A Deep Feature Ensemble Framework for Intrusion Detection in Internet of Medical Things
Received: 19 May 2025 | Revised: 9 June 2025 and 27 June 2025 | Accepted: 23 July 2025 | Online: 22 August 2025
Corresponding author: Chitty Avula
Abstract
The Internet of Medical Things (IoMT) has transformed healthcare through real-time monitoring, remote diagnostics, and intelligent analytics. However, the rapid proliferation of connected medical devices introduces significant cybersecurity threats that endanger patient safety and data privacy. To address these challenges, this study proposes SIDHELNet (Semantically Improved Deep feature ensemble-driven Heterogeneous Ensemble Learning Network), a novel intrusion detection framework tailored for the IoMT environment. SIDHELNet introduces a novel fusion of semantic Word2Vec embeddings with parallel Bi-LSTM and Bi-GRU layers to extract enriched temporal-spatial features, followed by a nine-classifier heterogeneous ensemble. This design distinguishes SIDHELNet from prior hybrid IDS by enabling high adaptability and robustness across heterogeneous IoMT traffic. These features are classified using a Heterogeneous Ensemble Learning (HEL) model that fuses predictions from multiple learners to improve accuracy and robustness. Experimental evaluations on the WUSDL-EHMS-2020 and UNSW-NB15 datasets show that SIDHELNet achieves a detection accuracy of 99.61%, precision of 99.58%, recall of 99.62%, F1-score of 99.59%, and an AUC of 0.998, outperforming existing methods and validating SIDHELNet's high reliability, generalizability, and real-time capability.
Keywords:
segmentation, cybersecurity, medical devices, IoMT, healthcare, accuracy, precisionDownloads
References
H. Wang, Y. Wang, X. Xie, and M. Li, "A Scheduling Scheme for Minimizing Age Under Delay Tolerance in IoT Systems With Heterogeneous Traffic," IEEE Internet of Things Journal, vol. 11, no. 9, pp. 16902–16914, Feb. 2024. DOI: https://doi.org/10.1109/JIOT.2024.3366766
N. K. Al-Shammari, T. H. Syed, and M. B. Syed, "An Edge – IoT Framework and Prototype based on Blockchain for Smart Healthcare Applications," Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp. 7326–7331, Aug. 2021. DOI: https://doi.org/10.48084/etasr.4245
CH. Nagaraju, M. Khan, S. Fahimuddin, and S. Karimullah, "Time-Correlated Fading Channels for Minimization of Energy Consumption in Wireless Networked Control Systems," in Proceedings of the Third International Conference on Cognitive and Intelligent Computing, Volume 2, 2025, pp. 617–625. DOI: https://doi.org/10.1007/978-981-97-9266-5_60
"WUSTL EHMS 2020 Dataset for Internet of Medical Things (IoMT) Cybersecurity Research." [Online]. Available: https://www.cse.wustl.edu/~jain/ehms/index.html.
Z. Liu et al., "Deep Learning Approach for IDS," in Fourth International Congress on Information and Communication Technology, 2020, pp. 471–479. DOI: https://doi.org/10.1007/978-981-15-0637-6_40
R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman, "Deep Learning Approach for Intelligent Intrusion Detection System," IEEE Access, vol. 7, pp. 41525–41550, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2895334
A. Thakkar and R. Lohiya, "Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System," Information Fusion, vol. 90, pp. 353–363, Feb. 2023. DOI: https://doi.org/10.1016/j.inffus.2022.09.026
A. M. Aleesa, M. Younis, A. A. Mohammed, and N. M. Sahar, "Deep-Intrusion Detection System with Enhanced UNSW-NB15 Dataset Based on Deep Learning Techniques," Journal of Engineering Science and Technology, vol. 16, no. 1, pp. 711–727, 2021.
C. Tang, N. Luktarhan, and Y. Zhao, "SAAE-DNN: Deep Learning Method on Intrusion Detection," Symmetry, vol. 12, no. 10, Oct. 2020, Art. no. 1695. DOI: https://doi.org/10.3390/sym12101695
L. Ashiku and C. Dagli, "Network Intrusion Detection System using Deep Learning," Procedia Computer Science, vol. 185, pp. 239–247, Jan. 2021. DOI: https://doi.org/10.1016/j.procs.2021.05.025
P. Wu and H. Guo, "LuNet: A Deep Neural Network for Network Intrusion Detection," in 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China, Dec. 2019, pp. 617–624. DOI: https://doi.org/10.1109/SSCI44817.2019.9003126
M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, and G. Fortino, "A hybrid deep learning model for efficient intrusion detection in big data environment," Information Sciences, vol. 513, pp. 386–396, Mar. 2020. DOI: https://doi.org/10.1016/j.ins.2019.10.069
C. Liu, Z. Gu, and J. Wang, "A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning," IEEE Access, vol. 9, pp. 75729–75740, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3082147
S. M. Kasongo, "A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework," Computer Communications, vol. 199, pp. 113–125, Feb. 2023. DOI: https://doi.org/10.1016/j.comcom.2022.12.010
J. Figueiredo, C. Serrão, and A. M. de Almeida, "Deep Learning Model Transposition for Network Intrusion Detection Systems," Electronics, vol. 12, no. 2, Jan. 2023, Art. no. 293. DOI: https://doi.org/10.3390/electronics12020293
V. Rajasekar and S. Sarika, "An efficient intrusion detection model based on recurrent neural network," in 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), 2022. DOI: https://doi.org/10.1109/ICDCECE53908.2022.9793016
V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, "A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE," IEEE Access, vol. 11, pp. 37131–37148, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3266979
T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset," IEEE Access, vol. 8, pp. 29575–29585, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2972627
S. Sivamohan, S. S. Sridhar, and S. Krishnaveni, "An Effective Recurrent Neural Network (RNN) based Intrusion Detection via Bi-directional Long Short-Term Memory," in 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India, Jun. 2021, pp. 1–5. DOI: https://doi.org/10.1109/CONIT51480.2021.9498552
B. Roy and H. Cheung, "A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network," in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Nov. 2018, pp. 1–6. DOI: https://doi.org/10.1109/ATNAC.2018.8615294
Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, "A bidirectional LSTM deep learning approach for intrusion detection," Expert Systems with Applications, vol. 185, Dec. 2021, Art. no. 115524. DOI: https://doi.org/10.1016/j.eswa.2021.115524
H. Ma, J. Cao, B. Mi, D. Huang, Y. Liu, and S. Li, "A GRU-Based Lightweight System for CAN Intrusion Detection in Real Time," Security and Communication Networks, vol. 2022, no. 1, 2022, Art. no. 5827056. DOI: https://doi.org/10.1155/2022/5827056
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks," in 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, Canada, Jun. 2018, pp. 202–206. DOI: https://doi.org/10.1109/NETSOFT.2018.8460090
A. S. Qureshi, A. Khan, N. Shamim, and M. H. Durad, "Intrusion detection using deep sparse auto-encoder and self-taught learning," Neural Computing and Applications, vol. 32, no. 8, pp. 3135–3147, Apr. 2020. DOI: https://doi.org/10.1007/s00521-019-04152-6
N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, "A Deep Learning Approach to Network Intrusion Detection," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, Oct. 2018. DOI: https://doi.org/10.1109/TETCI.2017.2772792
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, Nov. 2015, pp. 1–6. DOI: https://doi.org/10.1109/MilCIS.2015.7348942
N. Moustafa and J. Slay, "The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set," Information Security Journal: A Global Perspective, vol. 25, no. 1–3, pp. 18–31, Apr. 2016. DOI: https://doi.org/10.1080/19393555.2015.1125974
N. Moustafa, J. Slay, and G. Creech, "Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks," IEEE Transactions on Big Data, vol. 5, no. 4, pp. 481–494, Sep. 2019. DOI: https://doi.org/10.1109/TBDATA.2017.2715166
N. Moustafa, G. Creech, and J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models," in Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications, I. Palomares Carrascosa, H. K. Kalutarage, and Y. Huang, Eds. Springer International Publishing, 2017, pp. 127–156. DOI: https://doi.org/10.1007/978-3-319-59439-2_5
M. Sarhan, S. Layeghy, N. Moustafa, and M. Portmann, "NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems," in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer International Publishing, 2021, pp. 117–135. DOI: https://doi.org/10.1007/978-3-030-72802-1_9
Downloads
How to Cite
License
Copyright (c) 2025 Chitty Avula, Sathyanarayana Bachala

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
