An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data

被引:1
|
作者
Ray, Soumya [1 ]
Mishra, Kamta Nath [1 ]
Dutta, Sandip [1 ]
机构
[1] BIT Mesra, Dept Comp Sci & Engn, Ranchi 835215, Jharkhand, India
关键词
Mobile-healthcare; Sensitive data; Distributed denial of service attack recognition; Distributed denial of service attack deterrence; INTRUSION DETECTION; INTERNET; NETWORK; SECURITY; PRIVACY; MODEL; SDN;
D O I
10.1007/s11277-022-10018-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays Mobile Health (also termed as m-Health) is an essential component of the healthcare sector. The m-healthcare uses different types of digitized devices (laptops, smart phones, tablets) to transfer patient runtime data very quickly among the different internetworking channels. The architecture of the m-health system is completely dependent on the centralized cloud computing system. Cloud computing architecture suffers from various attacks, which leads to the unavailability of data at runtime. The paper concentrates on the most vulnerable DDoS attack, which disrupts the network by unauthorized requests and breaks the reliability of the system. In the research paper, the authors have designed the four-layers m-healthcare architecture. An innovative DDoS recognition approach is proposed to easily identify the attacks in the system. The deterrence approaches are also analysed and experimented with the help of virtualized cloud-based software environment. The result section is progressed with the use of performance metrics, and analysis of maximum and mean value of DDoS attack success rate is also part of the research work.
引用
收藏
页码:1763 / 1797
页数:35
相关论文
共 32 条
  • [1] An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data
    Soumya Ray
    Kamta Nath Mishra
    Sandip Dutta
    [J]. Wireless Personal Communications, 2023, 128 : 1763 - 1797
  • [2] A proactive approach to DDoS attack recognition and preclusion in securing m-health systems
    Ray, Soumya
    Mishra, Kamta Nath
    Dutta, Sandip
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [3] An innovative and integrative m-Health solution for treatment resistant schizophrenia patients
    Corripio, Iluminada
    Grasa, Eva
    Alonso-Solis, Anna
    Berdun, Jesus
    Huerta, Elena
    Ochoa, Susana
    Usall, Judith
    Unoka, Zsolt
    Fazekas, Kata
    Rubinstein, Katya
    Kaye, Rachelle
    Jaaskelainen, Erika
    Seppala, Jussi
    Van den Bosch, Wouter
    Van der Graaf, Shenja
    Martinez, Jordi
    Hospedales, Margarita
    [J]. INTERNATIONAL JOURNAL OF INTEGRATED CARE, 2016, 16
  • [4] Data exchanges based on blockchain in m-Health applications
    Clim, Antonio
    Zota, Razvan Daniel
    Constantinescu, Radu
    [J]. 10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 281 - 288
  • [5] Smart Data Synchronization in m-Health Monitoring Applications
    Benharref, Abdelghani
    Serhani, Mohamed Adel
    Mizouni, Rabeb
    [J]. 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 140 - 145
  • [6] A review of frameworks on continuous data acquisition for e-Health and m-Health
    Oniani, Salome
    Pires, Ivan Miguel
    Garcia, Nuno M.
    Mosashvili, Ia
    Pombo, Nuno
    [J]. PROCEEDINGS OF THE 5TH EAI INTERNATIONAL CONFERENCE ON SMART OBJECTS AND TECHNOLOGIES FOR SOCIAL GOOD (GOODTECHS 2019), 2019, : 231 - 234
  • [7] Design and Development of an Innovative Biomedical Engineering Application Toolkit (BEAT®) for m-Health Applications
    Abhinav
    Gupta, Avval
    Saseendran, Shona
    Bailur, Abhijith
    Juneja, Rajnish
    Bhargava, Balram
    [J]. ADVANCES IN SIGNAL PROCESSING AND INTELLIGENT RECOGNITION SYSTEMS (SIRS-2015), 2016, 425 : 299 - 308
  • [8] Energy-Cost-Distortion Optimization for Delay-Sensitive M-Health Applications
    Awad, Alaa
    Mohamed, Amr
    Elfouly, Tarek
    [J]. 2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,
  • [9] Enabling Data Protection through PKI encryption in IoT m-Health Devices
    Doukas, Charalampos
    Maglogiannis, Ilias
    Koufi, Vassiliki
    Malamateniou, Flora
    Vassilacopoulos, George
    [J]. IEEE 12TH INTERNATIONAL CONFERENCE ON BIOINFORMATICS & BIOENGINEERING, 2012, : 25 - 29
  • [10] Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction
    Enamamu, Timibloudi
    Otebolaku, Abayomi
    Marchang, Jims
    Dany, Joy
    [J]. SENSORS, 2020, 20 (19) : 1 - 22