6,234 Hits in 5.5 sec

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, Christian W. Probst
2018 IEEE Transactions on Network and Service Management  
Experimental results in either a simulated and a real-world network environment demonstrate the feasibility and effectiveness of our proposed approach regarding the detection of malicious healthcare devices  ...  In this paper, we focus on the identification of insider attacks in healthcare SDNs.  ...  ACKNOWLEDGMENT We would like to thank all surveyed healthcare managers and IT administrators from the relevant hospitals and clinics in Hong Kong, China and Singapore for their great support and helpful  ... 
doi:10.1109/tnsm.2018.2815280 fatcat:vrpjgsms4jcjnmkletvprs3rhi

Anomaly detection techniques for streaming data–An overview

Saranya Kunasekaran, Chellammal Suriyanarayanan
2020 Malaya Journal of Matematik  
In this paper, an overview of different techniques for detection of anomaly is presented.  ...  Data which flows continuously with respect to time is called streaming data and detection anomaly in such data in real time is an open challenge.  ...  Literature Review on Various Applications Intrusion Detection in Network traffic Due to the high usage of internet in daily activities, network security becomes a key foundation to all the web-based  ... 
doi:10.26637/mjm0s20/0133 fatcat:blyjw2z4q5datacu7y4lavwchq

Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System

Aastha Yadav, Sarthak Raisurana, H. Balaji, P. Lalitha, Ronnie D. Caytiles, N. Ch. S. N. Iyengar
2017 International Journal of Security and Its Applications  
Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years.  ...  One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival.  ...  So if one individual machine is compromised, it may not be detected if it isn't passing suspicious traffic over the network.  ... 
doi:10.14257/ijsia.2017.11.9.07 fatcat:bay3omngv5e7rk5k6k4mjlcrna

Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study

Anar A. Hady, Ali Ghubaish, Tara Salman, Devrim Una, Raj Jain
2020 IEEE Access  
However, most of the available healthcare intrusion detection systems either use network flow metrics or patients' biometric data to build their datasets.  ...  This paper aims to show that combining both network and biometric metrics as features performs better than using only one of the two types of features.  ...  The system includes a gateway for data gathering, an Intrusion Detection System (IDS) computer for monitoring the network traffic and detecting abnormal behaviors, an attacker to imitate a real attack  ... 
doi:10.1109/access.2020.3000421 fatcat:rnjzm7ikovgmhjuxpsf7eorehy

An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

Abdelwahed Berguiga, Ahlem Harchay
2022 Computers Materials & Continua  
These applications are running independently on different platforms, almost everywhere in the world.  ...  to the healthcare information technologies systems.  ...  At the same time, an RPL node has the possibility to join to many instances on the network but only join one DODAG in an instance.  ... 
doi:10.32604/cmc.2022.023399 fatcat:7r2kx2lta5frpnu3pag4zk2eny

A Framework for Malicious Traffic Detection in IoT Healthcare Environment

Faisal Hussain, Syed Ghazanfar Abbas, Ghalib A Shah, Ivan Miguel Pires, Ubaid U Fayyaz, Farrukh Shahzad, Nuno M Garcia, Eftim Zdravevski
2021 Sensors  
Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic.  ...  Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset.  ...  This article is based upon work from COST Action IC1303-AAPELE-Architectures, Algorithms and Protocols for Enhanced Living Environments and COST Action CA16226-SHELD-ON-Indoor living space improvement:  ... 
doi:10.3390/s21093025 pmid:33925813 fatcat:t5ccg5oiurgaxfzkamepsgmvqy

Quality of service support in wireless sensor networks for emergency healthcare services

Oscar Gama, Paulo Carvalho, J. A. Afonso, P. M. Mendes
2008 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society  
In this context, most existing wireless body sensor networks fall short in meeting these demands as they only offer an unreliable service delivery. e-Emergency systems must provide quality of service (  ...  The reliable and efficient operation of emergency healthcare (e-emergency) services poses quality demands to the systems and underlying communication infrastructures.  ...  The model is based on an extended power state machine.  ... 
doi:10.1109/iembs.2008.4649401 pmid:19162904 fatcat:h26qrxqggjhyfej2fpxwlr2hdi

Multi-Phase Detection of Spoofed SYN Flooding Attacks

Namkyun Baik, Namhi Kang
2018 International Journal of Grid and Distributed Computing  
To lighten the burden of controlling network nodes and the entire internet, the function of identifying and removing abnormal traffics was proposed based on the investigation of sequence number redundancy  ...  In the proposed method, determination of forged traffics involved in an attack is considered as the most important factor, and forged packets are detected through the comparison with normal packets.  ...  First, with respect to the input traffic, the traffic load is compared with the sessions, and if the traffic load is abnormal, the detection of spoofed SYN flooding DDoS attacks is initiated.  ... 
doi:10.14257/ijgdc.2018.11.3.03 fatcat:u2li5wpuuvdgjfnpf6eaubvkra

MidSiot: A Multistage Intrusion Detection System for Internet of Things

Nguyen Dat-Thinh, Ho Xuan-Ninh, Le Kim-Hung, Hamed Nassar
2022 Wireless Communications and Mobile Computing  
The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of  ...  This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks.  ...  It constantly monitors network traffics coming from various sources to detect abnormalities, which may be security threats.  ... 
doi:10.1155/2022/9173291 fatcat:g7ubdljhuvb3jaexhnjieneywa

Designing of Efficient Technique Blocking Abnormal Packets through Correlation Analysis in the Healthcare Environment

Seung-Han Lee, Minjin Kim, Hyunsoo Chung, Seungmin Yang
2016 Indian Journal of Science and Technology  
Findings: It is aimed to design an abnormal packet screening techniques through correlation analysis of abnormal conducts in the medical security gateway so that it can be safe from server attacks, medical  ...  In this paper, as a way to defend against malicious attacks in the smart medical environment where the electronic medical devices and wired and wireless networks are combine.  ...  The detection is then performed on the action strong of linear association.  ... 
doi:10.17485/ijst/2016/v9i24/96137 fatcat:yjhu3tjovvgg3d7v5temwo55cq

Securing an IoT Medical System Using AI and a Unidirectional Network Device: Application to a Driver [chapter]

Georges El Hajal, Roy Abi Zeid Daou, Yves Ducq, Josef Boercsoek
2021 Frontiers in Artificial Intelligence and Applications  
Thus, based on an application that monitors a driver's health while driving his car, a data diode will be implemented in order to assure security of the system by forcing unidirectional flow of network  ...  Added to that, an AI-based program will be developed to verify the confidentiality, the integrity and the availability of the exchanged data and to check the patient health for abnormalities.  ...  flow of network data to the healthcare provider side.  ... 
doi:10.3233/faia210425 fatcat:zzvqciguijhb5e7bpwijx3wfga

Security Incident - Attack Simulator v1

Michael Kontoulis
2020 Zenodo  
In addition, an overview of the currently selected tools that shall be used for the simulation processes is provided  ...  Within this task, we will create network traffic abnormalities that will need to be detected by the following components. Data Traffic Monitoring DTM is a rule-based intrusion detection system.  ...  Expected response from SPHINX: SPHINX should detect the presence of an abnormal behaviour between a user (malicious hacker) and the eCare healthcare portal.  ... 
doi:10.5281/zenodo.4280609 fatcat:asdv2qe3z5cyvoupfr7kozvm4y

Real-Time Monitoring of Driver's Biometrics to Prevent Multi-Vehicle Chain Collisions Caused by Impending Medical Emergencies

K V.N. Kavitha, Kanishak Kesarwani, S M. Pranav, Tanish Noah
2018 International Journal of Engineering & Technology  
Smart healthcare systems are essentially going to become an inevitable part of our day to day activities.  ...  It is designed to detect anomalies in the driver's health conditions and take preventive actions to prevent road accidents.  ...  The healthcare monitoring system is further extended to provide the detected and recorded abnormal values as well as the location information to both the transport office and the healthcare providers.  ... 
doi:10.14419/ijet.v7i3.6.14937 fatcat:ykdkrbtnvraxdmor2wiu3muhyq


Kanimozhi J.
2017 International Journal of Advanced Research in Computer Science  
Wireless sensor network (WSN) it faces a heavy traffic within the sensor nodes, which causes various issues. In order to view this issue in wireless sensor network (WSN) we undergo anomaly detection.  ...  A traffic monitoring application is chosen to monitor the traffic and to detect anomaly. Anomaly is been detected using various techniques proposed in WSN.  ...  If outlier is detected it triggers an alarm.  ... 
doi:10.26483/ijarcs.v8i8.4800 fatcat:gs56ecalyren5dr2hsbyqkkzmi

CAMP: Congestion Avoidance and Mitigation Protocol for Wireless Body Area Networks

Muhammad Anwar, School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia, Abdul Hanan Abdullah, Rd. Rohmat Saedudin, Farhan Masud, Fasee Ullah, School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia, School of Industrial Engineering, Telkom University, 40257 Bandung, West Java, Indonesia, Faculty of Life Sciences Business Management, University of Veterinary and Animal Sciences, Shaykh Abdul Qadir Jilani Road, Lahore, Pakistan, Department of Computer Science and Information Technology, Sarhad University of Science and Information Technology, Peshawar, Pakistan
2018 International Journal of Integrated Engineering  
It is economical and helpful solution for both patients and healthcare providers. BSN is made up of small Bio-medical sensors (BMSs) and Body Coordinator (BC).  ...  The experimental results shows that the proposed protocol carried out better results in terms of energy efficiency and network lifetime in BSNs.  ...  Congestion detection in this algorithm is based on packet inter-arrival rate and packet service time. Later, Gunasundari et al. in [17] proposed an extended version of LACAS scheme named MLACAS.  ... 
doi:10.30880/ijie.2018.10.06.008 fatcat:b42jxzottjby7b2cptrujdm2ra
« Previous Showing results 1 — 15 out of 6,234 results