| Literature DB >> 35735496 |
Mariam Ibrahim1, Ruba Elhafiz1.
Abstract
Many communication standards have been proposed recently and more are being developed as a vision for dynamically composable and interoperable medical equipment. However, few have security systems that are sufficiently extensive or flexible to meet current and future safety requirements. This paper aims to analyze the cybersecurity of the Integrated Clinical Environment (ICE) through the investigation of its attack graph and the application of artificial intelligence techniques that can efficiently demonstrate the subsystems' vulnerabilities. Attack graphs are widely used for assessing network security. On the other hand, they are typically too huge and sophisticated for security administrators to comprehend and evaluate. Therefore, this paper presents a Q-learning-based attack graph analysis approach in which an attack graph that is generated for the Integrated Clinical Environment system resembles the environment, and the agent is assumed to be the attacker. Q-learning can aid in determining the best route that the attacker can take in order to damage the system as much as possible with the least number of actions. Numeric values will be assigned to the attack graph to better determine the most vulnerable part of the system and suggest this analysis to be further utilized for bigger graphs.Entities:
Keywords: Integrated Clinical Environment; artificial intelligence; attack graph; reinforcement learning
Year: 2022 PMID: 35735496 PMCID: PMC9220416 DOI: 10.3390/bioengineering9060253
Source DB: PubMed Journal: Bioengineering (Basel) ISSN: 2306-5354
Figure 1Integrated Clinical Environment (ICE).
Figure 2Integrated Clinical Environment’s attack graph.
Attacks’ CVSS Scores.
| Attack Name | Base Score | Temporal Score | Environmental Score | Overall Score |
|---|---|---|---|---|
| SP_APC | 4.4 | 4.2 | 3.6 | 3.6 |
| IG_APS | 3.5 | 3.1 | 3.1 | 3.1 |
| SP_APS | 4.4 | 4.2 | 3.6 | 3.6 |
| IG_CS | 3.5 | 3 | 4 | 4 |
| TH_CS | 8 | 7.5 | 7.6 | 7.6 |
| TH_APS | 7.6 | 7.1 | 7.2 | 7.2 |
| BOF_SNC | 8 | 8.1 | 8.1 | 8.1 |
| DoS_SNC | 8 | 8 | 8.1 | 8.1 |
| DoS_NCMD | 7.5 | 7.5 | 10 | 10 |
Figure 3Refinement graph with nodes from 1–7 representing systems’ states as given in attack graph.
Reward matrix.
| R | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
|---|---|---|---|---|---|---|---|
| 1 | −1 | 3.6 | 3.1 | 3.6 | −1 | −1 | −1 |
| 2 | 0 | −1 | 4 | −1 | −1 | −1 | −1 |
| 3 | 0 | 0 | −1 | 7.6 | −1 | −1 | −1 |
| 3 | 0 | 0 | −1 | 7.2 | −1 | −1 | −1 |
| 4 | 0 | −1 | 0 | −1 | 8.1 | 8.1 | −1 |
| 5 | −1 | −1 | −1 | 0 | −1 | −1 | 10 |
| 6 | −1 | −1 | −1 | 0 | −1 | −1 | 10 |
| 7 | −1 | −1 | −1 | −1 | 0 | 0 | −1 |
Figure 4Results of Q-learning agent.