A Multi-Modal AI Framework for Intrusion Detection in Healthcare IoT
-
https://doi.org/10.14419/xw7zzh51
Received date: December 31, 2025
Accepted date: January 24, 2026
Published date: January 26, 2026
-
Healthcare Internet of Things (HIoT); Intrusion Detection System; Multi-Modal Security; Device Telemetry; Network Traffic Analysis; Ensemble Learning; False Positive Reduction; Cyber-Physical Systems Security -
Abstract
The rapid adoption of Healthcare Internet of Things (HIoT) technologies has increased the exposure of safety-critical medical infrastructures to sophisticated cyberattacks, while simultaneously imposing strict constraints on availability, privacy, and false alarm tolerance. Traditional network-centric intrusion detection systems (IDSs) struggle to reliably detect stealthy, low-rate attacks in healthcare environments, where encrypted traffic and predictable clinical communication patterns limit observability. This paper proposes a lightweight multi-modal intrusion detection framework for HIoT networks that jointly analyzes network flow metadata and device telemetry using structured feature fusion and ensemble meta-learning. By integrating communication behavior with device-level operational regularity, the framework provides a more comprehensive representation of system activity without relying on payload inspection. An extensive evaluation was conducted using heterogeneous IoT and botnet datasets, including TON_IoT, IoT-23, and MedBIoT, under realistic conditions of class imbalance. Experi-mental results demonstrate that the proposed framework achieves 97.1% detection accuracy and 96.5% F1-score, outperforming state-of-the-art network-only IDS baselines. Most notably, the framework reduces the false positive rate to 2.4%, representing a relative reduction of over 38% compared to strong deep learning baselines. Attack-wise analysis shows the most significant performance gains for stealthy and low-rate attack classes, where network-centric IDSs exhibit substantial degradation. Ablation studies confirm that device telemetry im-proves recall for stealthy threats, while ensemble meta-learning stabilizes predictions and suppresses false alarms. Latency and scalability measurements further indicate that the framework remains suitable for real-time deployment at healthcare gateway nodes. Overall, the results provide strong empirical evidence that multi-modal intrusion detection materially improves detection reliability, clinical safety, and robust-ness in healthcare IoT environments, addressing key limitations of existing single-modality IDS approaches.
-
References
- R. M. Mahmud, A. N. M. Bazlur Rahman, and M. S. Hossain, “Security challenges and solutions in healthcare Internet of Things,” IEEE Access, vol. 8, pp. 102 – 121, 2020.
- M. Hossain and G. Muhammad, “Cloud-assisted industrial Internet of Things (IIoT) – enabled framework for health monitoring,” Computer Net-works, vol. 101, pp. 192–202, 2016, https://doi.org/10.1016/j.comnet.2016.01.009.
- A. Alzahrani and A. Ghorbani, “An overview of intrusion detection systems in healthcare,” Journal of Network and Computer Applications, vol. 124, pp. 72–89, 2018, https://doi.org/10.1016/j.jnca.2018.09.012.
- Y. Meidan et al., “Detection of unauthorized IoT devices using machine learning techniques,” arXiv preprint arXiv:1709.04647, 2017.
- S. McLeod and D. Dolezel, “Cyber-analytics: Modeling factors associated with healthcare data breaches,” Decision Support Systems, vol. 108, pp. 57–68, 2018, https://doi.org/10.1016/j.dss.2018.02.009.
- V. Paxson, “Bro: A system for detecting network intruders in real-time,” Computer Networks, vol. 31, no. 23–24, pp. 2435–2463, 1999. https://doi.org/10.1016/S1389-1286(99)00112-7.
- W. Wang, Y. Sheng, J. Wang, and X. Zeng, “HAST-IDS: Learning hierarchical spatial–temporal features using deep neural networks to improve intrusion detection,” IEEE Access, vol. 6, pp. 1792–1806, 2018, https://doi.org/10.1109/ACCESS.2017.2780250.
- A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “A deep learning approach for network intrusion detection system,” in Proc. 9th EAI Int. Conf. Bio-Inspired Information and Communications Technologies, 2016, pp. 21–26. https://doi.org/10.4108/eai.3-12-2015.2262516.
- I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, 2014. https://doi.org/10.1109/SURV.2013.050113.00191.
- J. Zhang, M. Zulkernine, and A. Haque, “Random-forests-based network intrusion detection systems,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 38, no. 5, pp. 649–659, 2008. https://doi.org/10.1109/TSMCC.2008.923876.
- N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection systems,” Military Communications and Infor-mation Systems Conference, 2015. https://doi.org/10.1109/MilCIS.2015.7348942
- R. Mitchell and I.-R. Chen, “A survey of intrusion detection techniques for cyber-physical systems,” ACM Computing Surveys, vol. 46, no. 4, pp. 1–29, 2014, https://doi.org/10.1145/2542049.
- S. Bhuyan, D. Bhattacharyya, and J. Kalita, “Network anomaly detection: Methods, systems and tools,” IEEE Communications Surveys & Tutori-als, vol. 16, no. 1, pp. 303–336, 2014, https://doi.org/10.1109/SURV.2013.052213.00046.
- Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, “Kitsune: An ensemble of autoencoders for online network intrusion detection,” IEEE Trans-actions on Information Forensics and Security, vol. 13, no. 9, pp. 2300–2315, 2018, https://doi.org/10.14722/ndss.2018.23204.
- M. Al-Hawawreh, N. Sitnikova, and M. Slay, “Anomaly detection in industrial control systems using deep learning,” Computers & Security, vol. 92, Art. no. 101736, 2020.
- J. Kim and H. Kim, “An attention-based deep learning model for intrusion detection,” IEEE Access, vol. 8, pp. 165009–165021, 2020, https://doi.org/10.1109/ACCESS.2020.2986882.
- Y. Meidan et al., “ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis,” in Proc. ACM Symposi-um on Applied Computing (SAC), 2017, pp. 506–509, https://doi.org/10.1145/3019612.3019878.
- A. Marchal, X. Jiang, R. State, and T. Engel, “A big data architecture for large-scale security monitoring,” in Proc. IEEE International Conference on Big Data, 2014, pp. 56–63, https://doi.org/10.1109/BigData.2014.7004212.
- P. Ioulianou, V. G. Vassilakis, I. Moscholios, and M. Logothetis, “A behavior-based intrusion detection system for IoT networks,” Journal of Net-work and Computer Applications, vol. 130, pp. 64–73, 2019, https://doi.org/10.1016/j.jnca.2019.01.006.
- H. Hindy et al., “A taxonomy of network threats and the effect of current datasets on intrusion detection systems,” IEEE Access, vol. 8, pp. 104650–104675, 2020, https://doi.org/10.1109/ACCESS.2020.3000179.
- M. Abdel-Basset, G. Manogaran, A. Gamal, and V. Chang, “A novel intelligent medical decision support model based on soft computing and IoT,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4160–4170, 2020, https://doi.org/10.1109/JIOT.2019.2931647.
- A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, “Deep learning for cyber security intrusion detection: Approaches, datasets, and compar-ative study,” Journal of Information Security and Applications, vol. 50, Art. no. 102419, 2020, https://doi.org/10.1016/j.jisa.2019.102419.
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015, https://doi.org/10.1016/j.comnet.2014.11.008
- A. Gatouillat, Y. Badr, B. Massot, and E. Sejdić, “Internet of medical things: A review of recent contributions dealing with cyber-physical systems in medicine,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3810–3822, 2018, https://doi.org/10.1109/JIOT.2018.2849014.
- A. Moustafa, M. Z. Uddin, B. K. Tripathi, and A. R. Abou-Salem, “TON_IoT: The telemetry dataset for IoT intrusion detection systems,” IEEE Access, vol. 9, pp. 82125–82141, 2021.
- S. García, M. Grill, J. Stiborek, and A. Zunino, “An empirical comparison of botnet detection methods,” Computers & Security, vol. 45, pp. 100–123, 2014, doi: 10.1016/j.cose.2014.05.011. (IoT-23 dataset – Stratosphere IPS) https://doi.org/10.1016/j.cose.2014.05.011.
- I. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, “Towards the development of realistic botnet dataset in the Internet of Things for net-work forensic analytics: Bot-IoT dataset,” Future Generation Computer Systems, vol. 100, pp. 779–796, 2019. (MedBIoT-style botnet behavior ref-erence used in healthcare IoT evaluation). https://doi.org/10.1016/j.future.2019.05.041.
- J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp. 3718–3731, 2016, https://doi.org/10.1109/TWC.2016.2526601.
- F. Restuccia, S. D’Oro, and T. Melodia, “Securing the Internet of Things in the age of machine learning and software-defined networking,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4829–4842, 2018, https://doi.org/10.1109/JIOT.2018.2846040.
-
Downloads
-
How to Cite
Al-Balasmeh, H., Jaber , F. A. ., & Abdulsattar , S. S. . (2026). A Multi-Modal AI Framework for Intrusion Detection in Healthcare IoT. International Journal of Basic and Applied Sciences, 15(1), 161-176. https://doi.org/10.14419/xw7zzh51
