Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Insider Attacks on Databases using Blockchains

Applications relying on centralized databases are often vulnerable to insider attacks. Any user with administrative privileges to the database system or the hosting server, is capable of modifying the database entries. Furthermore, such a user might modify the corresponding log entries, making it extremely difficult to detect such an attack. Attribution of the attack to privileged users would a...

متن کامل

Alibi: A novel approach for detecting insider-based jamming attacks in wireless networks

We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop wireless LAN environment, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel jammer model in which the jammers are modeled by the number of channels that they can jam simultaneously. We further propose the nove...

متن کامل

Preventing and Profiling Malicious Insider Attacks

This report examines previous research on malicious insiders with particular emphasis on the social and psychological factors that may have influenced the attacker and their behaviours. This research also draws on corresponding studies into fraud and espionage in non IT scenarios. A range of preventative measures is presented that approach the problem from personnel, policy and technical perspe...

متن کامل

Handling insider attacks in wireless sensor networks

Wireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes. These nodes perform measurements of some physical phenomena, process data, generate reports, and send these reports via multihop communication to a central information processing unit called sink. Depending on the scenar...

متن کامل

Towards Securing Medical Documents from Insider Attacks

Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Generation Computer Systems

سال: 2020

ISSN: 0167-739X

DOI: 10.1016/j.future.2018.06.007