Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study

BackgroundHealth information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs....

Full description

Bibliographic Details
Main Authors: Ying He, Efpraxia Zamani, Iryna Yevseyeva, Cunjin Luo
Format: Article
Language:English
Published: JMIR Publications 2023-04-01
Series:Journal of Medical Internet Research
Online Access:https://www.jmir.org/2023/1/e41748
_version_ 1827857396595163136
author Ying He
Efpraxia Zamani
Iryna Yevseyeva
Cunjin Luo
author_facet Ying He
Efpraxia Zamani
Iryna Yevseyeva
Cunjin Luo
author_sort Ying He
collection DOAJ
description BackgroundHealth information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records. ObjectiveThis study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence–based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently. MethodsIn this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology’s ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods. ResultsEthical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). ConclusionsThis research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence–based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.
first_indexed 2024-03-12T12:39:56Z
format Article
id doaj.art-fb4c92373662467784fbc93c0c929871
institution Directory Open Access Journal
issn 1438-8871
language English
last_indexed 2024-03-12T12:39:56Z
publishDate 2023-04-01
publisher JMIR Publications
record_format Article
series Journal of Medical Internet Research
spelling doaj.art-fb4c92373662467784fbc93c0c9298712023-08-28T23:57:28ZengJMIR PublicationsJournal of Medical Internet Research1438-88712023-04-0125e4174810.2196/41748Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation StudyYing Hehttps://orcid.org/0000-0003-2023-5547Efpraxia Zamanihttps://orcid.org/0000-0003-3110-7495Iryna Yevseyevahttps://orcid.org/0000-0002-1627-7624Cunjin Luohttps://orcid.org/0000-0003-3946-1093 BackgroundHealth information systems (HISs) are continuously targeted by hackers, who aim to bring down critical health infrastructure. This study was motivated by recent attacks on health care organizations that have resulted in the compromise of sensitive data held in HISs. Existing research on cybersecurity in the health care domain places an imbalanced focus on protecting medical devices and data. There is a lack of a systematic way to investigate how attackers may breach an HIS and access health care records. ObjectiveThis study aimed to provide new insights into HIS cybersecurity protection. We propose a systematic, novel, and optimized (artificial intelligence–based) ethical hacking method tailored specifically for HISs, and we compared it with the traditional unoptimized ethical hacking method. This allows researchers and practitioners to identify the points and attack pathways of possible penetration attacks on the HIS more efficiently. MethodsIn this study, we propose a novel methodological approach to ethical hacking in HISs. We implemented ethical hacking using both optimized and unoptimized methods in an experimental setting. Specifically, we set up an HIS simulation environment by implementing the open-source electronic medical record (OpenEMR) system and followed the National Institute of Standards and Technology’s ethical hacking framework to launch the attacks. In the experiment, we launched 50 rounds of attacks using both unoptimized and optimized ethical hacking methods. ResultsEthical hacking was successfully conducted using both optimized and unoptimized methods. The results show that the optimized ethical hacking method outperforms the unoptimized method in terms of average time used, the average success rate of exploit, the number of exploits launched, and the number of successful exploits. We were able to identify the successful attack paths and exploits that are related to remote code execution, cross-site request forgery, improper authentication, vulnerability in the Oracle Business Intelligence Publisher, an elevation of privilege vulnerability (in MediaTek), and remote access backdoor (in the web graphical user interface for the Linux Virtual Server). ConclusionsThis research demonstrates systematic ethical hacking against an HIS using optimized and unoptimized methods, together with a set of penetration testing tools to identify exploits and combining them to perform ethical hacking. The findings contribute to the HIS literature, ethical hacking methodology, and mainstream artificial intelligence–based ethical hacking methods because they address some key weaknesses of these research fields. These findings also have great significance for the health care sector, as OpenEMR is widely adopted by health care organizations. Our findings offer novel insights for the protection of HISs and allow researchers to conduct further research in the HIS cybersecurity domain.https://www.jmir.org/2023/1/e41748
spellingShingle Ying He
Efpraxia Zamani
Iryna Yevseyeva
Cunjin Luo
Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
Journal of Medical Internet Research
title Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
title_full Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
title_fullStr Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
title_full_unstemmed Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
title_short Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study
title_sort artificial intelligence based ethical hacking for health information systems simulation study
url https://www.jmir.org/2023/1/e41748
work_keys_str_mv AT yinghe artificialintelligencebasedethicalhackingforhealthinformationsystemssimulationstudy
AT efpraxiazamani artificialintelligencebasedethicalhackingforhealthinformationsystemssimulationstudy
AT irynayevseyeva artificialintelligencebasedethicalhackingforhealthinformationsystemssimulationstudy
AT cunjinluo artificialintelligencebasedethicalhackingforhealthinformationsystemssimulationstudy