A Study into Data Analysis and Visualisation to increase the Cyber-Resilience of Healthcare Infrastructures

被引:6
作者
Boddy, Aaron [1 ]
Hurst, William [1 ]
Mackay, Michael [1 ]
El Rhalibi, Abdennour [1 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, James Parsons Bldg,Byrom St, Liverpool L3 3AF, Merseyside, England
来源
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND MACHINE LEARNING (IML'17) | 2017年
关键词
Cyber-Security; Network Security; WanaCrypt0r; WannaCry Machine Learning; Visualisation; Healthcare Infrastructures;
D O I
10.1145/3109761.3109793
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In May 2017, a global ransomware campaign adversely affected approximately 48 UK hospitals. Response to the WannaCry cyber-attack resulted in many hospital networks being taken offline, and non-emergency patients being refused care. This is a clear example that data behaviour within healthcare infrastructures needs to be monitored for malicious, erratic or unusual activity. There is a perceived lack of threat within healthcare organisations with regards to cyber-security. Hospital infrastructures present a unique threat vector, with a dependence on legacy software, medical devices and bespoke software. Additionally, many PCs are shared by a number of users, all of whom use a variety of disparate IT systems. Every healthcare infrastructure configuration is unique and a one size fits all security solution cannot be applied to healthcare. Existing cyber-security technology within hospital infrastructures is typically perimeter-focused. Once a malicious user has compromised the boundary through a backdoor, there is a lack of security architecture monitoring active potential threats inside the network. Therefore, this paper presents research towards a system, which can detect unusual data behaviour through the use of advanced data analytics and visualisation techniques. Machine learning algorithms have the capability to learn patterns of data and profile users' behaviour, which can be represented visually. The proposed system is tailored to healthcare infrastructures by learning typical data behaviours and profiling users. The system adds to the defence-in-depth of the healthcare infrastructure by understanding the unique configuration of the network and autonomously analysing.
引用
收藏
页数:7
相关论文
共 18 条
[1]  
[Anonymous], 2015, P 2015 INT C INN INF
[2]  
[Anonymous], 2006, Mathematica journal, DOI DOI 10.3402/QHW.V6I2.5918
[3]  
Arney D, 2011, IEEE ENG MED BIO, P2376, DOI 10.1109/IEMBS.2011.6090663
[4]  
Boddy A., 2016, 9 INT C DEV ESYSTEMS
[5]   Towards Realizing a Self-Protecting Healthcare Information System [J].
Chen, Qian ;
Lambright, Jonathan .
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, :687-690
[6]  
Hurst W., 2015, J COMPUT SCI APPL SP, V3, P1
[7]   The Internet of Things for Health Care: A Comprehensive Survey [J].
Islam, S. M. Riazul ;
Kwak, Daehan ;
Kabir, Md. Humaun ;
Hossain, Mahmud ;
Kwak, Kyung-Sup .
IEEE ACCESS, 2015, 3 :678-708
[8]   A Direct Path to Dependable Software [J].
Jackson, Daniel .
COMMUNICATIONS OF THE ACM, 2009, 52 (04) :78-88
[9]  
Kim J, 2013, IEEE ENG MED BIO, P2283, DOI 10.1109/EMBC.2013.6609993
[10]   Emerging Security Mechanisms for Medical Cyber Physical Systems [J].
Kocabas, Ovunc ;
Soyata, Tolga ;
Aktas, Mehmet K. .
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2016, 13 (03) :401-416