Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Intelligent Cyberattack Detection on SAFECARE Virtual Hospital

  • Conference paper
  • First Online:
Information Systems and Technologies (WorldCIST 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 470))

Included in the following conference series:

  • 1268 Accesses

Abstract

Healthcare organizations are a popular target for cybercrime due to its critical and vulnerable infrastructure. The IT threat detection system (ITDS), described in this work, is an intelligent system that improves the incident detection by providing network monitoring and intrusion detection by means of a machine learning approach. Different machine learning techniques were studied in public datasets, and then fine-tuned with healthcare data. Thus, the main contribution of this work is a plug and play toolkit built for hospitals and which allow them to detect security events. Another relevant outcome of this work is a “real” hospital ecosystem that allows the simulation and test of security tools in a hospital environment without sacrificing its availability.

This work has received funding from European Union’s H2020 research and innovation programme under SAFECARE Project, grant agreement no.787002.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baumann, A., Malatras, A., Taurins, E.: CSIRT capabilities in healthcare sector (2021)

    Google Scholar 

  2. Brown, G.: Ensemble learning. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning and Data Mining, pp. 393–402. Springer, Boston (2017). https://doi.org/10.1007/978-1-4899-7687-1_252

    Chapter  Google Scholar 

  3. Carneiro, J., Oliveira, N., Sousa, N., Maia, E., Praça, I.: Machine learning for network-based intrusion detection systems: an analysis of the CIDDS-001 dataset. In: Matsui, K., Omatu, S., Yigitcanlar, T., González, S.R. (eds.) DCAI 2021. LNNS, vol. 327, pp. 148–158. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-86261-9_15

    Chapter  Google Scholar 

  4. CBS: FBI warns of “imminent” ransomware attacks on hospital systems (2020)

    Google Scholar 

  5. CNN: Several hospitals targeted in new wave of ransomware attacks (2020)

    Google Scholar 

  6. Hady, A.A., Ghubaish, A., et al.: Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8, 106576–106584 (2020)

    Article  Google Scholar 

  7. Lella, I., Theocharidou, M., et al.: ENISA threat landscape 2021 (2021)

    Google Scholar 

  8. Maia, E., et al.: Cyber threat monitoring systems - comparing attack detection performance of ensemble algorithms. In: Abie, H., et al. (eds.) CPS4CIP 2020. LNCS, vol. 12618, pp. 31–47. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69781-5_3

    Chapter  Google Scholar 

  9. Newaz, A.I., Sikder, A.K., et al.: Heka: a novel intrusion detection system for attacks to personal medical devices. In: 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–9 (2020)

    Google Scholar 

  10. Radoglou-Grammatikis, P., Sarigiannidis, P., et al.: A self-learning approach for detecting intrusions in healthcare systems. In: ICC 2021, pp. 1–6 (2021)

    Google Scholar 

  11. Reis, B., Maia, E., Praça, I.: Selection and performance analysis of CICIDS2017 features importance. In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds.) FPS 2019. LNCS, vol. 12056, pp. 56–71. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45371-8_4

    Chapter  Google Scholar 

  12. Ring, M., Wunderlich, S., et al.: Creation of flow-based data sets for intrusion detection. J. Inf. Warfare 16, 40–53 (2017)

    Google Scholar 

  13. Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th ICISSP, pp. 108–116. INSTICC, SciTePress (2018)

    Google Scholar 

  14. Sun, Y., Lo, F.P.W., Lo, B.: Security and privacy for the internet of medical things enabled healthcare systems: a survey. IEEE Access 7, 183339–183355 (2019)

    Article  Google Scholar 

  15. Vemuri, V.K.: The hundred-page machine learning book. J. Inf. Technol. Case Appl. Res. 22(2), 136–138 (2020)

    Google Scholar 

  16. Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutor. 21(4), 3723–3768 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eva Maia .

Editor information

Editors and Affiliations

A ITDS KPIs Results

A ITDS KPIs Results

Intrusion detection systems are generally evaluated in a variety of ways, based on different evaluation datasets for their efficiency and effectiveness. Several features can be considered, which can range from performance and correctness to usability. To assess the performance of ITDS system, and since no benchmark KPIs exist so far for intrusion detection, we decided to define several KPIs that consider not only the efficiency of ML algorithms in attack detection, but also the performance of the tool itself. Thus, Table 3 presents these different KPIs. To define the target value, we studied the different results of the tools presented in the literature and available on the market. We use these values to determine if ITDS has achieved the expected performance.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maia, E., Lancelin, D., Carneiro, J., Oudin, T., Dória, Á., Praça, I. (2022). Intelligent Cyberattack Detection on SAFECARE Virtual Hospital. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F. (eds) Information Systems and Technologies. WorldCIST 2022. Lecture Notes in Networks and Systems, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-031-04829-6_29

Download citation

Publish with us

Policies and ethics