2021
DOI: 10.1007/s00521-021-06441-5
|View full text |Cite
|
Sign up to set email alerts
|

A threat intelligence framework for protecting smart satellite-based healthcare networks

Abstract: Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical assets. Lightweight protocols, such as constrained application protocol (CoAP), have been widely utilised in transferring sensing data of medical devices to end-users in smart satellite-based healthcare IIoT networks (SmartSat-IIoHT). However, such protocols are extensively deployed without appropriate security configu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…Stay informed about the latest threat intelligence to anticipate emerging risks and vulnerabilities. According to [198], these activities are integral components of the cyber-security strategy in the financial services sector, where the landscape of cyber threats is dynamic and sophisticated. Continuous monitoring involves real-time surveillance of networks, systems, and data to promptly detect and respond to potential security incidents.…”
Section: Continuous Monitoring and Threat Intelligencementioning
confidence: 99%
“…Stay informed about the latest threat intelligence to anticipate emerging risks and vulnerabilities. According to [198], these activities are integral components of the cyber-security strategy in the financial services sector, where the landscape of cyber threats is dynamic and sophisticated. Continuous monitoring involves real-time surveillance of networks, systems, and data to promptly detect and respond to potential security incidents.…”
Section: Continuous Monitoring and Threat Intelligencementioning
confidence: 99%
“…Challenges in cybersecurity analytics for satellite networks include the complexity of satellite systems, limited visibility into network traffic, regulatory and compliance challenges, and insider threats and human error. To address these challenges, satellite operators are implementing strategic responses such as using advanced analytics techniques for anomaly detection, implementing secure-by-design principles in satellite system design, developing incident response plans and cyber resilience strategies, and investing in employee training and awareness programs (Al-Hawawreh, Moustafa & Slay, 2024, Bonnart, et. al., 2023, Breda, et.…”
Section: Case Studies and Examplesmentioning
confidence: 99%
“…This allows them to better understand threat incidents and make informed decisions about security approaches by sharing potential and existing cyber threat information with other organizations, individuals, or entities. Threat intelligence in smart healthcare refers to the collection, transformation, observation, analysis, and interpretation of any information or knowledge about cyber threats or attacks that will assist healthcare providers in taking appropriate action to protect their healthcare systems and networks [183]. Zhang et al [184] and Ali et al [185] define threat intelligence sharing as a proactive approach in which security experts in healthcare organizations collaborate to share insights and information about suspicious activities, potential cyber threats, attack patterns, and threat incidents with only trusted partners to enhance the entire security of the SHS and network.…”
Section: Threat Intelligence Sharingmentioning
confidence: 99%
“…Security professionals must analyze the acquired data to uncover trends and practical intelligence to help healthcare providers understand the threat scene and make informed security decisions. Smart healthcare systems use intrusion detection systems, firewalls, security information and event management solutions, and anomaly detection algorithms to quickly identify potential security incidents, suspicious activity and unauthorized access attempts [183]. Threat intelligence employs the information gathered through the security techniques mentioned above to determine threat or attack patterns [183].…”
Section: Threat Intelligence Sharingmentioning
confidence: 99%
See 1 more Smart Citation