Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments

被引:65
作者
Fernandez Maimo, Lorenzo [1 ]
Huertas Celdran, Alberto [2 ]
Perales Gomez, Angel L. [1 ]
Garcia Clemente, Felix J. [1 ]
Weimer, James [3 ]
Lee, Insup [3 ]
机构
[1] Univ Murcia, Dept Comp Engn, E-30100 Murcia, Spain
[2] Waterford Inst Technol, Telecommun Software & Syst Grp, Waterford X91 K0EK, Ireland
[3] Univ Penn, Dept Comp & Informat Sci, 200 S 33Rd St, Philadelphia, PA 19104 USA
关键词
integrated clinical environments; medical cyber-physical systems; cybersecurity; anomaly detection; ransomware classification; network function virtualization; software-defined networking; SOFTWARE-DEFINED NETWORKING;
D O I
10.3390/s19051114
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and optimizing healthcare by delivering new ways to monitor, diagnose and treat patients through integrated clinical environments (ICE). Despite the benefits provided by MCPS, many of the ICE medical devices have not been designed to satisfy cybersecurity requirements and, consequently, are vulnerable to recent attacks. Nowadays, ransomware attacks account for 85% of all malware in healthcare, and more than 70% of attacks confirmed data disclosure. With the goal of improving this situation, the main contribution of this paper is an automatic, intelligent and real-time system to detect, classify, and mitigate ransomware in ICE. The proposed solution is fully integrated with the ICE++ architecture, our previous work, and makes use of Machine Learning (ML) techniques to detect and classify the spreading phase of ransomware attacks affecting ICE. Additionally, Network Function Virtualization (NFV) and Software Defined Networking (SDN)paradigms are considered to mitigate the ransomware spreading by isolating and replacing infected devices. Different experiments returned a precision/recall of 92.32%/99.97% in anomaly detection, an accuracy of 99.99% in ransomware classification, and promising detection and mitigation times. Finally, different labelled ransomware datasets in ICE have been created and made publicly available.
引用
收藏
页数:31
相关论文
共 47 条
[1]   Comprehensive Survey on Petya Ransomware Attack [J].
Aidan, Jagmeet Singh ;
Verma, Harsh Kumar ;
Awasthi, Lalit Kumar .
2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, :122-125
[2]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[3]   On Threat Modeling and Mitigation of Medical Cyber-Physical Systems [J].
Almohri, Hussain ;
Cheng, Long ;
Yao, Danfeng ;
Alemzadeh, Homa .
2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, :114-119
[4]  
[Anonymous], 2018, PISCO TEMPERATURA VE
[5]  
[Anonymous], 2018, Data Breach Investigations Report
[6]  
[Anonymous], 2016, TECHNICAL REPORT
[7]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[8]  
[Anonymous], 2018, 2018 C INF COMM TECH
[9]  
[Anonymous], HOSP REMAIN KEY TARG
[10]  
[Anonymous], MED DEV MED SYST S 1