Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices

نویسندگان

  • Patrick Luckett
  • Jeffrey Todd McDonald
  • William Bradley Glisson
چکیده

The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient’s vital signs. This integration creates environments that are conducive to malicious activities. The potential impact presents new challenges for the medical community. Hence, this research presents attack graph modeling as a viable solution to identifying vulnerabilities, assessing risk, and forming mitigation strategies to defend ambulatory medical devices from attackers. Common and frequent vulnerabilities and attack strategies related to the various aspects of ambulatory devices, including Bluetooth enabled sensors and Android applications are identified in the literature. Based on this analysis, this research presents an attack graph modeling example on a theoretical device that highlights vulnerabilities and mitigation strategies to consider when designing ambulatory devices with similar components.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comprehensive Threat Assessment Framework for Securing Emerging Technologies

Wireless devices are becoming an integral part of the human environment and their seamless integration has created a range of new wireless sensor network architectures. Unfortunately the security of such networks often lags behind other advances and more often than not is developed only after the core systems and protocols have been standardized. This results in these security schemes having ca...

متن کامل

An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling

The advancement of modern day computing has led to an increase of threats and intrusions. As a result, advanced security measures and threat analysis models are necessary to detect these threats and identify protective measures needed to secure a system. The most popular forms of attack modeling today are attack graphs and attack trees. This literature summarizes the different approaches throug...

متن کامل

Automating Threat Modeling through the Software Development Life-Cycle

Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important steps of this process, a...

متن کامل

Network Threat Modeling

Threat Modeling Threat modeling is an important risk assessment and mitigation practice that provides the capability to secure a network environment. Threat modeling includes understanding and communicating the threats to the network computing environment. It is critical to be aware of the types of threats and how to reduce or mitigate the risk both in systems and applications on network aware ...

متن کامل

Technosocial Modeling of IED Threat Scenarios and Attack

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1709.05026  شماره 

صفحات  -

تاریخ انتشار 2017