Attack modeling and mitigation strategies for risk-based analysis of networked medical devices

3Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

The escalating integration of network-enabled medical devices raises concerns for both practitioners and academics in terms of introducing new vulnerabilities and attack vectors. This prompts the idea that combining medical device data, security vulnerability enumerations, and attack-modeling data into a single database could enable security analysts to proactively identify potential security weaknesses in medical devices and formulate appropriate mitigation and remediation plans. This study introduces a novel extension to a relational database risk assessment framework by using the open-source tool OVAL to capture device states and compare them to security advisories that warn of threats and vulnerabilities, and where threats and vulnerabilities exist provide mitigation recommendations. The contribution of this research is a proof of concept evaluation that demonstrates the integration of OVAL and CAPEC attack patterns for analysis using a database-driven risk assessment framework.

Cite

CITATION STYLE

APA

Hodges, B. J., McDonald, J. T., Glisson, W. B., Jacobs, M., van Devender, M., & Pardue, J. H. (2020). Attack modeling and mitigation strategies for risk-based analysis of networked medical devices. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2020-January, pp. 6506–6515). IEEE Computer Society. https://doi.org/10.24251/hicss.2020.796

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free