A Framework to Detect Cyber-attacks against Networked Medical Devices (Internet of Medical Things): An Attack-Surface-Reduction by Design Approach

Sanaz Kavianpour, Bharanidharan Shanmugam, Ali Zolait, Abdul Razaq

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
    47 Downloads (Pure)

    Abstract

    Most medical devices in the healthcare system are not built-in security concepts. Hence, these devices' built-in vulnerabilities prone them to various cyber-attacks when connected to a hospital network or cloud. Attackers can penetrate devices, tamper, and disrupt services in hospitals and clinics, which results in threatening patients' health and life. A specialist can Manage Cyber-attacks risks by reducing the system's attack surface. Attack surface analysis, either as a potential source for exploiting a potential vulnerability by attackers or as a medium to reduce cyber-attacks play a significant role in mitigating risks. Furthermore, it is necessitated to perform attack surface analysis in the design phase. This research proposes a framework that integrates attack surface concepts into the design and development of medical devices. Devices are classified as high-risk, medium-risk, and low-risk. After risk assessment, the employed classification algorithm detects and analyzes the attack surfaces. Accordingly, the relevant adapted security controls will be prompted to hinder the attack. The simulation and evaluation of the framework is the subject of further research.

    Original languageEnglish
    Pages (from-to)1289-1298
    Number of pages10
    JournalInternational Journal of Computing and Digital Systems
    Volume11
    Issue number1
    DOIs
    Publication statusPublished - Jul 2021

    Bibliographical note

    Publisher Copyright:
    © 2022 University of Bahrain. All rights reserved.

    Fingerprint

    Dive into the research topics of 'A Framework to Detect Cyber-attacks against Networked Medical Devices (Internet of Medical Things): An Attack-Surface-Reduction by Design Approach'. Together they form a unique fingerprint.

    Cite this