International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Intrusion detection technique for medical cyber physical systems using behavior rule: a review

Author Affiliations

  • 1Department of Computer Sci. & Engg., P.E.S College of Engineering, Aurangabad, India
  • 2Department of Computer Sci. & Engg., P.E.S College of Engineering, Aurangabad, India

Res. J. Engineering Sci., Volume 6, Issue (4), Pages 8-10, May,26 (2017)

Abstract

In the intrusion detection technique for medical cyber physical systems using behavior rule, we find the intrusion in medical cyber physical system using the behavior of medical device current value. In the behavior rule technique for intrusion detection, medical devices are connected in cyber physical system in which the patient’s security and is of the most importance factor. In that, all medical device standard value i.e. normal behavior of device is stored. The technique to transform behavior rules to a state machine like patient current value is transfer in to machine and checked the patient current value and device normal behavior value. So that, a device that is observed for its behavior can easily. is checked against the state machine for deviation from its behavior specification. If the device behavior is against the behavior rule, in that case intrusion occurs.

References

  1. Arney David, Plourde Jeff, Schrenker Rick, Mattegunta Pratyusha, Whitehead Susan F. and Goldman Julian M. (2014)., Design Pillars for Medical Cyber-Physical System Middleware., 124.
  2. Sztipanovits Janos, Ying Susan, Cohen I., Corman D., Davis J., Khurana H., Mosterman P.J., Prasad V. and Stormo L. (2013)., Strategic R & D opportunities for 21st century cyber physical system., Technical report, Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems, 2.
  3. Lu Tianbo, Zhao Jinyang, Zhao Lingling, Li Yang and Zhang Xiaoyan (2015)., Towards a Framework for Assuring Cyber Physical System Security., International Journal of Security and Its Applications, 9(3), 25-40.
  4. Bansal Bindiya and Singh Kulwinder (2015)., Rule Based Intrusion Detection System to Identify Attacking Behaviour and Severity of Attacks., International Journal of Advanced Research in Computer Science and Software Engineering, 5(1), 718-724.
  5. Park Kyungseo, Lin Yong, Metsis Vangelis, Le Zhengyi and Makedon Fillia (2010)., Abnormal Human Behavioral Pattern Detection in Assisted Living Environments., Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, 9.
  6. Deber Herve (2000)., An introduction to intrusion-detection systems., Proceedings of Connect.
  7. Anand Amrita and Patel Brajesh (2012)., An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols., 2(8), 94-98.
  8. Scarfone Karen and Mell Peter (2007)., Guide to Intrusion Detection and Prevention Systems (IDPS)., NIST, Special Publication 800-94.
  9. Sandhu Usman Asghar, Haider Sajjad, Naseer Salman and Ateeb Obaid Ullah (2011)., A Survey of Intrusion Detection & Prevention Techniques., IPCSIT , 16, 67.
  10. Mukesh Krishnan M.B. and P. Sheik Abdul Khader (2013)., Trust Based Intrusion Detection System for Mobile Ad Hoc Network., 1, 107-108.
  11. Uppuluri P. and Sekar R. (2001)., Experiences with Specification-based Intrusion Detection., International Workshop on Recent Advances in Intrusion Detection, 172-189.
  12. Kumar B.Santosh, Sekhara T.Chandra Phani Raju, Ratnakar M., Baba Sk. Dawood and Sudhakar N. (2013)., Intrusion Detection System- Types and Prevention., 4(1), 77-82.
  13. Mitchell Robert and Chen Ray (2015)., Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems., IEEE Transactions on Dependable and Secure Computing, 12(1), 16-30.
  14. Jahan Jameela, Karre Shilpa and Farha Saleha (2015)., Detection of Intrusions by Using Behavior Rule Specification Based Technique for Providing Security to MCPSs., 2, 904-909.