Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain

Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our pape...

Full description

Bibliographic Details
Main Authors: Abdul Razaque, Fathi Amsaad, Meer Jaro Khan, Salim Hariri, Shujing Chen, Chen Siting, Xingchen Ji
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8888271/
_version_ 1818665380258775040
author Abdul Razaque
Fathi Amsaad
Meer Jaro Khan
Salim Hariri
Shujing Chen
Chen Siting
Xingchen Ji
author_facet Abdul Razaque
Fathi Amsaad
Meer Jaro Khan
Salim Hariri
Shujing Chen
Chen Siting
Xingchen Ji
author_sort Abdul Razaque
collection DOAJ
description Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified in the medical system, a classification of cyber-attacks is presented. Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack. More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. The countermeasures from previous papers and architectures that are still weak in terms of resource depletion, attack reduction, applicability, etc. are addressed. Finally, the paper discusses and recommends solutions for future work to decrease cyber-attacks in the medical field so that human health can be guaranteed.
first_indexed 2024-12-17T05:47:43Z
format Article
id doaj.art-cf23fed975374027b1bd87b7ac996f29
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T05:47:43Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-cf23fed975374027b1bd87b7ac996f292022-12-21T22:01:15ZengIEEEIEEE Access2169-35362019-01-01716877416879710.1109/ACCESS.2019.29508498888271Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical DomainAbdul Razaque0https://orcid.org/0000-0002-2163-6871Fathi Amsaad1Meer Jaro Khan2Salim Hariri3Shujing Chen4Chen Siting5Xingchen Ji6Department of Computer Engineering and Telecommunication, International Information Technology University, Almaty, KazakhstanDepartment of Computing Sciences and Computer Engineering, The University of Southern Mississippi, Hattiesburg, MS, USADepartment of Business Management and Information, International Islamic University Islamabad, Islamabad, PakistanDepartment of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USADepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaDepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaDepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaRecently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified in the medical system, a classification of cyber-attacks is presented. Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack. More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. The countermeasures from previous papers and architectures that are still weak in terms of resource depletion, attack reduction, applicability, etc. are addressed. Finally, the paper discusses and recommends solutions for future work to decrease cyber-attacks in the medical field so that human health can be guaranteed.https://ieeexplore.ieee.org/document/8888271/Dataflowmedical fieldcyber-attacksarchitecturescybersecuritythreats
spellingShingle Abdul Razaque
Fathi Amsaad
Meer Jaro Khan
Salim Hariri
Shujing Chen
Chen Siting
Xingchen Ji
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
IEEE Access
Dataflow
medical field
cyber-attacks
architectures
cybersecurity
threats
title Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
title_full Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
title_fullStr Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
title_full_unstemmed Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
title_short Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
title_sort survey cybersecurity vulnerabilities attacks and solutions in the medical domain
topic Dataflow
medical field
cyber-attacks
architectures
cybersecurity
threats
url https://ieeexplore.ieee.org/document/8888271/
work_keys_str_mv AT abdulrazaque surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT fathiamsaad surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT meerjarokhan surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT salimhariri surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT shujingchen surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT chensiting surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain
AT xingchenji surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain