*Result*: A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT).

Title:
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT).
Authors:
Abdelhaq M; Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia., Palanisamy S; Department of Electronics and Communication Engineering, Alliance School of Applied Engineering, Alliance University, Bengaluru, India. skcommn2@gmail.com., Gopinath M; School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India. gopitamil23@gmail.com., Manasa VGS; Department of CSE, Siddhartha Academy of Higher Education, Vijayawada, India., Ram MA; Department of CSE, Siddhartha Academy of Higher Education, Vijayawada, India., Md SK; Department of CSE, Siddhartha Academy of Higher Education, Vijayawada, India.
Source:
Scientific reports [Sci Rep] 2026 Jan 31; Vol. 16 (1), pp. 6855. Date of Electronic Publication: 2026 Jan 31.
Publication Type:
Journal Article
Language:
English
Journal Info:
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: MEDLINE
Imprint Name(s):
Original Publication: London : Nature Publishing Group, copyright 2011-
References:
Pang, Z., Yang, G., Khedri, R. & Zhang, Y. Introduction to the special section: Convergence of automation technology, biomedical engineering, and health informatics toward the healthcare 4.0. IEEE Rev. Biomed. Eng. 11, 249–259. https://doi.org/10.1109/RBME.2018.2848518 (2018). (PMID: 10.1109/RBME.2018.2848518)
Noor, M. B. M. & Hassan, W. H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 148, 283–294. https://doi.org/10.1016/j.comnet.2018.11.025 (2019). (PMID: 10.1016/j.comnet.2018.11.025)
Criminals and Hostile States Attack Healthcare With Impunity; the CyberPeace Institute Calls for Accountability, CyberPeace Inst., Geneva, Switzerland, Mar. 2021.
F. Alsubaei, A. Abuhussein, and S. Shiva, “Security and privacy in the Internet of Medical Things: Taxonomy and risk assessment,” in Proc. IEEE 42nd Conf. Local Comput. Netw. Workshops (LCN Workshops), Oct. 2017, pp. 112–120, https://doi.org/10.1109/LCN.Workshops.2017.72 .
Trappe, W. The challenges facing physical layer security. IEEE Commun. Mag. 53(6), 16–20. https://doi.org/10.1109/MCOM.2015.7120011 (2015). (PMID: 10.1109/MCOM.2015.7120011)
Hady, A. A., Ghubaish, A., Salman, T., Unal, D. & Jain, R. "Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study. IEEE Access 8, 106576–106584. https://doi.org/10.1109/ACCESS.2020.3000421 (2020). (PMID: 10.1109/ACCESS.2020.3000421)
Gopinath, M. & Sethuraman, S. C. A comprehensive survey on deep learning based malware detection techniques. Comput. Sci. Rev. https://doi.org/10.1016/j.cosrev.2022.100529 (2023). (PMID: 10.1016/j.cosrev.2022.100529)
Lokshina I., Lanting C. (2019) A Qualitative Evaluation of IoT-Driven eHealth: Knowledge Management, Business Models and Opportunities, Deployment and Evolution. In: Kryvinska N., Greguš M. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 20. Springer, Cham. https://doi.org/10.1007/978-3-319-94117-2_2.
Usman, M., Jan, M. A., He, X. & Chen, J. P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications. IEEE J. Sel. Areas Commun. 37(6), 1222–1230. https://doi.org/10.1109/JSAC.2019.2904349 (2019). (PMID: 10.1109/JSAC.2019.2904349)
Thamilarasu, G., Odesile, A. & Hoang, A. An Intrusion Detection System for Internet of Medical Things. IEEE Access 8, 181560–181576 (2020). (PMID: 10.1109/ACCESS.2020.3026260)
Zachos, G. et al. An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks. Electronics 10, 2562. https://doi.org/10.3390/electronics10212562 (2021). (PMID: 10.3390/electronics10212562)
Han, F., Yang, P., Du, H. & Li, X. Accuth+: Accelerometer-Based Anti-Spoofing Voice Authentication on Wrist-Worn Wearables. IEEE Trans. Mob. Comput. 23(5), 5571–5588. https://doi.org/10.1109/TMC.2023.3314837 (2024). (PMID: 10.1109/TMC.2023.3314837)
Liu, Y., Dong, X., Zio, E., & Cui, Y. (2025). Active Resilient Secure Control for Heterogeneous Swarm Systems Under Malicious Cyber-Attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1–10. https://doi.org/10.1109/TSMC.2025.3580940.
Chen, P., Song, Y. & Xia, Y. Adaptively Diagnosing System Faults in Microservice Architecture: An Autonomous Predictive Model Construction Framework. Future Generation Comput. Syst. https://doi.org/10.1016/j.future.2025.108256 (2025). (PMID: 10.1016/j.future.2025.108256)
Li, X., Xiang, J., Wu, F. & Li, M. A Dual Ranking Algorithm Based on the Multiplex Network for Heterogeneous Complex Disease Analysis. IEEE/ACM Trans. Comput. Biol. Bioinf. 19(4), 1993–2002. https://doi.org/10.1109/TCBB.2021.3059046 (2022). (PMID: 10.1109/TCBB.2021.3059046)
Xue, B. et al. Perturbation defense ultra high-speed weak target recognition. Eng. Appl. Artificial Intell. 138, 109420. https://doi.org/10.1016/j.engappai.2024.109420 (2024). (PMID: 10.1016/j.engappai.2024.109420)
Ding, F. et al. Intelligent Event Triggered Lane Keeping Security Control for Autonomous Vehicle Under DoS Attacks. IEEE Trans. Fuzzy Syst. https://doi.org/10.1109/TFUZZ.2025.3597276 (2025). (PMID: 10.1109/TFUZZ.2025.3597276)
Palanisamy, S. et al. Towards precision in IoT-based healthcare systems: a hybrid optimized framework for big data classification. J Big Data 12, 190. https://doi.org/10.1186/s40537-025-01243-1 (2025). (PMID: 10.1186/s40537-025-01243-1)
Sun, Q., Jian, X., Han, C. & Li, Y. An Improved Opportunistic Localization Algorithm Using LEO Signals Based on PSODC. IEEE Trans. Instrum. Meas. 74, 1–10. https://doi.org/10.1109/TIM.2025.3593550 (2025). (PMID: 10.1109/TIM.2025.3593550)
Palanisamy, S. N. Achieving Secured Medical Network (SMN) through Stateless Mechanism and SkeyM in Medical-Internet of Things (M-IoT). J. Eng. Appl. Sci. 71, 128. https://doi.org/10.1186/s44147-024-00460-4 (2024). (PMID: 10.1186/s44147-024-00460-4)
Nandy, S., Adhikari, M., Khan, M. A., Menon, V. G. & Verma, S. An Intrusion Detection Mechanism for Secured IoMT framework based on Swarm-Neural Network. IEEE J. Biomed. Health Inform. 26(5), 1969–1976. https://doi.org/10.1109/JBHI.2021.3101686 (2021). (PMID: 10.1109/JBHI.2021.3101686)
P. Radoglou-Grammatikis, P. Sarigiannidis, G. Efstathopoulos, T. Lagkas, G. Fragulis and A. Sarigiannidis, "A Self-Learning Approach for Detecting Intrusions in Healthcare Systems," ICC 2021 - IEEE International Conference on Communications, 2021, pp. 1–6, https://doi.org/10.1109/ICC42927.2021.9500354 .
Saheed, Y. K. & Arowolo, M. O. Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms. IEEE Access 9, 161546–161554. https://doi.org/10.1109/ACCESS.2021.3128837 (2021). (PMID: 10.1109/ACCESS.2021.3128837)
Manimurugan, S. et al. Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network. IEEE Access 8, 77396–77404. https://doi.org/10.1109/ACCESS.2020.2986013 (2020). (PMID: 10.1109/ACCESS.2020.2986013)
T. Saba, "Intrusion Detection in Smart City Hospitals using Ensemble Classifiers," 2020 13th International Conference on Developments in eSystems Engineering (DeSE), 2020, pp. 418–422, https://doi.org/10.1109/DeSE51703.2020.9450247 .
Kumar, P., Gupta, G. P. & Tripathi, R. An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. Comput. Commun. 166, 110–124. https://doi.org/10.1016/j.comcom.2020.12.003 (2021). (PMID: 10.1016/j.comcom.2020.12.003)
Swarna Priya, R. M. et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 160, 139–149. https://doi.org/10.1016/j.comcom.2020.05.048 (2020). (PMID: 10.1016/j.comcom.2020.05.048)
Liaqat, S., Akhunzada, A., Shaikh, F. S., Giannetsos, A. & Jan, M. A. SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). Comput. Commun. 160, 697–705. https://doi.org/10.1016/j.comcom.2020.07.006 (2020). (PMID: 10.1016/j.comcom.2020.07.006)
Khan, S. & Akhunzada, A. A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT). Comput. Commun. 170, 209–216. https://doi.org/10.1016/j.comcom.2021.01.013 (2021). (PMID: 10.1016/j.comcom.2021.01.013)
Khan, I. A. et al. XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks. Future Generation Comput. Syst. 127, 181–193. https://doi.org/10.1016/j.future.2021.09.010 (2022). (PMID: 10.1016/j.future.2021.09.010)
Radoglou-Grammatikis, P. et al. Modeling, Detecting, and Mitigating Threats Against Industrial Healthcare Systems: A Combined Software Defined Networking and Reinforcement Learning Approach. IEEE Trans. Industr. Inf. 18(3), 2041–2052. https://doi.org/10.1109/TII.2021.3093905 (2022). (PMID: 10.1109/TII.2021.3093905)
Haseeb, K., Ahmad, I., Awan, I. I., Lloret, J. & Bosch, I. A machine learning SDN-enabled big data model for IoMT systems. Electronics 10(18), 2228 (2021). (PMID: 10.3390/electronics10182228)
Rani, S., Kumar, S., Kataria, A., & Min, H. (2023). SmartHealth: An intelligent framework to secure IoMT service applications using machine learning. ICT Express.
Dhanya, L. & Chitra, R. A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection. Expert Syst. Appl. 237, 121618 (2024). (PMID: 10.1016/j.eswa.2023.121618)
Hasan, M. M., Islam, M. M., Zarif, A. & Hossain, M. S. Attack and anomaly detection in IoT sensors in IoMT healthcare systems using machine learning. IEEE Internet Things J. 7(10), 8834–8846 (2020).
Salman, T., Unal, D. & Jain, R. Data integrity attacks and detection in Internet of Medical Things. IEEE J. Biomed. Health Inform. 25(8), 3166–3177 (2021).
Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A. & Anwar, A. N. TON-IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 8, 165130–165150 (2020). (PMID: 10.1109/ACCESS.2020.3022862)
Chen, T., Guestrin, C. "XGBoost: A Scalable Tree Boosting System," Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016.
Mishra, S., Bashir, A. K. & Puthal, D. A novel hybrid ensemble learning for anomaly detection in industrial IoT systems. Futur. Gener. Comput. Syst. 137, 14–28 (2023).
Cortes, C. & Vapnik, V. Support-Vector Networks. Mach. Learn. 20, 273–297. https://doi.org/10.1007/BF00994018 (1995). (PMID: 10.1007/BF00994018)
Schölkopf, B. & Smola, A. J. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond (MIT Press, 2002).
Chen, T., & Guestrin, C. (2016). "XGBoost: A Scalable Tree Boosting System." Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ‘16). ACM. https://doi.org/10.1145/2939672.2939785.
Zhang, H., Xu, Y., Luo, R. & Mao, Y. Fast GNSS acquisition algorithm based on SFFT with high noise immunity. China Communications 20(5), 70–83. https://doi.org/10.23919/JCC.2023.00.006 (2023). (PMID: 10.23919/JCC.2023.00.006)
Xu, G. et al. CBRFL: A framework for Committee-based Byzantine-Resilient Federated Learning. J. Netw. Comput. Appl. 238, 104165. https://doi.org/10.1016/j.jnca.2025.104165 (2025). (PMID: 10.1016/j.jnca.2025.104165)
Li, J. et al. Outlier detection using iterative adaptive mini-minimum spanning tree generation with applications on medical data. Front. Phys. 14, 1233341. https://doi.org/10.3389/fphys.2023.1233341 (2023). (PMID: 10.3389/fphys.2023.1233341)
Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G. "OPEM: A Static-Dynamic Classifier for Malware Detection," 2014.
Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A. "Malware classification with recurrent networks," 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015.
Xu, G. et al. Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT. IEEE Trans. Inform. Forensics Security 20, 5647–5662. https://doi.org/10.1109/TIFS.2025.3574959 (2025). (PMID: 10.1109/TIFS.2025.3574959)
Jin, J., Wu, M., Ouyang, A., Li, K. & Chen, C. A Novel Dynamic Hill Cipher and Its Applications on Medical IoT. IEEE Internet Things J. 12(10), 14297–14308. https://doi.org/10.1109/JIOT.2025.3525623 (2025). (PMID: 10.1109/JIOT.2025.3525623)
Hu, X. et al. Predicting Herb-disease Associations Through Graph Convolutional Network. Current Bioinform. 18, 610–619. https://doi.org/10.2174/1574893618666230504143647 (2023). (PMID: 10.2174/1574893618666230504143647)
Mirsky, Y., et al. "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," Network and Distributed System Security Symposium (NDSS), 2018.
Zhang, Z., et al. "An Effective Feature Selection Approach for Malware Detection," Journal of Information Security and Applications, 2019.
Shi, S. & Liu, W. B2-ViT Net: Broad Vision Transformer Network With Broad Attention for Seizure Prediction. IEEE Trans. Neural Syst. Rehabil. Eng. 32, 178–188. https://doi.org/10.1109/TNSRE.2023.3346955 (2024). (PMID: 10.1109/TNSRE.2023.334695538145523)
He, W. et al. A Deep Reinforcement Learning Approach to Time Delay Differential Game Deception Resource Deployment. IEEE Trans. Dependable and Secure Comput. https://doi.org/10.1109/TDSC.2025.3620151 (2025). (PMID: 10.1109/TDSC.2025.3620151)
Zhang, K., Wang, Y., Bhatti, U. A., Zhou, Y. & Jin, M. Enhanced ransomware attacks detection using feature selection, sensitivity analysis, and optimized hybrid model. J. Big Data 12(1), 245. https://doi.org/10.1186/s40537-025-01289-1 (2025). (PMID: 10.1186/s40537-025-01289-1)
Zukaib, U., Cui, X., Zheng, C., Liang, D. & Din, S. U. Meta-Fed IDS: Meta-learning and Federated learning based fog-cloud approach to detect known and zero-day cyber attacks in IoMT networks. Journal of Parallel and Distributed Computing 192, 104934 (2024). (PMID: 10.1016/j.jpdc.2024.104934)
Ghourabi, A. & Alkhalil, A. A Federated Learning Model for Detecting Cyberattacks in Internet of Medical Things Networks. IEEE Access 13, 123018–123030. https://doi.org/10.1109/ACCESS.2025.3588808 (2025). (PMID: 10.1109/ACCESS.2025.3588808)
Hu, F. et al. Spatial networks of China’s specialized, refined, distinctive, and innovative medical device firms based on parent–subsidiary contacts: implications for regional health policy. Front. Public Health 13, 1676189. https://doi.org/10.3389/fpubh.2025.1676189 (2025). (PMID: 10.3389/fpubh.2025.16761894138329512689987)
Ksibi, S., Jaidi, F. & Bouhoula, A. MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT). Int. J. Inf. Secur. 24(1), 21 (2025). (PMID: 10.1007/s10207-024-00923-y)
Nasayreh, A. et al. Automated detection of cyber attacks in healthcare systems: A novel scheme with advanced feature extraction and classification. Comput. Secur. 150, 104288 (2025). (PMID: 10.1016/j.cose.2024.104288)
Jabbar, N. K., Naderan, M. & Taha, M. S. HybridIoMT: A Dual-Phase Machine Learning Framework for Robust Cybersecurity in Internet of Medical Things. Int. J. Intell. Eng. Syst. 18(4), 307–321 (2025).
Zhao, Z. et al. Secure Internet of Things (IoT) using a novel Brooks Iyengar quantum Byzantine Agreement-centered blockchain Networking (BIQBA-BCN) model in smart healthcare. Inform. Sci. 629, 440–455. https://doi.org/10.1016/j.ins.2023.01.020 (2023). (PMID: 10.1016/j.ins.2023.01.020)
Grant Information:
PNURSP2026R97 Princess Nourah Bint Abdulrahman University
Contributed Indexing:
Keywords: Cyber attacks; IoMT; Machine learning; SVM; Soft voting; XGBoost
Entry Date(s):
Date Created: 20260131 Date Completed: 20260218 Latest Revision: 20260221
Update Code:
20260221
PubMed Central ID:
PMC12916823
DOI:
10.1038/s41598-026-37832-0
PMID:
41620472
Database:
MEDLINE

*Further Information*

*Today, the rise of the Internet of Medical Things (IoMT) has evolved into a highly valued global market worth billions of dollars. However, this growth has also created many opportunities for massive and advanced attack scenarios due to the vast number of devices and their interconnected communication networks. Based on recent reports, it is observed that during the Covid-19 pandemic, the necessity of the IoMT ecosystem has increased significantly. On the other hand, attackers and intruders aim to impair data integrity and patient safety with the prevalence of sophisticated cyber attacks including Man in the Middle (MITM) attacks like spoofing and data injection. In this research work, WUSTL-EHMS-2020 dataset is utilized to demonstrate a robust IoMT cyberattack detection method based on machine learning and the efficiency of the proposed model is validated by employing TON-IoT and CICIDS 2017 datasets. We offer an ensemble approach that employs Extreme Gradient Boosting (XGBoost) and Support Vector Machine (SVM) classifiers to address the exclusive challenges in IoMT security. By utilizing the complementing advantages of SVM's decision boundary precision and XGBoost's gradient-based optimization, our model outperforms baseline techniques with a superior detection accuracy of 98.04% with WUSTL-EHMS-2020 dataset. In addition, the practicality of the proposed model is examined by considering peculiar features of IoMT like resource restrictions, medical device communication diversity, and healthcare data privacy by comparing with IoMT and IoT datasets by exposing the patterns of cyberattack in dynamic IoMT environment. Hence, this research will be considered as the pioneer for developing reliable IoMT security solutions by adapting trustworthy and scalability.
(© 2026. The Author(s).)*

*Declarations. Competing interests: The authors declare no competing interests.*