Cargando…

An Effective Self-Configurable Ransomware Prevention Technique for IoMT

Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services....

Descripción completa

Detalles Bibliográficos
Autores principales: Tariq, Usman, Ullah, Imdad, Yousuf Uddin, Mohammed, Kwon, Se Jin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657781/
https://www.ncbi.nlm.nih.gov/pubmed/36366214
http://dx.doi.org/10.3390/s22218516
_version_ 1784829782851059712
author Tariq, Usman
Ullah, Imdad
Yousuf Uddin, Mohammed
Kwon, Se Jin
author_facet Tariq, Usman
Ullah, Imdad
Yousuf Uddin, Mohammed
Kwon, Se Jin
author_sort Tariq, Usman
collection PubMed
description Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services. Researchers and developers are, to date, considering the majority of the technological aspects and critical issues around the IoMT, e.g., security vulnerabilities and other cybercrimes. One of such major challenges IoMT has to face is widespread ransomware attacks; a malicious malware that encrypts the patients’ critical data, restricts access to IoMT devices or entirely disable IoMT devices, or uses several combinations to compromise the overall system functionality, mainly for ransom. These ransomware attacks would have several devastating consequences, such as loss of life-threatening data and system functionality, ceasing emergency and life-saving services, wastage of several vital resources etc. This paper presents a ransomware analysis and identification architecture with the objective to detect and validate the ransomware attacks and to evaluate its accuracy using a comprehensive verification process. We first develop a comprehensive experimental environment, to simulate a real-time IoMT network, for experimenting various types of ransomware attacks. Following, we construct a comprehensive set of ransomware attacks and analyze their effects over an IoMT network devices. Furthermore, we develop an effective detection filter for detecting various ransomware attacks (e.g., static and dynamic attacks) and evaluate the degree of damages caused to the IoMT network devices. In addition, we develop a defense system to block the ransomware attacks and notify the backend control system. To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. The evaluation results show more than 95% of accuracy of detecting various ransomware attacks.
format Online
Article
Text
id pubmed-9657781
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96577812022-11-15 An Effective Self-Configurable Ransomware Prevention Technique for IoMT Tariq, Usman Ullah, Imdad Yousuf Uddin, Mohammed Kwon, Se Jin Sensors (Basel) Article Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated rural communities for various healthcare services. Researchers and developers are, to date, considering the majority of the technological aspects and critical issues around the IoMT, e.g., security vulnerabilities and other cybercrimes. One of such major challenges IoMT has to face is widespread ransomware attacks; a malicious malware that encrypts the patients’ critical data, restricts access to IoMT devices or entirely disable IoMT devices, or uses several combinations to compromise the overall system functionality, mainly for ransom. These ransomware attacks would have several devastating consequences, such as loss of life-threatening data and system functionality, ceasing emergency and life-saving services, wastage of several vital resources etc. This paper presents a ransomware analysis and identification architecture with the objective to detect and validate the ransomware attacks and to evaluate its accuracy using a comprehensive verification process. We first develop a comprehensive experimental environment, to simulate a real-time IoMT network, for experimenting various types of ransomware attacks. Following, we construct a comprehensive set of ransomware attacks and analyze their effects over an IoMT network devices. Furthermore, we develop an effective detection filter for detecting various ransomware attacks (e.g., static and dynamic attacks) and evaluate the degree of damages caused to the IoMT network devices. In addition, we develop a defense system to block the ransomware attacks and notify the backend control system. To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. The evaluation results show more than 95% of accuracy of detecting various ransomware attacks. MDPI 2022-11-04 /pmc/articles/PMC9657781/ /pubmed/36366214 http://dx.doi.org/10.3390/s22218516 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tariq, Usman
Ullah, Imdad
Yousuf Uddin, Mohammed
Kwon, Se Jin
An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title_full An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title_fullStr An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title_full_unstemmed An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title_short An Effective Self-Configurable Ransomware Prevention Technique for IoMT
title_sort effective self-configurable ransomware prevention technique for iomt
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9657781/
https://www.ncbi.nlm.nih.gov/pubmed/36366214
http://dx.doi.org/10.3390/s22218516
work_keys_str_mv AT tariqusman aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT ullahimdad aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT yousufuddinmohammed aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT kwonsejin aneffectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT tariqusman effectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT ullahimdad effectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT yousufuddinmohammed effectiveselfconfigurableransomwarepreventiontechniqueforiomt
AT kwonsejin effectiveselfconfigurableransomwarepreventiontechniqueforiomt