Tracing Masquerading Attacks in Distributed Healthcare Information Systems

被引:0
|
作者
Gander, Matthias [1 ]
Sauerwein, Clemens [1 ]
Breu, Ruth [1 ]
机构
[1] Univ Innsbruck, Inst Comp Sci, Innsbruck, Austria
关键词
Masqueraders; Anomaly Detection; IHE; Healthcare; Monitoring; RECORDS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Several states in the European Union started to introduce distributed clinical information systems to develop new communication channels, and enhance a more effective collaboration among different healthcare institutions. These systems exchange Electronic Health Records, containing critical private information regarding patients. Not encouraging is the fact that masquerading attacks, although not massively popular, have a massive impact on the security of a system in terms of confidentiality and integrity. Not unaware of the problem the Integrating the Healthcare Enterprise initiative defines the Audit Trail and Node Authentication profile which specifies audit messages for reporting security, and privacy related events. Unfortunately as of yet, the initiative does not define a detection methodology that can be used for uncovering masquerading attacks. Hence, no implementations exist that help security personnel to analyse these audit records automatically. Based on challenges derived via expert interviews we designed a detection methodology in form of a conceptual masquerader detection framework tailored to the IHE context.
引用
收藏
页码:1107 / 1117
页数:11
相关论文
共 50 条
  • [21] Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
    Avitabile, Gennaro
    Friolo, Daniele
    Visconti, Ivan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 220 - 247
  • [22] Worst case attacks on distributed resources systems
    Levy H.
    Tavori J.
    Performance Evaluation Review, 2020, 48 (02): : 9 - 11
  • [23] Defending Distributed Systems Against Adversarial Attacks
    Su L.
    Performance Evaluation Review, 2020, 47 (03): : 24 - 27
  • [24] A distributed information system for healthcare Web services
    Lu, J
    Naeem, T
    Stav, JB
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 783 - 790
  • [25] Security Against Impersonation Attacks in Distributed Systems
    Brown, Philip N.
    Borowski, Holly P.
    Marden, Jason R.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 440 - 450
  • [26] Guessing Attacks on Distributed-Storage Systems
    Bracher, Annina
    Hof, Eran
    Lapidoth, Amos
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) : 6975 - 6998
  • [27] An intelligent approach to prevent distributed systems attacks
    Abouzakhar, Nasser S.
    Manson, Gordon A.
    Information Management and Computer Security, 2002, 10 (05): : 203 - 209
  • [28] Distributed Detection of Covert Attacks for Interconnected Systems
    Barboni, Angelo
    Rezaee, Hamed
    Boem, Francesca
    Parisini, Thomas
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 2240 - 2245
  • [29] Guessing Attacks on Distributed-Storage Systems
    Bracher, Annina
    Hof, Eran
    Lapidoth, Amos
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1585 - 1589
  • [30] Navigating provenance information for distributed healthcare management
    Deora, Vikas
    Contes, Arnaud
    Rana, Omer F.
    Rajbhandari, Shrija
    Wootten, Ian
    Tamas, Kifor
    Varga, Laszlo Z.
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 859 - +