Detection of Malware Attacks in Medical Mechatronics Distribution System Using Support Vector Machine
Main Article Content
Abstract
This study examines the cybersecurity challenges and solutions associated with medical mechatronics devices, which increasingly operate autonomously through advances in robotics, artificial intelligence (AI), and machine-to-machine communication. As the number of interconnected devices grows—from smart grids and home appliances to medical equipment and sensor–actuator testers—ensuring secure and trustworthy communication becomes critical. A sustainable defensive strategy for medical mechatronics requires robust systems capable of malware analysis and detection, informed by an understanding of cyber-attack stages such as reconnaissance, weaponization, delivery, exploitation, installation, and command and control. Traditional malware detection systems struggle with obfuscated malware, making AI and machine learning (ML) more effective tools for accurate detection and classification. This research proposes the use of a Support Vector Machine (SVM) model with a novel metric to enhance malware detection in medical mechatronics devices, thereby strengthening confidentiality, integrity, availability, and digital trust. The proposed SVM-based approach was compared with established SVM algorithms using a real dataset from medical mechatronics distribution systems across federal medical centers in Nigeria. Findings demonstrate the potential of the model to improve malware detection accuracy and compliance with digital sovereignty standards, offering practical insights for enhancing cybersecurity in critical healthcare technologies.

Citation Metrics:
Downloads
Article Details

Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
References
[2].Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W. & Gao, Y. (2021). A survey in federated learning Knowledged based systems.
[3]. Yanfang, Y., Li T., Adjeroh, D. & Sitharama S. (2017). A Survey on Malware Detection Using Data Mining Techniques. ACM Computing Surveys, 50(3):1.
[4]. Hoang, T., Ozmen, O., Jang, Y. ana Yavuz, A. (2019). Hardware Supported Oram in effect: Practical oblivious search and update on very large dataset. Proceedings on privacy enhancing technologies, 2019.
[5]. Sharmeta, A. F., Hernández-Ramos, J. L. & Moreno, V. M., 2014. A decentralized approach for security and Privacy challenges in the Internet of Things. IEEE World Forum on Internet of Things (WF-IoT), pp. 67-72.
[6]. Weber, M. & Boban, M., 2022. Security challenges of Mechatronics and the Internet of Things. International Conference on Information and Communication Technology, Electronics and Mechatronics (MIPRO) IEEE, pp. 638-643.
[7]. Chandy J (2022): International Journal for Research in Applied Science & Engineering Technology (IJRASET)ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538Volume-Available at www.ijraset.com.
[8] Johnson, A. & Grumbling, E. (2019): National Academies of Sciences, Engineering, and Medicine. Implications of Artificial Intelligence for Cybersecurity: Proceedings of a Workshop. Washington, DC: The National Academies Press. https://doi.org/10.17226/25488.
[9] Zheng, M., Robbins, H., Chai, Z., Thapa, P. & Moore, T. (2022). “Cybersecurity Research Datasets: Taxonomy and Empirical Analysis,”presented at 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘22).
[10] Wan, J. et al., 2018. Machine sensing framework with inter-cloud computing capability in vehicular networking. Mechatronics Research, 18(3), pp. 390-420.
[11] Yaacoub, E., Abdullah , K. & Adnan , A.-D., 2022. Cooperative wireless sensor and actuators for green mechanical devices. proceedings of the 8h ACM symposium on QoS and security for medical mechatronics, pp. 89-101.
[12] Yao, X., Chen, Z. & Tian, Y., 2015. A lightwirght attribute-based encryption scheme for the Internt of Things. Future Generation Computer Systems, Volume 49, pp. 104-112.
[13] Bush, I. & Abiyev, R. (2023). ‘Introduction to Machine Learning and IoT’ Machine Learning and the Internet of Things in Education, Studies in Computational Intelligence 1115, Pp. 1-7. https://doi.org/10.1007/978-3-031-42924-8_1
[14] Helwan, A., Bush, I. & Abiyev, R. (2017). Machine learning techniques for classification of breast tissue. Procedia Computer Science, 120, 402–410.
[15] Francis, T., Madiajagan, . M. & Kumar, V., 2015. Privacy Issues and Techniques in E Health Systems. Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research ACM, pp. 113-115.
[16] Bremer, J. (2015). Welcome to VMCloak’s documentation! WWW Document. Available at: http://vmcloak.readthedocs.io/en/latest/. [Accessed 29 May, 2024].
[17] Cuckoo Foundation (2015). Cuckoo Sandbox Book. WWW document. Available at: http://docs.cuckoosandbox.org/en/latest/introduction/what/. [Accessed 27 June, 2024]
[18] https://www.google.com/search?client=firefox-b-e&q=VIRUS+SHARE
[19] Tariq, H. (2024). "Behavioral Anomaly Detection in Mechatronic Systems Using Advanced Machine Learning Techniques." IEEE Transactions on Industrial Electronics, 67(10), 8452-8462.
[20] Amer, M. Goldstein, M. and Abdennadher, S. "Enhancing one-class support vector machines for unsupervised anomaly detection," in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD), August 11-14,. New York, USA, 2013, pp. 8-15.
Find the perfect home for your research! If this journal isn't the right fit, don't worry—we offer a wide range of journals covering diverse fields of study. Explore our other journals to discover the ideal platform for your work and maximize its impact. Browse now and take the next step in publishing your research:
| HOME | Yasin | AlSys | Anwarul | Masaliq | Arzusin | Tsaqofah | Ahkam | AlDyas | Mikailalsys | Edumalsys | Alsystech | AJSTEA | AJECEE | AJISD | IJHESS | IJEMT | IJECS | MJMS | MJAEI | AMJSAI | AJBMBR | AJSTM | AJCMPR | AJMSPHR | KIJST | KIJEIT | KIJAHRS |













