A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks
2018
IEEE Transactions on Network and Service Management
Experimental results in either a simulated and a real-world network environment demonstrate the feasibility and effectiveness of our proposed approach regarding the detection of malicious healthcare devices ...
In this paper, we focus on the identification of insider attacks in healthcare SDNs. ...
ACKNOWLEDGMENT We would like to thank all surveyed healthcare managers and IT administrators from the relevant hospitals and clinics in Hong Kong, China and Singapore for their great support and helpful ...
doi:10.1109/tnsm.2018.2815280
fatcat:vrpjgsms4jcjnmkletvprs3rhi
Anomaly detection techniques for streaming data–An overview
2020
Malaya Journal of Matematik
In this paper, an overview of different techniques for detection of anomaly is presented. ...
Data which flows continuously with respect to time is called streaming data and detection anomaly in such data in real time is an open challenge. ...
Literature Review on Various Applications
Intrusion Detection in Network traffic Due to the high usage of internet in daily activities, network security becomes a key foundation to all the web-based ...
doi:10.26637/mjm0s20/0133
fatcat:blyjw2z4q5datacu7y4lavwchq
Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System
2017
International Journal of Security and Its Applications
Healthcare Organizations have seen an alarming rise in cyber-attacks in the recent years. ...
One way a hacker could get control was by breaking into a medical network to gain access over the active medical devices that patients rely on for their survival. ...
So if one individual machine is compromised, it may not be detected if it isn't passing suspicious traffic over the network. ...
doi:10.14257/ijsia.2017.11.9.07
fatcat:bay3omngv5e7rk5k6k4mjlcrna
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
2020
IEEE Access
However, most of the available healthcare intrusion detection systems either use network flow metrics or patients' biometric data to build their datasets. ...
This paper aims to show that combining both network and biometric metrics as features performs better than using only one of the two types of features. ...
The system includes a gateway for data gathering, an Intrusion Detection System (IDS) computer for monitoring the network traffic and detecting abnormal behaviors, an attacker to imitate a real attack ...
doi:10.1109/access.2020.3000421
fatcat:rnjzm7ikovgmhjuxpsf7eorehy
An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks
2022
Computers Materials & Continua
These applications are running independently on different platforms, almost everywhere in the world. ...
to the healthcare information technologies systems. ...
At the same time, an RPL node has the possibility to join to many instances on the network but only join one DODAG in an instance. ...
doi:10.32604/cmc.2022.023399
fatcat:7r2kx2lta5frpnu3pag4zk2eny
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
2021
Sensors
Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. ...
Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. ...
This article is based upon work from COST Action IC1303-AAPELE-Architectures, Algorithms and Protocols for Enhanced Living Environments and COST Action CA16226-SHELD-ON-Indoor living space improvement: ...
doi:10.3390/s21093025
pmid:33925813
fatcat:t5ccg5oiurgaxfzkamepsgmvqy
Quality of service support in wireless sensor networks for emergency healthcare services
2008
2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
In this context, most existing wireless body sensor networks fall short in meeting these demands as they only offer an unreliable service delivery. e-Emergency systems must provide quality of service ( ...
The reliable and efficient operation of emergency healthcare (e-emergency) services poses quality demands to the systems and underlying communication infrastructures. ...
The model is based on an extended power state machine. ...
doi:10.1109/iembs.2008.4649401
pmid:19162904
fatcat:h26qrxqggjhyfej2fpxwlr2hdi
Multi-Phase Detection of Spoofed SYN Flooding Attacks
2018
International Journal of Grid and Distributed Computing
To lighten the burden of controlling network nodes and the entire internet, the function of identifying and removing abnormal traffics was proposed based on the investigation of sequence number redundancy ...
In the proposed method, determination of forged traffics involved in an attack is considered as the most important factor, and forged packets are detected through the comparison with normal packets. ...
First, with respect to the input traffic, the traffic load is compared with the sessions, and if the traffic load is abnormal, the detection of spoofed SYN flooding DDoS attacks is initiated. ...
doi:10.14257/ijgdc.2018.11.3.03
fatcat:u2li5wpuuvdgjfnpf6eaubvkra
MidSiot: A Multistage Intrusion Detection System for Internet of Things
2022
Wireless Communications and Mobile Computing
The evaluation results on three popular IDS datasets (IoTID20, CIC-IDS-2017, and BOT-IoT) indicate our proposal could detect seven common cyberattacks targeting IoT devices with an average accuracy of ...
This demonstrates that MidSiot could be an effective and practical IDS to protect IoT networks. ...
It constantly monitors network traffics coming from various sources to detect abnormalities, which may be security threats. ...
doi:10.1155/2022/9173291
fatcat:g7ubdljhuvb3jaexhnjieneywa
Designing of Efficient Technique Blocking Abnormal Packets through Correlation Analysis in the Healthcare Environment
2016
Indian Journal of Science and Technology
Findings: It is aimed to design an abnormal packet screening techniques through correlation analysis of abnormal conducts in the medical security gateway so that it can be safe from server attacks, medical ...
In this paper, as a way to defend against malicious attacks in the smart medical environment where the electronic medical devices and wired and wireless networks are combine. ...
The detection is then performed on the action strong of linear association. ...
doi:10.17485/ijst/2016/v9i24/96137
fatcat:yjhu3tjovvgg3d7v5temwo55cq
Securing an IoT Medical System Using AI and a Unidirectional Network Device: Application to a Driver
[chapter]
2021
Frontiers in Artificial Intelligence and Applications
Thus, based on an application that monitors a driver's health while driving his car, a data diode will be implemented in order to assure security of the system by forcing unidirectional flow of network ...
Added to that, an AI-based program will be developed to verify the confidentiality, the integrity and the availability of the exchanged data and to check the patient health for abnormalities. ...
flow of network data to the healthcare provider side. ...
doi:10.3233/faia210425
fatcat:zzvqciguijhb5e7bpwijx3wfga
Security Incident - Attack Simulator v1
2020
Zenodo
In addition, an overview of the currently selected tools that shall be used for the simulation processes is provided ...
Within this task, we will create network traffic abnormalities that will need to be detected by the following components.
Data Traffic Monitoring DTM is a rule-based intrusion detection system. ...
Expected response from SPHINX: SPHINX should detect the presence of an abnormal behaviour between a user (malicious hacker) and the eCare healthcare portal. ...
doi:10.5281/zenodo.4280609
fatcat:asdv2qe3z5cyvoupfr7kozvm4y
Real-Time Monitoring of Driver's Biometrics to Prevent Multi-Vehicle Chain Collisions Caused by Impending Medical Emergencies
2018
International Journal of Engineering & Technology
Smart healthcare systems are essentially going to become an inevitable part of our day to day activities. ...
It is designed to detect anomalies in the driver's health conditions and take preventive actions to prevent road accidents. ...
The healthcare monitoring system is further extended to provide the detected and recorded abnormal values as well as the location information to both the transport office and the healthcare providers. ...
doi:10.14419/ijet.v7i3.6.14937
fatcat:ykdkrbtnvraxdmor2wiu3muhyq
ANOMALY DETECTION OF TRAFFIC MONITORING IN WIRELESS SENSOR NETWORKS(WSN) – A SURVEY
2017
International Journal of Advanced Research in Computer Science
Wireless sensor network (WSN) it faces a heavy traffic within the sensor nodes, which causes various issues. In order to view this issue in wireless sensor network (WSN) we undergo anomaly detection. ...
A traffic monitoring application is chosen to monitor the traffic and to detect anomaly. Anomaly is been detected using various techniques proposed in WSN. ...
If outlier is detected it triggers an alarm. ...
doi:10.26483/ijarcs.v8i8.4800
fatcat:gs56ecalyren5dr2hsbyqkkzmi
CAMP: Congestion Avoidance and Mitigation Protocol for Wireless Body Area Networks
2018
International Journal of Integrated Engineering
It is economical and helpful solution for both patients and healthcare providers. BSN is made up of small Bio-medical sensors (BMSs) and Body Coordinator (BC). ...
The experimental results shows that the proposed protocol carried out better results in terms of energy efficiency and network lifetime in BSNs. ...
Congestion detection in this algorithm is based on packet inter-arrival rate and packet service time. Later, Gunasundari et al. in [17] proposed an extended version of LACAS scheme named MLACAS. ...
doi:10.30880/ijie.2018.10.06.008
fatcat:b42jxzottjby7b2cptrujdm2ra
« Previous
Showing results 1 — 15 out of 6,234 results