Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS)

Aims: The Intelligence Medical Diagnosis System (IMDS) has been targeted by the cyber terrorists, who aim to destroy the Critical National Infrastructure (CNI). This paper is motivated by the most recent incidents happened worldwide and have resulted in the compromise of diagnosis results. This study was undertaken to show how the IMDS could be attacked and diagnosis results compromised and present a set of cyber defense strategies to prevent against such attacks.Methods and Results: This study used the ECGs data from the PhysioNet/Computing in Cardiology (CinC) Challenge 2017. We fed the data into our IMDS and launched a series of ethical hacking, which is specifically tailored to target IMDS. We proposed a set of cyber security strategies to prevent such compromise. We tested the effectiveness of our cyber defense strategies using an experiment. The results showed that the strategies were effective in protecting the IMDS diagnosis results from being compromised.Conclusions: This study provides novel insights into the protection of IMDS and concludes that our cyber defense strategies can protect IMDS from being compromised by Brute Force and SQL Injection attacks.

[1]  Karen A. Scarfone,et al.  Technical Guide to Information Security Testing and Assessment , 2008 .

[2]  Laura Moy,et al.  Killed by Code: Software Transparency in Implantable Medical Devices , 2010 .

[3]  Axel Wirth Cybercrimes pose growing threat to medical devices. , 2011, Biomedical instrumentation & technology.

[4]  Kevin Fu,et al.  Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance , 2012, PloS one.

[5]  Meng Zhang,et al.  Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.

[6]  Shelby David Kobes Security implications of implantable medical devices , 2014 .

[7]  S. Kumari,et al.  Comparison of AES and DES Algorithm , 2015 .

[8]  Roman L. Lysecky,et al.  Security challenges for medical devices , 2015, Commun. ACM.

[9]  Mehmet A. Orgun,et al.  Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.

[10]  Hsinchun Chen,et al.  Assessing medical device vulnerabilities on the Internet of Things , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[11]  Zainab S. Alwan,et al.  Detection and Prevention of SQL Injection Attack: A Survey , 2017 .

[12]  Oliver Kullmann,et al.  The science of brute force , 2017, Commun. ACM.

[13]  Jay G Ronquillo,et al.  Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information , 2018, JAMIA open.

[14]  Masoumeh Haghpanahi,et al.  Cardiologist-level arrhythmia detection and classification in ambulatory electrocardiograms using a deep neural network , 2019, Nature Medicine.