, and other learning attributes. After that, the training phase defines the initial and processed membership function along with its parameters. Then, after passing from the testing phase, it sets rules and defines membership functions. At last, the ANFIS-based system stores processed parameters and processed attributes.
Experimental Analysis and Results
The ANFIS model is used to detect the type of attack based on rule viewer, membership function, and surface viewer. For the practical implementation of the ANFIS model, we use the MATLAB framework for experiments and results. We use dataset pf KDDcup 99 for intrusion detection. This dataset consists of 41 features of the network and five network types of intrusions. The network is observed for around 7 weeks to collate more accurate and precise data. We use an ANFIS-based classifier for detection purposes. The basic structure and features of the ANFIS model in PHR network attacks can be examined. In Table 3 input parameters and membership functions are discussed.
Similarly, Figure 4 shows the five input parameters (based on attacks type): normal, probe, DoS, U2R, and R2L.
On the basis of input parameters, membership function is defined using the Sugeno-type ANFIS function in Figure 5. More than 140 rules are generated to generate the desired output value in the form of attack type. After selecting various combinations of input parameters, various rules are generated to get the results.
Figure 6 shows the 3D surface views of all attributes. In section (Figure 6A), for attack type the x-axis displays “normal” and the y-axis shows “probe”; then in section (Figure 6B), the x-axis presents “probe” and the y-axis shows “normal”; in section (Figure 6C), the x-axis shows “U2R” and the y-axis shows “normal”; then in section (Figure 6D), the x-axis displays “DoS” and the y-axis presents “normal”; and lastly in section (Figure 6E), the x-axis displays “R2L” and the y-axis shows “normal.” The surface view shows the comparison of multiple attack type attributes. As the KDD99cup dataset consists of many types of network attacks. In our research, we choose five types of attacks based on their repetition. Moreover, the surface viewer helps predict the accuracy rate in classification and detection based on a rule (which is created by using the membership function).
Similarly, after defining rule sets, the structure of the proposed ANFIS-based model is established, as can be seen in Figure 7. In the final structure, after multiple input values, around 140 sets of rules are generated which leads toward the final output value, which indicates the type of intrusion attack.
Figure 8 represents the training results of the KDDcup 99 datasets collected from the Kaggle website for network intrusion detection based on ANFIS. The training model contains five input values and generates a single output. The training model shows the increasing flow of accuracy rate.
Figure 8. Training results of the KDDcup 99 dataset. (A) On x-axis “normal”. (B) On x-axis “probe”. (C) On x-axis “U2R”. (D) On x-axis “DoS”. (E) On x-axis “R2L”.
Finally, Table 4 shows the detailed statistical result of the KDDcup 99 datasets. The selected classes for testing and training are normal, probe, DoS, R2L, and U2R.
The final result generated by the ANFIS model is either linear or non-linear. Therefore, the Sugeno-type ANFIS model helps to obtain a single output. The results show that the PHR in the healthcare system require an ANFIS-type framework to detect and prevent network attacks and maintain secrecy and a trustful environment for patients, doctors, laboratories, and all other interlinked sectors.
Comparison of Experimented FIS and ANFIS Model Decision-Making
Table 5 shows the performance comparison of the FIS and ANFIS models for better decision-making in network intrusion detection to make e-healthcare (PHR) more secure. The FIS model has been selected to conduct another experiment to show the comparison of the results of FIS and ANFIS based on performance. The mentioned table helps to evaluate the performance of both models. Other than selecting already proposed solutions, we train the FIS model on the same datasets to obtain results. The computed MSE value for FIS is 0.0183 and 0.0123 for ANFIS, the NMSE value is 0.3185 for FIS and 0.2650 for ANFIS, the MAE value is 0.1170 for FIS and 0.0747 for ANFIS, the error value (for minimum observation) is 0.0110 for FIS and 0.0021 for ANFIS, the error value (for maximum observation) is 0.1279 for FIS and 0.1706 for ANFIS, and then finally the R-value is 0.6133 for FIS and 0.7336 for ANFIS. Based on the performance results and output values, ANFIS is considered a more efficient model for efficient decision-making in e-healthcare systems.
Conclusion
Security of network systems in all sectors has become one of the most crucial challenges for researchers. In smart e-healthcare systems, cloud servers provide a better intermediary platform for data storage, communication, and many other aspects. The end users (doctors, clinical experts, patients, laboratories) get the opportunity to access PHR and access the networking database servers. It can be any authorized person. It is essential to detect and classify malicious activities and network traffic. This research paper proposed ANFIS for effective intrusion detection in healthcare networks to maintain a patient record. The main agenda is to detect the unauthorized access of users by using an ANFIS-based intrusion detection system. The proposed security algorithm helps to collect malicious activities or information from network traffic. Based on the if-then rule statement and ANFIS-based data classification that helps to detect the intrusion attack, it can determine whether the networking database server was hit by an intruder or not. If the system identifies the type of attack, this can help researchers put precautionary measures into place to overcome the loss or block the malicious incoming traffic.
Data Availability Statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author/s.
Author Contributions
FA and DL: conceptualization. DL: data curation. FA: formal analysis, investigation, and methodology. NK: funding acquisition. NK and PZ: project administration. SA and PZ: resources. FA and MR: software. FA and NK: supervision. DL and SA: validation. DL and NK: visualization. PZ and SA: writing–review and editing. All authors contributed to the article and approved the submitted version.
Conflict of Interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
The handling editor declared a past co-authorship with one of the authors MR.
Publisher's Note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J. Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Sys. (2021). doi: 10.1007/s40815-021-01104-y
2. Javed A, Sarwar MU, ur Rehman S, Khan HU, Al-Otaibi YD, Alnumay WS. Pp-spa: privacy preserved smartphone-based personal assistant to improve routine life functioning of cognitive impaired individuals. Neural Proc Lett. (2021) 1–18. doi: 10.1007/s11063-020-10414-5
3. Javed AR, Abid R, Aslam B, Khalid HA, Khan MZ, Alhazmi Rehman SU, et al. Personalisedcomfort: a personalised thermal comfort model to predict thermal sensation votes for smart building residents. Enterprise Inf Syst. (2020) 1-23. doi: 10.1080/17517575.2020.1852316
4. Shabbir M, Shabbir A, Iwendi C, Javed AR, Rizwan M, Herencsar N, et al. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access. (2021) 9:8820-34. doi: 10.1109/ACCESS.2021.3049564
5. Mubashar A, Asghar K, Javed AR, Rizwan M, Srivastava G, Gadekallu TR, et al. Storage and proximity management for centralized personal health records using an IPFS-based optimization algorithm. J Circ Syst Comput. (2021) 2250010. doi: 10.1142/S0218126622500104
6. Garg D, Sidhu J, Rani S. A note on cloud computing security. Int J Ad Hoc Ubiquit Comput. (2020) 3:133-54. doi: 10.1504/IJAHUC.2020.106644
7. Ikram AA, Rehman A, Rizwan M, Abid R, Crichigno J, Srivastava G. Mobile cloud computing framework for securing data. In: 2021 44th International Conference on Telecommunications and Signal Processing (TSP) Brno: IEEE (2021). p. 309-15.
8. Wang Z, Wang N, Su X, Ge S. An empirical study on business analytics affordances enhancing the management of cloud computing data security. Int J Inf Manag. (2020) 50:387–394. doi: 10.1016/j.ijinfomgt.2019.09.002
9. Naeem A, Rehman A, Rizwan M, Abbas S, Lin JCW, Gadekallu TR. DARE-SEP: a hybrid approach of distance aware residual energy-efficient SEP for WSN. IEEE Trans Green Commun Netw. (2021) 5:611–621. doi: 10.1109/TGCN.2021.3067885
10. Alabdulatif A, Khalil I, Yi X. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J Parallel Distrib Comput. (2020) 137:192–204. doi: 10.1016/j.jpdc.2019.10.008
11. Yousuf H, Lahzi M, Salloum SA, Shaalan K. Systematic review on fully homomorphic encryption scheme and its application. In: Recent Advances in Intelligent Systems and Smart Applications. Cham: Springer. (2021) p. 537–51.
12. Xiong H, Jin C, Alazab M, Yeh KH, Wang H, Gadekallu TRR, et al. On the design of blockchain-based ECDSA with fault-tolerant batch verication protocol for blockchain-enabled IoMT. IEEE J Biomed Health Inform. (2021). doi: 10.1109/JBHI.2021.3112693. [Epub ahead of print].
13. Butt UA, Mehmood M, Shah SBH, Amin R, Shaukat MW, Raza SM, et al. A review of machine learning algorithms for cloud computing security. Electronics. (2020) 9:1379. doi: 10.3390/electronics9091379
14. Sabu S, Ramalingam H, Vishaka M, Swapna H, Hegde S. Implementation of a Secure and privacy-aware E-Health record and IoT data Sharing using Blockchain. EasyChair. (2021) doi: 10.1016/j.gltp.2021.08.033
15. Muhammad A, Asad M, Javed A. Robust early stage botnet detection using machine learning. In: 2020 International Conference on Cyber Warfare and Security (ICCWS). Islamabad: IEEE (2020). p. 1–6.
16. Basit A, Zafar M, Javed AR, Jalil Z. A novel ensemble machine learning method to detect phishing attack. In: 2020 IEEE 23rd International Multitopic Conference (INMIC). Bahawalpur: IEEE (2020). p. 1-5.
17. Basit A, Zafar M, Liu X, Javed A, Jalil Z, Kifayat K. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst. (2021) 76:139–54. doi: 10.1007/s11235-020-00733-2
18. Abid R, Iwendi C, Javed AR, Rizwan M, Jalil Z, Anajemba JH, et al. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication. Pers Ubiquitous Comput. (2021) 1–14. doi: 10.1007/s00779-021-01607-3
19. Imtiaz SI, ur Rehman S, Abdul R, Jalil Z, Liu X, Alnumay WS. DeepAMD: detection and identification of android malware using high-efficient deep artificial neural network. Future Gen Comput Syst. (2021) 115:844–56. doi: 10.1016/j.future.2020.10.008
20. Ahmed W, Rasool A, Abdul R, Kumar N, Gadekallu TR, Jalil Z, et al. Security in next generation mobile payment systems: a comprehensive survey. IEEE Access. (2021) 9:115932–50. doi: 10.1109/ACCESS.2021.3105450
21. Mittal M, Iwendi C, Khan S, Rehman A. Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol. (2021) 32:e3997. doi: 10.1002/ett.3997
22. Iwendi C, Rehman SU, Javed AR, Khan S, Srivastava G. Sustainable security for the internet of things using artificial intelligence architectures. ACM Trans Intern Technol. (2021) 21:1–22. doi: 10.1145/3448614
23. Afzal S, Asim M, Abdul R, Beg MO, Baker T. URLdeepDetect: a deep learning approach for detecting malicious urls using semantic vector models. J Netw Syst Manag. (2021) 29:1–27. doi: 10.1007/s10922-021-09587-8
24. Parfenov D, Zabrodina L, Bolodurina I, Parfenov A. Development of Algorithmic Solutions for Solving the Problem of identifying Network Attacks Based on Adaptive Neuro-Fuzzy Networks ANFIS. In: 2021 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). Yekaterinburg: IEEE (2020).
25. Ramalingam C, Mohan P. An efficient applications cloud interoperability framework using I-Anfis. Symmetry. (2021) 13:268. doi: 10.3390/sym13020268
26. Qureshi KN, Jeon G, Piccialli F. Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput Netw. (2021) 184:107647. doi: 10.1016/j.comnet.2020.107647
27. Srilakshmi R, Muthukuru J. Intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm. Int J Intell Unmanned Syst. (2021) doi: 10.1108/IJIUS-09-2020-0049
28. Pawar MV, Jagadeesan A. Detection of blackhole and wormhole attacks in WSN enabled by optimal feature selection using self-adaptive multi-verse optimiser with deep learning. Int J Commun Netw Distrib Syst. (2021) 26:409–45. doi: 10.1504/IJCNDS.2021.115573
29. Maheswari M, Karthika R. A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Pers Commun. (2021) 118:1535–57. doi: 10.1007/s11277-021-08101-2
30. Nandi M, Kannan A. An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment. (2021). doi: 10.21203/rs.3.rs-586844/v1
31. Hemalatha R, Umamaheswari R, Jothi S. ANFIS based optimal routing using group teaching and adaptive equilibrium optimization based trust aware routing protocol in MANET. (2021). doi: 10.21203/rs.3.rs-355720/v1
32. Barraclough PA, Fehringer G, Woodward J. Intelligent cyber-phishing detection for online. Comput Secur. (2021) 104:102123. doi: 10.1016/j.cose.2020.102123
33. Javed AR, Abid R, Aslam B, Khalid HA, Khan MZ, Alhazmi OH, et al. Green5g: enhancing capacity and coverage in device-to-device communication. Comput Mater Continua. (2021) 67:1933–50. doi: 10.32604/cmc.2021.015272
34. Bhattacharya D, Biswas A, Rajkumar S, Selvanambi R. Dynamic cloud access security broker using artificial intelligence. In: Machine Learning for Predictive Analysis. Springer (2021). p. 335–42.
35. Masdari M, Khezri H. A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl Soft Comput. (2020) 106301. doi: 10.1016/j.asoc.2020.106301
36. Masdari M, Khezri H. Towards fuzzy anomaly detection-based security: a comprehensive review. Fuzzy Optimizat Decis Mak. (2021) 20:1–49. doi: 10.1007/s10700-020-09332-x
37. Rezaeipanah A, Mojarad M, Fakhari A. Providing a new approach to increase fault tolerance in cloud computing using fuzzy logic. Int J Comput Appl. (2020) 1–9. doi: 10.1080/1206212X.2019.1709288
38. Ferdous J, Khan MFN, Rezaul KM, Tamal MA, Aziz MA, Miah P. A hybrid framework for security in cloud computing based on different algorithms. Int J Netw Secur. (2020) 22:638–44.
39. Viswanath G, Krishna PV. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol Intell. (2020) p. 1-8. doi: 10.1007/s12065-020-00404-w
40. Joel MR, Ebenezer V, Navaneethakrishnan M, Karthik N. Encrypting and decrypting different files over different algorithm on Cloud Platform. Int J Emerg Trends Eng Res. (2020) 8. doi: 10.30534/ijeter/2020/71842020
41. Ramesh S, Jayasankar T, Bhavadharini R, Nagarajan N, Mani G. Securing medical data using extended role based access control model and twofish algorithms on cloud platform. Eur J MolClin Med. (2021) 8:1075–89.
42. Chavan S, Tamane S. Enhancement in Cloud security for web application attacks. In: 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC). Aurangabad: IEEE (2020). p. 91–95.
43. Orobosade A, Aderonke T, Boniface A, Gabriel AJ. Cloud application security using hybrid encryption. Communications. (2020) 7:25–31. doi: 10.5120/cae2020652866
44. Torkura KA, Sukmana MI, Cheng F, Meinel C. Cloudstrike: chaos engineering for security and resiliency in cloud infrastructure. IEEE Access. (2020) 8:123044–60. doi: 10.1109/ACCESS.2020.3007338
45. Torkura KA, Sukmana MI, Cheng F, Meinel C. Continuous auditing and threat detection in multi-cloud infrastructure. Comput Secur. (2021) 102:102124. doi: 10.1016/j.cose.2020.102124
46. Pallavi K, Kumar VR, Srikrishna S. Comparative study of various lightweight cryptographic algorithms for data security between IoT and cloud. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES). Coimbatore: IEEE (2020). p. 589–93.
47. Soman VK, Natarajan V. Analysis of hybrid data security algorithms for cloud. In: Second International Conference on Networks and Advances in Computational Technologies. Springer (2021). p. 231–42.
48. Darwish A, Hassanien AE, Elhoseny M, Sangaiah AK, Muhammad K. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput. (2019) 10:4151–66. doi: 10.1007/s12652-017-0659-1
Keywords: network security, privacy, ANFIS, intrusion detection, IoT based networks
Citation: Akram F, Liu D, Zhao P, Kryvinska N, Abbas S and Rizwan M (2021) Trustworthy Intrusion Detection in E-Healthcare Systems. Front. Public Health 9:788347. doi: 10.3389/fpubh.2021.788347
Received: 02 October 2021; Accepted: 25 October 2021;
Published: 03 December 2021.
Edited by:
Thippa Reddy Gadekallu, VIT University, IndiaReviewed by:
Randhir Kumar, Bennett University, IndiaMisbah Abbas, University of Science and Technology of China, China
Muhammad Baqer Mollah, Nanyang Technological University, Singapore
Praveen Kumar, VIT University, India
Copyright © 2021 Akram, Liu, Zhao, Kryvinska, Abbas and Rizwan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Natalia Kryvinska, natalia.kryvinska@fm.uniba.sk; Sidra Abbas, sidra.abbas708@gmail.com