Cargando…
An Effective Self-Configurable Ransomware Prevention Technique for IoMT
Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services....
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657781/ https://www.ncbi.nlm.nih.gov/pubmed/36366214 http://dx.doi.org/10.3390/s22218516 |
_version_ | 1784829782851059712 |
---|---|
author | Tariq, Usman Ullah, Imdad Yousuf Uddin, Mohammed Kwon, Se Jin |
author_facet | Tariq, Usman Ullah, Imdad Yousuf Uddin, Mohammed Kwon, Se Jin |
author_sort | Tariq, Usman |
collection | PubMed |
description | Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services. Researchers and developers are, to date, considering the majority of the technological aspects and critical issues around the IoMT, e.g., security vulnerabilities and other cybercrimes. One of such major challenges IoMT has to face is widespread ransomware attacks; a malicious malware that encrypts the patients’ critical data, restricts access to IoMT devices or entirely disable IoMT devices, or uses several combinations to compromise the overall system functionality, mainly for ransom. These ransomware attacks would have several devastating consequences, such as loss of life-threatening data and system functionality, ceasing emergency and life-saving services, wastage of several vital resources etc. This paper presents a ransomware analysis and identification architecture with the objective to detect and validate the ransomware attacks and to evaluate its accuracy using a comprehensive verification process. We first develop a comprehensive experimental environment, to simulate a real-time IoMT network, for experimenting various types of ransomware attacks. Following, we construct a comprehensive set of ransomware attacks and analyze their effects over an IoMT network devices. Furthermore, we develop an effective detection filter for detecting various ransomware attacks (e.g., static and dynamic attacks) and evaluate the degree of damages caused to the IoMT network devices. In addition, we develop a defense system to block the ransomware attacks and notify the backend control system. To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. The evaluation results show more than 95% of accuracy of detecting various ransomware attacks. |
format | Online Article Text |
id | pubmed-9657781 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96577812022-11-15 An Effective Self-Configurable Ransomware Prevention Technique for IoMT Tariq, Usman Ullah, Imdad Yousuf Uddin, Mohammed Kwon, Se Jin Sensors (Basel) Article Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services. Researchers and developers are, to date, considering the majority of the technological aspects and critical issues around the IoMT, e.g., security vulnerabilities and other cybercrimes. One of such major challenges IoMT has to face is widespread ransomware attacks; a malicious malware that encrypts the patients’ critical data, restricts access to IoMT devices or entirely disable IoMT devices, or uses several combinations to compromise the overall system functionality, mainly for ransom. These ransomware attacks would have several devastating consequences, such as loss of life-threatening data and system functionality, ceasing emergency and life-saving services, wastage of several vital resources etc. This paper presents a ransomware analysis and identification architecture with the objective to detect and validate the ransomware attacks and to evaluate its accuracy using a comprehensive verification process. We first develop a comprehensive experimental environment, to simulate a real-time IoMT network, for experimenting various types of ransomware attacks. Following, we construct a comprehensive set of ransomware attacks and analyze their effects over an IoMT network devices. Furthermore, we develop an effective detection filter for detecting various ransomware attacks (e.g., static and dynamic attacks) and evaluate the degree of damages caused to the IoMT network devices. In addition, we develop a defense system to block the ransomware attacks and notify the backend control system. To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. The evaluation results show more than 95% of accuracy of detecting various ransomware attacks. MDPI 2022-11-04 /pmc/articles/PMC9657781/ /pubmed/36366214 http://dx.doi.org/10.3390/s22218516 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tariq, Usman Ullah, Imdad Yousuf Uddin, Mohammed Kwon, Se Jin An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title | An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title_full | An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title_fullStr | An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title_full_unstemmed | An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title_short | An Effective Self-Configurable Ransomware Prevention Technique for IoMT |
title_sort | effective self-configurable ransomware prevention technique for iomt |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657781/ https://www.ncbi.nlm.nih.gov/pubmed/36366214 http://dx.doi.org/10.3390/s22218516 |
work_keys_str_mv | AT tariqusman aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt AT ullahimdad aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt AT yousufuddinmohammed aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt AT kwonsejin aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt AT tariqusman effectiveselfconfigurableransomwarepreventiontechniqueforiomt AT ullahimdad effectiveselfconfigurableransomwarepreventiontechniqueforiomt AT yousufuddinmohammed effectiveselfconfigurableransomwarepreventiontechniqueforiomt AT kwonsejin effectiveselfconfigurableransomwarepreventiontechniqueforiomt |