School of Computer Science, University of Nottingham, Nottingham, United Kingdom.
Information School, University of Sheffield, Sheffield, United Kingdom.
J Med Internet Res. 2023 Apr 25;25:e41748. doi: 10.2196/41748.
BACKGROUND: Health information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records. OBJECTIVE: This study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence-based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently. METHODS: In this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology's ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods. RESULTS: Ethical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). CONCLUSIONS: This research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence-based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.
背景:健康信息系统(HISs)不断成为黑客的攻击目标,其目的是破坏关键的医疗基础设施。本研究源于近期针对医疗保健组织的攻击,这些攻击导致 HISs 中存储的敏感数据遭到泄露。现有关于医疗保健领域网络安全的研究在保护医疗设备和数据方面存在不平衡的问题。目前还没有一种系统的方法来调查攻击者可能如何突破 HIS 并访问医疗记录。
目的:本研究旨在为 HIS 网络安全保护提供新的见解。我们提出了一种针对 HIS 的系统的、新颖的、经过优化的(基于人工智能的)道德黑客方法,并将其与传统的未经优化的道德黑客方法进行了比较。这使研究人员和从业者能够更有效地识别 HIS 可能受到渗透攻击的切入点和攻击路径。
方法:在本研究中,我们提出了一种针对 HIS 进行道德黑客攻击的新方法。我们在实验环境中分别使用经过优化和未经优化的方法来实现道德黑客攻击。具体来说,我们通过实施开源电子病历(OpenEMR)系统来建立 HIS 模拟环境,并遵循国家标准与技术研究所的道德黑客攻击框架来发起攻击。在实验中,我们使用未经优化和优化的道德黑客方法分别进行了 50 轮攻击。
结果:经过优化和未经优化的方法均成功地进行了道德黑客攻击。结果表明,在平均使用时间、利用成功率、发起的利用数量和成功的利用数量方面,优化后的道德黑客方法优于未经优化的方法。我们能够识别与远程代码执行、跨站请求伪造、身份验证不当、Oracle Business Intelligence Publisher 中的漏洞、MediaTek 中的特权提升漏洞以及 Linux Virtual Server 的 Web 图形用户界面中的远程访问后门相关的成功攻击路径和利用。
结论:本研究展示了使用优化和未经优化的方法对 HIS 进行系统的道德黑客攻击,并使用了一组渗透测试工具来识别利用,并将它们结合起来进行道德黑客攻击。研究结果为 HIS 文献、道德黑客攻击方法以及主流的基于人工智能的道德黑客攻击方法做出了贡献,因为它们解决了这些研究领域的一些关键弱点。这些发现对于医疗保健行业也具有重要意义,因为 OpenEMR 被广泛应用于医疗保健组织。我们的研究结果为 HIS 提供了新的保护见解,并为研究人员在 HIS 网络安全领域进行进一步研究提供了基础。
J Med Internet Res. 2023-4-25
Int J Med Inform. 2021-4
Annu Int Conf IEEE Eng Med Biol Soc. 2019-7
Sensors (Basel). 2021-7-28
BMC Med Ethics. 2022-12-9
J Med Internet Res. 2022-3-22
Rev Med Liege. 2020-2
BMC Med Inform Decis Mak. 2025-7-1
J Med Internet Res. 2021-5-12
NPJ Digit Med. 2021-3-25
J Med Internet Res. 2021-4-20
J Med Internet Res. 2020-11-10
J Med Internet Res. 2020-9-17
J Med Internet Res. 2020-3-30
IEEE J Biomed Health Inform. 2020-10
Annu Int Conf IEEE Eng Med Biol Soc. 2019-7
NPJ Digit Med. 2019-10-2
JMIR Mhealth Uhealth. 2019-3-20