...
首页> 外文期刊>International journal of medical informatics >Attacking and defence pathways for Intelligent Medical Diagnosis System (IMDS)
【24h】

Attacking and defence pathways for Intelligent Medical Diagnosis System (IMDS)

机译:智能医疗诊断系统的攻击和防御途径(IMDS)

获取原文
获取原文并翻译 | 示例
           

摘要

Background: The Intelligent Medical Diagnosis System (IMDS) has been targeted by the cyber attackers, who aim to damage the Healthcare Critical National Infrastructure (CNI). This research is motivated by the recent cyber attacks happened worldwide that have resulted in the compromise of medical diagnosis records. This study was conducted to demonstrate how the IMDS could be attacked and diagnosis records compromised (i.e. heart disease) and suggest a list of security defence strategies to prevent against such attacks.Methods: This research developed an IMDS simulation platform by implementing the OpenEMR system. A Cardiac Diagnosis Component is then added to the IMDS. The IMDS is fed with the ECG data (retrieved from the PhysioNet/Computing in Cardiology Challenge 2017). This research then launched systematic ethical hacking, which was tailored to target IMDS diagnosis records. The systematic hacking was based on the NIST ethical hacking method and followed an attack pathway, starting from identifying the entry points of the medical websites, then propagating to gain access to the server, with the ultimate aim of modifying the heart disease diagnosis records.Results: The hacking was successful. Four major vulnerabilities (i.e. broken authentication, broken access control, security misconfiguration and using components with known vulnerabilities) were identified in the simulated IMDS and the cardiac diagnosis records were compromised. This research then proposed a list of security defence strategies to prevent such attacks at each possible attacking points along the attacking pathway.Conclusions: This research demonstrated a systematic ethical hacking to the IMDS, identified four major vulnerabilities and proposed the security defence pathways. It provided novel insights into the protection of IMDS and will benefit researchers in the community to conduct further research in security defence of IMDS.
机译:背景:智能医疗诊断系统(IMDS)已被网络攻击者为目标,该攻击者旨在损害医疗保健关键国家基础设施(CNI)。这项研究受到最近的网络攻击发生的激励,这导致了医学诊断记录的妥协。本研究表明,IMDS可能是如何受到攻击和诊断记录(即心脏病),并提出了一种安全防御策略列表,以防止此类攻击。方法:本研究通过实施OpenEMR系统开发了IMDS仿真平台。然后将心脏诊断组分添加到IMD中。 IMDS被ECG数据喂养(从物理赛/ 2017年心脏病学挑战中检索到的物理仪/计算)。然后,这项研究发起了系统的道德黑客,这是针对目标IMDS诊断记录量身定制的。系统的黑客基于NIST伦理黑客方法并遵循攻击途径,从识别医疗网站的入口点开始,然后传播到进入服务器,具有修改心脏病诊断记录的最终目标。结果:黑客攻击是成功的。在模拟IMD中确定了四种主要漏洞(即破坏的身份验证,破坏的访问控制,安全性错误配置以及使用已知漏洞的组件),并且心脏诊断记录受到损害。该研究提出了安全防御策略列表,以防止沿着攻击途径的每个可能的攻击点的攻击。结论:本研究表明,对IMDS进行了系统的道德黑客,确定了四个主要漏洞,并提出了安全防御途径。它为IMDS的保护提供了新的洞察力,并将有利于社区的研究人员在IMDS的安全防御中进行进一步的研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号