Demonstration of new attacks on three healthcare network protocols in a lab environment
-
Published:2023-07-24
Issue:
Volume:
Page:
-
ISSN:2263-8733
-
Container-title:Journal of Computer Virology and Hacking Techniques
-
language:en
-
Short-container-title:J Comput Virol Hack Tech
Author:
Dupont Guillaume,dos Santos Daniel,Dashevskyi Stanislav,Vijayakumar Sangavi,Murali Sashaank P.,Costante Elisa,den Hartog Jerry,Etalle Sandro
Abstract
AbstractHealthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected medical devices which can deliver health care, support hospitals’ operations, and can exchange patients’ data over healthcare network protocols. Previous research has pointed out weaknesses in the implementations of some of these protocols, and demonstrated how they could be abused by malicious actors in hospitals. There are still other healthcare network protocols for which we have limited knowledge, and no security analysis can be found in the literature. This can represent an issue, as these technologies may also have vulnerabilities which could, if exploited, impact hospitals’ operations and patients’ data. For this reason, we investigate in this paper three healthcare protocols found in hospital networks: the POCT1-A and LIS02-A standards used by some point-of-care and laboratory devices, and the proprietary protocol Data Export used by some Philips patient monitors. We explain how to build a test lab to perform security research on medical devices, in which we demonstrate four attacks highlighting how the selected protocols can be abused. This research provides greater knowledge of threats relevant to healthcare delivery organizations, and helps to enhance network security monitoring capabilities such as intrusion detection systems. More specifically, signatures can be created to detect attacks on these protocols and datasets can be assembled to assist the development and testing of hospital-specific intrusion detection systems.
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference34 articles.
1. O’Brien, G., Edwards, S., Littlefield, K., McNab, N., Wang, S., Zheng, K.: Securing Wireless Infusion Pumps in Healthcare Delivery Organizations. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg (2018). https://doi.org/10.6028/NIST.SP.1800-8 2. Gatouillat, A., Badr, Y., Massot, B., Sejdic, E.: Internet of medical things: a review of recent contributions dealing with cyber-physical systems in medicine. IEEE Internet Things J. 5(5), 3810–3822 (2018). https://doi.org/10.1109/JIOT.2018.2849014 3. McKee, D.: 80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals. https://bit.ly/3MDb70P. Accessed 12 Apr 2023 (2018) 4. Chantzis, F., Stais, I., Calderon, P., Deirmentzoglou, E., Woods, B.: Practical IoT Hacking. No Starch Press, San Francisco (2021) 5. Kramer, D.B., Baker, M., Ransford, B., Molina-Markham, A., Stewart, Q., Fu, K.: Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance. PLoS ONE (2012). https://doi.org/10.1371/journal.pone.0040200
|
|