Levy-Loboda Tamar, Sheetrit Eitam, Liberty Idit F, Haim Alon, Nissim Nir
Malware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, Israel; Department of Industrial Engineering and Management, Ben-Gurion University of the Negev, Beer-Sheva, Israel.
Malware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, Israel.
J Biomed Inform. 2022 Aug;132:104129. doi: 10.1016/j.jbi.2022.104129. Epub 2022 Jun 30.
Many patients with diabetes are currently being treated with insulin pumps and other diabetes devices which improve their quality of life and enable effective treatment of diabetes. These devices are connected wirelessly and thus, are vulnerable to cyber-attacks which have already been proven feasible. In this paper, we focus on two types of cyber-attacks on insulin pump systems: an overdose of insulin, which can cause hypoglycemia, and an underdose of insulin, which can cause hyperglycemia. Both of these attacks can result in a variety of complications and endanger a patient's life. Specifically, we propose a sophisticated and personalized insulin dose manipulation attack; this attack is based on a novel method of predicting the blood glucose (BG) level in response to insulin dose administration. To protect patients from the proposed sophisticated and malicious insulin dose manipulation attacks, we also present an automated machine learning based system for attack detection; the detection system is based on an advanced temporal pattern mining process, which is performed on the logs of real insulin pumps and continuous glucose monitors (CGMs). Our multivariate time-series data (MTSD) collection consists of 225,780 clinical logs, collected from real insulin pumps and CGMs of 47 patients with type I diabetes (13 adults and 34 children) from two different clinics at Soroka University Medical Center in Beer-Sheva, Israel over a four-year period. We enriched our data collection with additional relevant medical information related to the subjects. In the extensive experiments performed, we evaluated the proposed attack and detection system and examined whether: (1) it is possible to accurately predict BG levels in order to create malicious data that simulate a manipulation attack and the patient's body in response to it; (2) it is possible to automatically detect such attacks based on advanced machine learning (ML) methods that leverage temporal patterns; (3) the detection capabilities of the proposed detection system differ for insulin overdose and underdose attacks; and (4) the granularity of the learning model (general / adult vs. pediatric clinic / individual patient) affects the detection capabilities. Our results show that (a) it is possible to predict, with nearly 90% accuracy, BG levels using our proposed methods, and by doing so, enable malicious data creation for our detection system evaluation; (b) it is possible to accurately detect insulin manipulation attacks using temporal patterns mining using several ML methods, including Logistic Regression, Random Forest, TPF class model, TPF top k, and ANN algorithms; (c) it is easier to detect an overdose attack than an underdose attack in more than 25%, in terms of AUC scores; and (d) the adult vs. pediatric model outperformed models of other granularities in the detection of overdose attacks, while the general model outperformed the other models in the case of detecting underdose attacks; for both attacks, attack detection among children was found to be more challenging than among adults. In addition to its use in the evaluation of our detection system, the proposed BG prediction method has great importance in the medical domain where it can contribute to improved care of patients with diabetes.
目前,许多糖尿病患者正在使用胰岛素泵和其他糖尿病治疗设备,这些设备改善了他们的生活质量,使糖尿病得到有效治疗。这些设备通过无线连接,因此容易受到网络攻击,而这已被证明是可行的。在本文中,我们重点关注胰岛素泵系统的两种网络攻击:胰岛素过量,可导致低血糖;胰岛素不足,可导致高血糖。这两种攻击都可能导致各种并发症,危及患者生命。具体而言,我们提出了一种复杂的个性化胰岛素剂量操纵攻击;这种攻击基于一种预测胰岛素剂量给药后血糖(BG)水平的新方法。为了保护患者免受所提出的复杂恶意胰岛素剂量操纵攻击,我们还提出了一种基于自动化机器学习的攻击检测系统;该检测系统基于先进的时间模式挖掘过程,该过程在真实胰岛素泵和连续血糖监测仪(CGM)的日志上执行。我们的多变量时间序列数据(MTSD)收集包括225,780条临床日志,这些日志是从以色列贝尔谢巴索罗卡大学医学中心两个不同诊所的47名I型糖尿病患者(13名成人和34名儿童)的真实胰岛素泵和CGM中收集的,为期四年。我们用与受试者相关的其他相关医学信息丰富了我们的数据收集。在进行的广泛实验中,我们评估了所提出的攻击和检测系统,并检查了:(1)是否有可能准确预测BG水平,以创建模拟操纵攻击和患者身体对其反应的恶意数据;(2)是否有可能基于利用时间模式的先进机器学习(ML)方法自动检测此类攻击;(3)所提出的检测系统对胰岛素过量和不足攻击的检测能力是否不同;(4)学习模型的粒度(一般/成人与儿科诊所/个体患者)是否影响检测能力。我们的结果表明:(a)使用我们提出的方法可以以近90%的准确率预测BG水平,并以此为我们的检测系统评估创建恶意数据;(b)使用包括逻辑回归、随机森林、TPF类模型、TPF top k和人工神经网络算法在内的几种ML方法,通过时间模式挖掘可以准确检测胰岛素操纵攻击;(c)就AUC分数而言,检测过量攻击比检测不足攻击容易超过25%;(d)成人与儿科模型在检测过量攻击方面优于其他粒度的模型,而一般模型在检测不足攻击方面优于其他模型;对于这两种攻击,发现儿童中的攻击检测比成人更具挑战性。除了用于评估我们的检测系统外,所提出的BG预测方法在医学领域也具有重要意义,它可以有助于改善糖尿病患者的护理。