Cargando…

Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study

Cyber security encompasses a variety of financial, political, and social aspects with significant implications for the safety of individuals and organisations. Hospitals are among the least secure and most vulnerable organisations in terms of cybersecurity. Protecting medical records from cyberattac...

Descripción completa

Detalles Bibliográficos
Autores principales: Ünözkan, Hüseyin, Ertem, Mehmet, Bendak, Salaheddine
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Vienna 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9668211/
https://www.ncbi.nlm.nih.gov/pubmed/36408329
http://dx.doi.org/10.1007/s13721-022-00391-1
_version_ 1784831867320532992
author Ünözkan, Hüseyin
Ertem, Mehmet
Bendak, Salaheddine
author_facet Ünözkan, Hüseyin
Ertem, Mehmet
Bendak, Salaheddine
author_sort Ünözkan, Hüseyin
collection PubMed
description Cyber security encompasses a variety of financial, political, and social aspects with significant implications for the safety of individuals and organisations. Hospitals are among the least secure and most vulnerable organisations in terms of cybersecurity. Protecting medical records from cyberattacks is critical for protecting personal and financial records of those involved in medical institutions. Attack graphs, like in other systems, can be used to protect medical and hospital records from cyberattacks. In the current study, a total of 352 real-life cyberattacks on healthcare institutions using common vulnerability scoring system (CVSS) data were statistically examined to determine important trends and specifications in regard to those attacks. Following that, several machine learning techniques and an artificial neural network model were used to model industrial control systems (ICS) vulnerability data of those attacks. The average vulnerability score for attacks on healthcare IT systems was found to be very high. Moreover, this score was found to be higher in healthcare institutions which have experienced cyberattacks in the past and no mitigation actions were implemented. Using Python programming software, the most successful model that can be used in modelling cyberattacks on IT systems of healthcare institutions was found to be the K-nearest neighbours (KNN) algorithm. The model was then enhanced further and then it was tried to make predictions for future cyberattacks on IT systems of healthcare institutions. Results indicate that the overall score is critical indicating that medical records are, in general, at high risk and that there is a high risk of cyberattacks on medical records in healthcare institutions. It is recommended, therefore, that those institutions should take urgent precautionary measures to mitigate such a high risk of cyberattacks and to make them more secure, reliable, and robust.
format Online
Article
Text
id pubmed-9668211
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer Vienna
record_format MEDLINE/PubMed
spelling pubmed-96682112022-11-16 Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study Ünözkan, Hüseyin Ertem, Mehmet Bendak, Salaheddine Netw Model Anal Health Inform Bioinform Original Article Cyber security encompasses a variety of financial, political, and social aspects with significant implications for the safety of individuals and organisations. Hospitals are among the least secure and most vulnerable organisations in terms of cybersecurity. Protecting medical records from cyberattacks is critical for protecting personal and financial records of those involved in medical institutions. Attack graphs, like in other systems, can be used to protect medical and hospital records from cyberattacks. In the current study, a total of 352 real-life cyberattacks on healthcare institutions using common vulnerability scoring system (CVSS) data were statistically examined to determine important trends and specifications in regard to those attacks. Following that, several machine learning techniques and an artificial neural network model were used to model industrial control systems (ICS) vulnerability data of those attacks. The average vulnerability score for attacks on healthcare IT systems was found to be very high. Moreover, this score was found to be higher in healthcare institutions which have experienced cyberattacks in the past and no mitigation actions were implemented. Using Python programming software, the most successful model that can be used in modelling cyberattacks on IT systems of healthcare institutions was found to be the K-nearest neighbours (KNN) algorithm. The model was then enhanced further and then it was tried to make predictions for future cyberattacks on IT systems of healthcare institutions. Results indicate that the overall score is critical indicating that medical records are, in general, at high risk and that there is a high risk of cyberattacks on medical records in healthcare institutions. It is recommended, therefore, that those institutions should take urgent precautionary measures to mitigate such a high risk of cyberattacks and to make them more secure, reliable, and robust. Springer Vienna 2022-11-16 2022 /pmc/articles/PMC9668211/ /pubmed/36408329 http://dx.doi.org/10.1007/s13721-022-00391-1 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Austria, part of Springer Nature 2022, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Original Article
Ünözkan, Hüseyin
Ertem, Mehmet
Bendak, Salaheddine
Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title_full Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title_fullStr Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title_full_unstemmed Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title_short Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
title_sort using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9668211/
https://www.ncbi.nlm.nih.gov/pubmed/36408329
http://dx.doi.org/10.1007/s13721-022-00391-1
work_keys_str_mv AT unozkanhuseyin usingattackgraphstodefendhealthcaresystemsfromcyberattacksalongitudinalempiricalstudy
AT ertemmehmet usingattackgraphstodefendhealthcaresystemsfromcyberattacksalongitudinalempiricalstudy
AT bendaksalaheddine usingattackgraphstodefendhealthcaresystemsfromcyberattacksalongitudinalempiricalstudy