A Hybrid CNN-Transformer Approach for Predicting Attack Severity in Electronic Health Monitoring Systems to Strengthen Cybersecurity

Authors

  • Bindyashree C. A. School of Computer Science and Engineering, REVA University, Bengaluru, Sathanur, Karnataka, India
  • Muzamil Basha Syed School of Computer Science and Engineering, REVA University, Bengaluru, Sathanur, Karnataka, India
Volume: 15 | Issue: 4 | Pages: 26128-26138 | August 2025 | https://doi.org/10.48084/etasr.10784

Abstract

Electronic Health Monitoring Systems (EHMS) have revolutionized patient care through continuous, connected monitoring. However, their pervasive connectivity exposes them to evolving cyber threats. In this context, for a resilient, real‑time Intrusion Detection System (IDS), we propose a novel hybrid Convolutional Neural Network–Transformer (CNN–Transformer) architecture that integrates the spatial feature extraction and long‑range sequence modelling functionality. The framework is trained on the publicly available WUSTL-EHMS-2020 network traffic dataset. The model features a dual-output head that simultaneously: (i) classifies attack types and (ii) predicts attack severity on a continuous scale. To address the dataset's severe class imbalance, the Synthetic Minority Oversampling Technique (SMOTE) is employed.  Experimental results show the model achieves a classification accuracy of 83.33%, macro F1-score of 0.93, and Receiver Operating Characteristic Area Under the Curve (ROC-AUC) of 0.96, and severity regression achieves a Mean Absolute Error (MAE) of 0.3337 and an R2 0.89. Shapley Additive Explanations (SHAP) provide model interpretability, revealing packet length and inter-arrival time as key predictive features. The proposed IDS outperforms state‑of‑the‑art CNN, Long Short-Term Memory (LSTM), and ensemble baselines in the precision on minority classes. It is also computationally efficient, requiring only a single NVIDIA RTX 3080 Graphics Processing Unit (GPU) with <2 GB VRAM per batch, and delivers inference latency below 150 ms, meeting clinical real-time requirements. These findings make the hybrid CNN–Transformer a viable and deployment-ready approach to protect EHMS against cyber-attacks, in a scalable and explainable manner.

Keywords:

cybersecurity, Electronic Health Monitoring Systems (EHMS), hybrid Convolutional Neural Network (CNN)-Transformer Model, intrusion detection system, severity prediction, explainable Artificial Intelligence (AI), Synthetic Minority Over-sampling Technique (SMOTE)

Downloads

Download data is not yet available.

References

M. A. Lawal, R. A. Shaikh, and S. R. Hassan, "A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing," Procedia Computer Science, vol. 182, pp. 13–20, 2021. DOI: https://doi.org/10.1016/j.procs.2021.02.003

H. Jmila, G. Blanc, M. R. Shahid, and M. Lazrag, "A Survey of Smart Home IoT Device Classification Using Machine Learning-Based Network Traffic Analysis," IEEE Access, vol. 10, pp. 97117–97141, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3205023

N. Tatipatri and S. L. Arun, "A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security," IEEE Access, vol. 12, pp. 18147–18167, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3361039

C. Wu et al., "WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads," IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 2, pp. 1118–1131, Mar. 2025. DOI: https://doi.org/10.1109/TDSC.2024.3429271

F. Khan et al., "Development of a Model for Spoofing Attacks in Internet of Things," Mathematics, vol. 10, no. 19, Oct. 2022, Art. no. 3686. DOI: https://doi.org/10.3390/math10193686

W. Aldosari, "Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks," Sensors, vol. 23, no. 23, Dec. 2023, Art. no. 9606. DOI: https://doi.org/10.3390/s23239606

M. Mittal, K. Kumar, and S. Behal, "Deep learning approaches for detecting DDoS attacks: a systematic review," Soft Computing, vol. 27, no. 18, pp. 13039–13075, Sep. 2023. DOI: https://doi.org/10.1007/s00500-021-06608-1

Z. Mahdi, N. Abdalhussien, N. Mahmood, and R. Zaki, "Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms," Computers, Materials & Continua, vol. 80, no. 2, pp. 2139–2159, 2024. DOI: https://doi.org/10.32604/cmc.2024.053542

E. C. P. Neto et al., "CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus," Internet of Things, vol. 26, Jul. 2024, Art. no. 101209. DOI: https://doi.org/10.1016/j.iot.2024.101209

S. A. Khanday, H. Fatima, and N. Rakesh, "A Novel Data Preprocessing Model for Lightweight Sensory IoT Intrusion Detection," International Journal of Mathematical, Engineering and Management Sciences, vol. 9, no. 1, pp. 188–204, Feb. 2024. DOI: https://doi.org/10.33889/IJMEMS.2024.9.1.010

S. Baruah, D. J. Borah, and V. Deka, "Reviewing various feature selection techniques in machine learning‐based botnet detection," Concurrency and Computation: Practice and Experience, vol. 36, no. 12, May 2024. DOI: https://doi.org/10.1002/cpe.8076

J. Jiang, X. Zhang, and Z. Yuan, "Feature selection for classification with Spearman’s rank correlation coefficient-based self-information in divergence-based fuzzy rough sets," Expert Systems with Applications, vol. 249, Sep. 2024, Art. no. 123633. DOI: https://doi.org/10.1016/j.eswa.2024.123633

Y. Hu et al., "Performance Degradation Prediction Using LSTM with Optimized Parameters," Sensors, vol. 22, no. 6, Mar. 2022, Art. no. 2407. DOI: https://doi.org/10.3390/s22062407

M. N. Akhter et al., "An Hour-Ahead PV Power Forecasting Method Based on an RNN-LSTM Model for Three Different PV Plants," Energies, vol. 15, no. 6, Mar. 2022, Art. no. 2243. DOI: https://doi.org/10.3390/en15062243

M. V. Ferro, Y. D. Mosquera, F. J. R. Pena, and V. M. D. Bilbao, "Early stopping by correlating online indicators in neural networks," Neural Networks, vol. 159, pp. 109–124, Feb. 2023. DOI: https://doi.org/10.1016/j.neunet.2022.11.035

M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, "An improved anomaly detection model for IoT security using decision tree and gradient boosting," The Journal of Supercomputing, vol. 79, no. 3, pp. 3392–3411, Feb. 2023. DOI: https://doi.org/10.1007/s11227-022-04783-y

T. A. Al-Amiedy et al., "A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things," Internet of Things, vol. 22, Jul. 2023, Art. no. 100741. DOI: https://doi.org/10.1016/j.iot.2023.100741

M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, "A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future," Electric Power Systems Research, vol. 215, Feb. 2023, Art. no. 108975. DOI: https://doi.org/10.1016/j.epsr.2022.108975

Y. Fan et al., "Heterogeneous Temporal Graph Transformer: An Intelligent System for Evolving Android Malware Detection," in Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, Virtual Event Singapore, Aug. 2021, pp. 2831–2839. DOI: https://doi.org/10.1145/3447548.3467168

A. Ghourabi, "A Security Model Based on LightGBM and Transformer to Protect Healthcare Systems From Cyberattacks," IEEE Access, vol. 10, pp. 48890–48903, 2022. DOI: https://doi.org/10.1109/ACCESS.2022.3172432

I. Ahmad, F. Al Qurashi, E. Abozinadah, and R. Mehmood, "A Novel Deep Learning-based Online Proctoring System using Face Recognition, Eye Blinking, and Object Detection Techniques," International Journal of Advanced Computer Science and Applications, vol. 12, no. 10, 2021. DOI: https://doi.org/10.14569/IJACSA.2021.0121094

I. B. A. Ouahab, L. Elaachak, and M. Bouhorma, "Enhancing Malware Classification with Vision Transformers: A Comparative Study with Traditional CNN Models," in Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache Morocco, May 2023, pp. 1–5. DOI: https://doi.org/10.1145/3607720.3607781

K. Steverson, C. Carlin, J. Mullin, and M. Ahiskali, "Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs," in 2021 International Conference on Military Communication and Information Systems (ICMCIS), The Hague, Netherlands, May 2021, pp. 1–7. DOI: https://doi.org/10.1109/ICMCIS52405.2021.9486307

A. Rahali and M. A. Akhloufi, "MalBERTv2: Code Aware BERT-Based Model for Malware Identification," Big Data and Cognitive Computing, vol. 7, no. 2, Mar. 2023, Art. no. 60. DOI: https://doi.org/10.3390/bdcc7020060

J. Dobreva, A. P. Mitrovikj, and V. Dimitrova, "MalDeWe: New Malware Website Detector Model based on Natural Language Processing using Balanced Dataset," in 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, Dec. 2021, pp. 766–770. DOI: https://doi.org/10.1109/CSCI54926.2021.00043

O. Aslan and R. Samet, "A Comprehensive Review on Malware Detection Approaches," IEEE Access, vol. 8, pp. 6249–6271, 2020. DOI: https://doi.org/10.1109/ACCESS.2019.2963724

A. Bensaoud, J. Kalita, and M. Bensaoud, "A survey of malware detection using deep learning," Machine Learning with Applications, vol. 16, Jun. 2024, Art. no. 100546. DOI: https://doi.org/10.1016/j.mlwa.2024.100546

R. Alsulami, B. Alqarni, R. Alshomrani, F. Mashat, and T. Gazdar, "IoT Protocol-Enabled IDS based on Machine Learning," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12373–12380, Dec. 2023. DOI: https://doi.org/10.48084/etasr.6421

A. Sanmorino, L. Marnisah, and H. D. Kesuma, "Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16444–16449, Oct. 2024. DOI: https://doi.org/10.48084/etasr.8362

R. A. Yunmar, S. S. Kusumawardani, Widyawan, and F. Mohsen, "Hybrid Android Malware Detection: A Review of Heuristic-Based Approach," IEEE Access, vol. 12, pp. 41255–41286, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3377658

M. G. Gaber, M. Ahmed, and H. Janicke, "Malware Detection with Artificial Intelligence: A Systematic Literature Review," ACM Computing Surveys, vol. 56, no. 6, pp. 1–33, Jun. 2024. DOI: https://doi.org/10.1145/3638552

T. Bilot, N. El Madhoun, K. Al Agha, and A. Zouaoui, "A Survey on Malware Detection with Graph Representation Learning," ACM Computing Surveys, vol. 56, no. 11, pp. 1–36, Nov. 2024. DOI: https://doi.org/10.1145/3664649

C. P. Chenet, A. Savino, and S. Di Carlo, "A Survey on Hardware-Based Malware Detection Approaches," IEEE Access, vol. 12, pp. 54115–54128, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3388716

S. K. Smmarwar, G. P. Gupta, and S. Kumar, "Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review," Telematics and Informatics Reports, vol. 14, Jun. 2024, Art. no. 100130. DOI: https://doi.org/10.1016/j.teler.2024.100130

S. Wang, R. K. L. Ko, G. Bai, N. Dong, T. Choi, and Y. Zhang, "Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey," IEEE Communications Surveys & Tutorials, vol. 26, no. 2, pp. 930–966, 2024. DOI: https://doi.org/10.1109/COMST.2023.3344808

D. O. Otieno, F. Abri, A. S. Namin, and K. S. Jones, "Detecting Phishing URLs using the BERT Transformer Model," in 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, Dec. 2023, pp. 2483–2492. DOI: https://doi.org/10.1109/BigData59044.2023.10386782

A. Senthilkumar, S. Joshika, L. Santhi, S. K S, and P. Charanarur, "Pearson Correlation Coefficient based Improved Least Square - Support Vector Machine for Cyber-Attack Detection in Internet of Things," in 2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Ballari, India, Apr. 2024, pp. 1–4. DOI: https://doi.org/10.1109/ICDCECE60827.2024.10549411

J. P. Maurya, M. Manoria, and S. Joshi, "Cardiac Arrhythmia Classification Using Cascaded Deep Learning Approach (LSTM & RNN)," in Communications in Computer and Information Science, Cham: Springer Nature Switzerland, 2022, pp. 3–13. DOI: https://doi.org/10.1007/978-3-031-24352-3_1

A. A. Hady, A. Ghubaish, T. Salman, D. Unal, and R. Jain, "Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study," IEEE Access, vol. 8, pp. 106576–106584, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3000421

WUSTL EHMS 2020 Dataset. (2020), A. A. Hady, A. Ghubaish, T. Salman, D. Unal, and R. Jain. [Online]. Available: https://www.cse.wustl.edu//~jain/ehms/index.html.

Malware-Traffic-Analysis.net. (2023), Open Threat Intel Repository. [Online]. Available: https://www.malware-traffic-analysis.net.

Downloads

How to Cite

[1]
B. C. A. and M. B. Syed, “A Hybrid CNN-Transformer Approach for Predicting Attack Severity in Electronic Health Monitoring Systems to Strengthen Cybersecurity”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 4, pp. 26128–26138, Aug. 2025.

Metrics

Abstract Views: 225
PDF Downloads: 260

Metrics Information