Towards Autonomic Security Management of Healthcare Information Systems

被引:9
|
作者
Chen, Qian [1 ]
Lambright, Jonathan [1 ]
Abdelwahed, Sherif [2 ]
机构
[1] Savannah State Univ, Dept Engn Technol, Savannah, GA 31404 USA
[2] Mississippi State Univ, Dept Elect & Comp Engn, Mississippi State, MS 39762 USA
关键词
D O I
10.1109/CHASE.2016.58
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
With the fast development of information and communication technologies over the past decade, Healthcare Information Technology (HIT) has been widely implemented for health stakeholders to access, modify, share Electronic Health Records (EHR) with a low cost of the facility, data and application maintenance. Due to the high value of healthcare data and lack of investment in cyber security, vulnerabilities of Healthcare Information Systems (HISs), especially data of EHR systems are exposed to attackers [1], [2]. This paper first introduces the network structure of the HIS and the communication standards for health data transmission among patients, hospitals, pharmacies, and insurance companies. After that, we introduce the Health Level 7 (HL7) standard in details and discuss the current security challenges of HISs. We also illustrate how to simulate attacks that exploit HL7 message vulnerabilities. An Autonomic Security Management (ASM) approach is designed for proactively self-protecting a HIS from internal and external attacks. The performance of a HIS can be monitored in real time, and potential attacks that may disrupt HIS services are predicted by the intrusion estimation module. The functionality and feasibility of intrusion detection systems for detecting known and unknown cyber attacks threatening the confidentiality and integrity of EHRs are presented. The intrusion response system of the ASM approach selects the most appropriate protection mechanisms to recover the compromised HIS back to normal with little or no human intervention.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [31] Development of information security baselines for healthcare information systems in New Zealand
    Janczewski, L
    Shi, FXL
    [J]. COMPUTERS & SECURITY, 2002, 21 (02) : 172 - 192
  • [32] Information systems security and the information systems development project Towards a framework for their integration
    Tryfonas, T
    Kiountouzis, E
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 347 - 356
  • [33] Comparison of Information Security Systems for Asymptotic Information Security Management Critical Information Infrastructures
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 89 - 95
  • [34] Information Security Culture: Towards an Instrument for Assessing Security Management Practices
    Lim, Loo S.
    Maynard, Sean B.
    Ahmad, Atif
    Chang, Shanton
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (02) : 31 - 52
  • [35] Towards a security policy for ubiquitous healthcare systems (Position paper)
    Kim, Joonwoong
    Beresford, Alastair R.
    Stajano, Frank
    [J]. UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 263 - +
  • [36] Towards a security benchmark for database management systems
    Vieira, M
    Madeira, H
    [J]. 2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 592 - 601
  • [37] Assessing staff attitudes towards information security in a European healthcare establishment
    Furnell, SM
    Gaunt, PN
    Holben, RF
    Sanders, PW
    Stockel, CT
    Warren, MJ
    [J]. MEDICAL INFORMATICS, 1996, 21 (02): : 105 - 112
  • [38] Towards Dynamic Access Control for Healthcare Information Systems
    Rostad, Lillian
    Nytro, Oystein
    [J]. EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 703 - 708
  • [39] Towards a continuous evolution and adaptation of information systems in healthcare
    Lenz, R
    Kuhn, KA
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2004, 73 (01) : 75 - 89
  • [40] Towards a Systemic Approach for Information Security Risk Management
    Naudet, Yannick
    Mayer, Nicolas
    Feltus, Christophe
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 177 - 186