BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare

被引:58
作者
Wazid, Mohammad [1 ]
Kumar Das, Ashok [2 ,3 ]
Shetty, Sachin [4 ]
机构
[1] Graphic Era Deemed be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[2] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[4] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Dept Computat Modeling & Simulat Engn, Suffolk, VA 23435 USA
关键词
Ransomware; Medical services; Security; Blockchains; Electronic mail; Malware; Computers; smart healthcare; intrusion detection; machine learning; blockchain; INTERNET; THINGS;
D O I
10.1109/TCE.2022.3208795
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ransomware is a type of malicious program or software that encrypts the contents on a hard disc and prevents the users from accessing them unless they pay an amount (called a ransom). Most of the organizations, such as financial institutes and healthcare sectors (i.e., smart healthcare) are targeted by ransomware attacks. Ransomware assaults are among the most frightening types of cyber-attacks, and they are not confined to a specific sector or the countries. Blockchain is a tamper-proof technology, which is more secure, robust and decentralized in nature. Features of blockchain can add more security for detection and mitigation of ransomware more effectively. In this paper, we propose a new blockchain-enabled security framework to detect and defend the ransomware attacks for smart healthcare (in short, BSFR-SH). The conducted security analysis proves the security of the proposed BSFR-SH against the ransomware attacks. The performance of BSFR-SH is significantly better than the other similar existing mechanisms as it achieves better accuracy and F1-score than other compared mechanisms. Furthermore, the practical demonstration of BSFR-SH is provided to estimate the impact on important performance parameters.
引用
收藏
页码:18 / 28
页数:11
相关论文
共 26 条
[11]   The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial [J].
Ferrag, Mohamed Amine ;
Shu, Lei .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) :17236-17260
[12]   Blockchain Technologies for the Internet of Things: Research Issues and Challenges [J].
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Mukherjee, Mithun ;
Derhab, Abdelouahid ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2188-2204
[13]   Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques [J].
Hwang, Jinsoo ;
Kim, Jeankyung ;
Lee, Seunghwan ;
Kim, Kichang .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) :2597-2609
[14]   The Elliptic Curve Digital Signature Algorithm (ECDSA) [J].
Don Johnson ;
Alfred Menezes ;
Scott Vanstone .
International Journal of Information Security, 2001, 1 (1) :36-63
[15]   A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense [J].
Min, Donghyun ;
Ko, Yungwoo ;
Walker, Ryan ;
Lee, Junghee ;
Kim, Youngjae .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) :2038-2051
[16]   Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense [J].
Min, Donghyun ;
Park, Donggyu ;
Ahn, Jinwoo ;
Walker, Ryan ;
Lee, Junghee ;
Park, Sungyong ;
Kim, Youngjae .
IEEE COMPUTER ARCHITECTURE LETTERS, 2018, 17 (02) :243-246
[17]   Analysis of Crypto-Ransomware Using ML-Based Multi-Level Profiling [J].
Poudyal, Subash ;
Dasgupta, Dipankar .
IEEE ACCESS, 2021, 9 :122532-122547
[18]   Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack [J].
Sayeed, Sarwar ;
Marco-Gisbert, Hector .
APPLIED SCIENCES-BASEL, 2019, 9 (09)
[19]  
Shah M., BLOCKCHAINS NFTS IDE
[20]   Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches [J].
Sharmeen, Shaila ;
Ahmed, Yahye Abukar ;
Huda, Shamsul ;
Kocer, Bari S. ;
Hassan, Mohammad Mehedi .
IEEE ACCESS, 2020, 8 :24522-24534