Author
Listed:
- Mohanad Faeq Ali
- Mohammed Shakir Mohmood
- Ban Salman Shukur
- Rex Bacarra
- Jamil Abedalrahim Jamil Alsayaydeh
- Masrullizam Mat Ibrahim
- Safarudin Gazali Herawan
Abstract
The rapid development and integration of interconnected healthcare devices and communication networks within the Internet of Medical Things (IoMT) have significantly enhanced healthcare services. However, this growth has also introduced new vulnerabilities, increasing the risk of cybersecurity attacks. These attacks threaten the confidentiality, integrity, and availability of sensitive healthcare data, raising concerns about the reliability of IoMT infrastructure. Addressing these challenges requires advanced cybersecurity measures to protect the dynamic IoMT ecosystem from evolving threats. This research focuses on enhancing cyberattack prediction and prevention in IoMT environments through innovative Machine-learning techniques to improve healthcare data security and resilience. However, the existing model’s efficiency depends on the diversity of data, which leads to computational complexity issues. In addition, the conventional model faces overfitting issues in training data, which causes prediction inaccuracies. Thus, the research introduces the hybridized cyber attack prediction model (HCAP) and analyzes various IoMT data source information to address the limitations of dataset availability issues. The gathered information is processed with the help of Principal Component-Recursive Feature Elimination (PC-RFE), which eliminates the irrelevant features. The extracted features are fed into the lion-optimization technique to fine-tune the hyperparameters of the recurrent neural networks, enhancing the model’s ability to efficiently predict cybersecurity threats with a maximum recognition rate in IoMT environments. The recurrent networks, specifically Long Short Term Memory (LSTM), process data from healthcare devices, identifying abnormal patterns that indicate potential cyberattacks over time. The created system was implemented using Python, and various metrics, including false positive and false negative rates, accuracy, precision, recall, and computational efficiency, were used for evaluation. The results demonstrated that the proposed HCAP model achieved 98% accuracy in detecting cyberattacks and outperformed existing models, reducing the false positive rate by 25%. The false negative rate by 20% and a 30% improvement in computational efficiency enhances the reliability of IoMT threat detection in healthcare applications.
Suggested Citation
Mohanad Faeq Ali & Mohammed Shakir Mohmood & Ban Salman Shukur & Rex Bacarra & Jamil Abedalrahim Jamil Alsayaydeh & Masrullizam Mat Ibrahim & Safarudin Gazali Herawan, 2025.
"HCAP: Hybrid cyber attack prediction model for securing healthcare applications,"
PLOS ONE, Public Library of Science, vol. 20(5), pages 1-24, May.
Handle:
RePEc:plo:pone00:0321941
DOI: 10.1371/journal.pone.0321941
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0321941. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.