Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
by
Zamani, Efpraxia
, Luo, Cunjin
, He, Ying
, Yevseyeva, Iryna
in
Access
/ Artificial
/ Artificial Intelligence
/ Averages
/ Care records
/ Codes
/ Competitive intelligence
/ Computer Security
/ Cybersecurity
/ Electronic Health Records
/ Ethics
/ Forgery
/ Hacking
/ Health care industry
/ Health information
/ Health Information Systems
/ Health services
/ Health status
/ Human-computer interaction
/ Humans
/ Information sources
/ Information systems
/ Information technology
/ Infrastructure
/ Literature
/ Medical equipment
/ Medical ethics
/ Medical records
/ Medical supplies
/ Methodological approaches
/ Original Paper
/ Penetration
/ Privacy
/ Protection
/ Research ethics
/ Simulation
/ Software
/ Vulnerability
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
by
Zamani, Efpraxia
, Luo, Cunjin
, He, Ying
, Yevseyeva, Iryna
in
Access
/ Artificial
/ Artificial Intelligence
/ Averages
/ Care records
/ Codes
/ Competitive intelligence
/ Computer Security
/ Cybersecurity
/ Electronic Health Records
/ Ethics
/ Forgery
/ Hacking
/ Health care industry
/ Health information
/ Health Information Systems
/ Health services
/ Health status
/ Human-computer interaction
/ Humans
/ Information sources
/ Information systems
/ Information technology
/ Infrastructure
/ Literature
/ Medical equipment
/ Medical ethics
/ Medical records
/ Medical supplies
/ Methodological approaches
/ Original Paper
/ Penetration
/ Privacy
/ Protection
/ Research ethics
/ Simulation
/ Software
/ Vulnerability
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
by
Zamani, Efpraxia
, Luo, Cunjin
, He, Ying
, Yevseyeva, Iryna
in
Access
/ Artificial
/ Artificial Intelligence
/ Averages
/ Care records
/ Codes
/ Competitive intelligence
/ Computer Security
/ Cybersecurity
/ Electronic Health Records
/ Ethics
/ Forgery
/ Hacking
/ Health care industry
/ Health information
/ Health Information Systems
/ Health services
/ Health status
/ Human-computer interaction
/ Humans
/ Information sources
/ Information systems
/ Information technology
/ Infrastructure
/ Literature
/ Medical equipment
/ Medical ethics
/ Medical records
/ Medical supplies
/ Methodological approaches
/ Original Paper
/ Penetration
/ Privacy
/ Protection
/ Research ethics
/ Simulation
/ Software
/ Vulnerability
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
Journal Article
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Health information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records.
This study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence-based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently.
In this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology's ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods.
Ethical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server).
This research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence-based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.
This website uses cookies to ensure you get the best experience on our website.