2020
DOI: 10.1016/j.future.2018.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

Abstract: h i g h l i g h t s• A trust-based mechanism is built to detect insider nodes via behavioral profiling.• We select four mobile and networking features to establish behavioral profiles.• We apply Euclidean distance to derive a node's trust between two profiles.• We performed evaluation by collaborating with a practical healthcare center.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 57 publications
(39 citation statements)
references
References 36 publications
0
34
0
Order By: Relevance
“…However, the standard deviation of sentiment values can truly reflect the public's sentiment tendency according to the above analysis. Meng et al [18], used Euclidean distance to judge a node's reputation; accordingly, we think it may be useful to calculate every point's Euclidean distance in the standard deviation figure to find hidden social event as quickly as possible. Figure 13 shows the standard deviation distribution of comment scores vs time in March 2017, and has similar characteristics to Figure 9.…”
Section: Comment Number Distribution Vs Timementioning
confidence: 99%
“…However, the standard deviation of sentiment values can truly reflect the public's sentiment tendency according to the above analysis. Meng et al [18], used Euclidean distance to judge a node's reputation; accordingly, we think it may be useful to calculate every point's Euclidean distance in the standard deviation figure to find hidden social event as quickly as possible. Figure 13 shows the standard deviation distribution of comment scores vs time in March 2017, and has similar characteristics to Figure 9.…”
Section: Comment Number Distribution Vs Timementioning
confidence: 99%
“…As described above, SDN can provide much global visibility and flexibility of network configuration by decoupling the network control from the data plane. However, SDN still suffers many limitations, i.e., the centralized controller may become a single point of failure [20], whereas distributed controllers might be vulnerable to insider attacks [29], [30].…”
Section: Framework Of Blockchain-based Sdnmentioning
confidence: 99%
“…In recent years, machine learning techniques have been widely applied in network security domain, such as IP traffic identification, 25 malware detection, 26 user authentication, [27][28][29][30] and anomaly detection. [31][32][33] The application of machine learning itself can raise security and privacy issues, especially in the case of distributed and outsourced learning, which need to be taken care of when deploying in the real-world. [34][35][36][37][38]…”
Section: Distributed/collaborative Intrusion Detectionmentioning
confidence: 99%