A Threshold-based Technique to Cluster Ransomware Infected Medical Records on the Internet of Medical Things

Document Type : Original Article

Authors

1 Department of Bioinformatics, Faculty of Computer and Information Sciences , Ain Shams University ,Cairo , Egypt.

2 Department of Information Systems, Faculty of Computers and Information Sciences, Ain Shams University,Cairo , Egypt

3 Department of Information System , Faculty of Computer and Information Sciences, Ain Shams University, Cairo, Egypt

4 Department of Computer Science, Faculty of Computing and Information Technology, Arab Academy for Science and Technology , Cairo , Egypt

Abstract

Ransomware attacks have led many healthcare hospitals to migrate back to their traditional methods of monitoring patients using pen and paper instead of using implantable medical devices remotely. Studying the behaviour of payload ransomware on an approved actual healthcare dataset obtained from ICU and correctly clustering them into normal and malicious records after manifestation is the primary focus of this study. The features decided were upon the possibility of being captured remotely and their frequency of occurrences. Data transformation was included, to handle the encrypted values and perform data normalization, prior to the clustering process.

Unsupervised machine learning gained a lot of attention in the cybersecurity domain for its efficiency and capability of clustering tuples into malicious and benign categories. However, on the internet of medical things (IoMT), due to the constraints of the interconnected nodes, clustering of malicious activities became highly challenging and demanded to secure the infrastructure. This work used unsupervised machine learning techniques of k-means, DBscan, and mean shift compared to a threshold-based method which outperformed them with a precision of 100%. The performance metrics used in this work are; precision, recall, and f1score.

Keywords