文献检索文档翻译深度研究
Suppr Zotero 插件Zotero 插件
邀请有礼套餐&价格历史记录

新学期,新优惠

限时优惠:9月1日-9月22日

30天高级会员仅需29元

1天体验卡首发特惠仅需5.99元

了解详情
不再提醒
插件&应用
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
高级版
套餐订阅购买积分包
AI 工具
文献检索文档翻译深度研究
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2025

基于人工智能的健康信息系统伦理黑客攻击:模拟研究。

Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.

机构信息

School of Computer Science, University of Nottingham, Nottingham, United Kingdom.

Information School, University of Sheffield, Sheffield, United Kingdom.

出版信息

J Med Internet Res. 2023 Apr 25;25:e41748. doi: 10.2196/41748.


DOI:10.2196/41748
PMID:37097723
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10170356/
Abstract

BACKGROUND: Health information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records. OBJECTIVE: This study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence-based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently. METHODS: In this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology's ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods. RESULTS: Ethical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). CONCLUSIONS: This research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence-based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.

摘要

背景:健康信息系统(HISs)不断成为黑客的攻击目标,其目的是破坏关键的医疗基础设施。本研究源于近期针对医疗保健组织的攻击,这些攻击导致 HISs 中存储的敏感数据遭到泄露。现有关于医疗保健领域网络安全的研究在保护医疗设备和数据方面存在不平衡的问题。目前还没有一种系统的方法来调查攻击者可能如何突破 HIS 并访问医疗记录。

目的:本研究旨在为 HIS 网络安全保护提供新的见解。我们提出了一种针对 HIS 的系统的、新颖的、经过优化的(基于人工智能的)道德黑客方法,并将其与传统的未经优化的道德黑客方法进行了比较。这使研究人员和从业者能够更有效地识别 HIS 可能受到渗透攻击的切入点和攻击路径。

方法:在本研究中,我们提出了一种针对 HIS 进行道德黑客攻击的新方法。我们在实验环境中分别使用经过优化和未经优化的方法来实现道德黑客攻击。具体来说,我们通过实施开源电子病历(OpenEMR)系统来建立 HIS 模拟环境,并遵循国家标准与技术研究所的道德黑客攻击框架来发起攻击。在实验中,我们使用未经优化和优化的道德黑客方法分别进行了 50 轮攻击。

结果:经过优化和未经优化的方法均成功地进行了道德黑客攻击。结果表明,在平均使用时间、利用成功率、发起的利用数量和成功的利用数量方面,优化后的道德黑客方法优于未经优化的方法。我们能够识别与远程代码执行、跨站请求伪造、身份验证不当、Oracle Business Intelligence Publisher 中的漏洞、MediaTek 中的特权提升漏洞以及 Linux Virtual Server 的 Web 图形用户界面中的远程访问后门相关的成功攻击路径和利用。

结论:本研究展示了使用优化和未经优化的方法对 HIS 进行系统的道德黑客攻击,并使用了一组渗透测试工具来识别利用,并将它们结合起来进行道德黑客攻击。研究结果为 HIS 文献、道德黑客攻击方法以及主流的基于人工智能的道德黑客攻击方法做出了贡献,因为它们解决了这些研究领域的一些关键弱点。这些发现对于医疗保健行业也具有重要意义,因为 OpenEMR 被广泛应用于医疗保健组织。我们的研究结果为 HIS 提供了新的保护见解,并为研究人员在 HIS 网络安全领域进行进一步研究提供了基础。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/7ec2cb43f619/jmir_v25i1e41748_fig3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/aaa358f72797/jmir_v25i1e41748_fig1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/8794e170e7da/jmir_v25i1e41748_fig2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/7ec2cb43f619/jmir_v25i1e41748_fig3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/aaa358f72797/jmir_v25i1e41748_fig1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/8794e170e7da/jmir_v25i1e41748_fig2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b120/10170356/7ec2cb43f619/jmir_v25i1e41748_fig3.jpg

相似文献

[1]
Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.

J Med Internet Res. 2023-4-25

[2]
Attacking and defence pathways for Intelligent Medical Diagnosis System (IMDS).

Int J Med Inform. 2021-4

[3]
Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS).

Annu Int Conf IEEE Eng Med Biol Soc. 2019-7

[4]
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.

Sensors (Basel). 2021-7-28

[5]
It takes a pirate to know one: ethical hackers for healthcare cybersecurity.

BMC Med Ethics. 2022-12-9

[6]
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study.

J Med Internet Res. 2022-3-22

[7]
We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

PLoS One. 2024

[8]
Macromolecular crowding: chemistry and physics meet biology (Ascona, Switzerland, 10-14 June 2012).

Phys Biol. 2013-8

[9]
Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.

J Law Med Ethics. 2019-12

[10]
[Cybersecurity in the health care sector].

Rev Med Liege. 2020-2

引用本文的文献

[1]
Artificial intelligence in dentistry: insights and expectations from Swiss dental professionals.

BMC Med Inform Decis Mak. 2025-7-1

[2]
Advancing Clinical Information Systems: Harnessing Telemedicine, Data Science, and AI for Enhanced and More Precise Healthcare Delivery.

Yearb Med Inform. 2024-8

[3]
Longitudinal cytokine and multi-modal health data of an extremely severe ME/CFS patient with HSD reveals insights into immunopathology, and disease severity.

Front Immunol. 2024-4-8

本文引用的文献

[1]
Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study.

J Med Internet Res. 2021-5-12

[2]
Ushering in safe, effective, secure, and ethical medicine in the digital era.

NPJ Digit Med. 2021-3-25

[3]
Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.

J Med Internet Res. 2021-4-20

[4]
The Internet of Things: Impact and Implications for Health Care Delivery.

J Med Internet Res. 2020-11-10

[5]
Cybersecurity Risks in a Pandemic.

J Med Internet Res. 2020-9-17

[6]
Connected Medical Technology and Cybersecurity Informed Consent: A New Paradigm.

J Med Internet Res. 2020-3-30

[7]
Collaborative Ehealth Privacy and Security: An Access Control With Attribute Revocation Based on OBDD Access Structure.

IEEE J Biomed Health Inform. 2020-10

[8]
Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS).

Annu Int Conf IEEE Eng Med Biol Soc. 2019-7

[9]
A retrospective impact analysis of the WannaCry cyberattack on the NHS.

NPJ Digit Med. 2019-10-2

[10]
Mobile Health Systems for Community-Based Primary Care: Identifying Controls and Mitigating Privacy Threats.

JMIR Mhealth Uhealth. 2019-3-20

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

推荐工具

医学文档翻译智能文献检索