Tracing Masquerading Attacks in Distributed Healthcare Information Systems

被引:0
|
作者
Gander, Matthias [1 ]
Sauerwein, Clemens [1 ]
Breu, Ruth [1 ]
机构
[1] Univ Innsbruck, Inst Comp Sci, Innsbruck, Austria
关键词
Masqueraders; Anomaly Detection; IHE; Healthcare; Monitoring; RECORDS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Several states in the European Union started to introduce distributed clinical information systems to develop new communication channels, and enhance a more effective collaboration among different healthcare institutions. These systems exchange Electronic Health Records, containing critical private information regarding patients. Not encouraging is the fact that masquerading attacks, although not massively popular, have a massive impact on the security of a system in terms of confidentiality and integrity. Not unaware of the problem the Integrating the Healthcare Enterprise initiative defines the Audit Trail and Node Authentication profile which specifies audit messages for reporting security, and privacy related events. Unfortunately as of yet, the initiative does not define a detection methodology that can be used for uncovering masquerading attacks. Hence, no implementations exist that help security personnel to analyse these audit records automatically. Based on challenges derived via expert interviews we designed a detection methodology in form of a conceptual masquerader detection framework tailored to the IHE context.
引用
收藏
页码:1107 / 1117
页数:11
相关论文
共 50 条
  • [11] Distributed computing attacks on cryptographic systems
    Selkirk, APL
    Escott, AE
    BT TECHNOLOGY JOURNAL, 1999, 17 (02) : 69 - 73
  • [12] Information management in distributed healthcare networks
    Lenz, R
    DATA MANAGEMENT IN A CONNECTED WORLD: ESSAYS DEDICATED TO HARTMUT WEDEKIND ON THE OCCASION OF HIS 70TH BIRTHDAY, 2005, 3551 : 315 - 334
  • [13] Security Attacks on Information Centric Networking for Healthcare System
    Naik, B. Balaji
    Singh, Dhananjay
    Samaddar, A. B.
    Lee, Hoon-Jae
    2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 436 - 441
  • [14] A Survey on Security Attacks in Electronic Healthcare Systems
    Priya, R.
    Sivasankaran, S.
    Ravisasthiri, P.
    Sivachandiran, S.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 691 - 694
  • [15] Tracing Distributed Data Stream Processing Systems
    Zvara, Zoltan
    Szabo, Peter G. N.
    Hermann, Gabor
    Benczur, Andras
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 235 - 242
  • [16] Tracing distributed systems executions using AspectJ
    Lionel, CB
    Labiche, Y
    Leduc, J
    ICSM 2005: PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, 2005, : 81 - 90
  • [17] A Distributed Cyber-based Information Distillation and Control Architecture for Wireless Healthcare Systems
    Shen, Haiying
    Li, Ze
    Yang, Linlin
    1ST ACM INTERNATIONAL WORKSHOP ON MEDICAL-GRADE WIRELESS NETWORKS, 2009, : 33 - 37
  • [18] INFORMATION SYSTEMS AND HEALTHCARE XVIII: THE INTRODUCTION OF A HEALTHCARE COMPUTER INFORMATION SYSTEMS UNDERGRADUATE PROGRAM
    Trimmer, Ken
    Wiggins, Carla
    Beachboard, John C.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2007, 19 : 637 - 644
  • [19] Information Security and Distributed Denial of Service Attacks: A Survey
    Aldaej, Abdulaziz
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 685 - 690
  • [20] Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
    Jacob, Stephen
    Qiao, Yuansong
    Lee, Brian
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 588 - 595