2016 9th International Conference on Developments in eSystems Engineering (DeSE) 2016
DOI: 10.1109/dese.2016.20
|View full text |Cite
|
Sign up to set email alerts
|

A Study into Detecting Anomalous Behaviours within HealthCare Infrastructures

Abstract: Abstract-The theft of medical data, which is intrinsically valuable, can lead to loss of patient privacy and trust. With increasing requirements for valuable and accurate information, patients need to be confident that their data is being stored safely and securely. However, medical devices are vulnerable to attacks from the digital domain, with many devices transmitting data unencrypted wirelessly to electronic patient record systems. As such, it is now becoming more necessary to visualise data patterns and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…The contribution of this research, (the novelty is further outlined in [4] and [22]) involves the use of Local Outlier Factor (LOF)-based data analytics techniques, an analyst-inthe-loop and visualisation to safeguard EPR data. The system provides contextual awareness to detect anomalous behaviour within EPR audit activity, using the following multi-stage process:…”
Section: Methodsmentioning
confidence: 99%
“…The contribution of this research, (the novelty is further outlined in [4] and [22]) involves the use of Local Outlier Factor (LOF)-based data analytics techniques, an analyst-inthe-loop and visualisation to safeguard EPR data. The system provides contextual awareness to detect anomalous behaviour within EPR audit activity, using the following multi-stage process:…”
Section: Methodsmentioning
confidence: 99%
“…However, a study 36 conducted on such methods highlighted the limitations of using existing risk assessment techniques and mitigation strategies as there exists a distinct difference between IT security and CPS security, and these risk assessment methods are not specifically designed for CPS security. From the perspective of CPS, the lack of security testing technology, lack of risk assessment systems, and the lack of behavior audit along with the use of malicious code to gain unauthorized access are the main causes of CPS (e.g., the ICS, 28 unmanned drones, 49 medical monitoring systems, 50 autonomous automotive systems, 51 and distributed robotics 52 ) being vulnerable to cyber attacks which in turn are a major strategic issue for the national economy and the livelihood of the people 28 …”
Section: Related Workmentioning
confidence: 99%
“…The goal of security engineers is to develop tools capable of detecting malicious, multi-stage intrusion attacks, weighting the individual attacks, and comparing them against the enormous and disparate database of attacks within the network [12]. This is a 'plain recognition' problem and an intruder's objectives should be determined based on the analysis of the entire dataset of attacks as a whole, rather than just an individual attack [13]. As such, in this section, a background discussion is put forward on the layout of medical infrastructures and the existing healthcare network security challenges.…”
Section: Background Researchmentioning
confidence: 99%