Back to Search Start Over

Cyber-Securing Medical Devices Using Machine Learning: A Case Study of Pacemaker.

Authors :
Jimoh, Suliat Toyosi
Al-juboori, Shaymaa S.
Source :
Journal of Informatics & Web Engineering (JIWE); Oct2024, Vol. 3 Issue 3, p271-289, 19p
Publication Year :
2024

Abstract

This study aims to enhance the cybersecurity framework of pacemaker devices by identifying vulnerabilities and recommending effective strategies. The objectives are to pinpoint cybersecurity weaknesses, utilize machine learning to predict security breaches, and propose countermeasures based on analytical trends. The literature review highlights the transformation of pacemaker technology from basic, fixed-rate devices to sophisticated systems with wireless capabilities, which, while improving patient care, also introduce significant cybersecurity risks. These risks include unauthorized entry, data breaches, and lifethreatening device malfunctions. The methodology in this study utilizes a quantitative research approach using the WUSTL-EHMS-2020 dataset, which includes network traffic features, patients' biometric features, and attack label. The step-by-step method of machine learning prediction includes data collection, data preprocessing, feature engineering, and models' training using Support Vector Machines (SVM) and Gradient Boosting Machines (GBM). The implementation results used evaluation metrics like accuracy, precision, recall, and F1 score to show that GBM model outperformed the SVM model. The GBM model achieved higher accuracy of 95.1% compared to 92.5% for SVM, greater precision of 99.6% compared to 96.7% for SVM, better recall of 94.9% compared to 42.7% for SVM, and a higher F1 score of 76.3% compared to 59.0% for SVM, making GBM model more effective in predicting cybersecurity threats. This study concludes that GBM is an effective machine learning model for enhancing pacemaker cybersecurity by analyzing network traffic and biometric data patterns. Future recommendations for improving the pacemaker cybersecurity include implementing GBM model for threat predictions, integration with existing security measures, and regular model updates and retraining. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
2821370X
Volume :
3
Issue :
3
Database :
Complementary Index
Journal :
Journal of Informatics & Web Engineering (JIWE)
Publication Type :
Academic Journal
Accession number :
180914231
Full Text :
https://doi.org/10.33093/jiwe.2024.3.3.17