{"title":"针对医疗物联网(IoMT)勒索软件攻击的最新评估:综述","authors":"Tamara Nusairat, M. Saudi, Azuan Ahmad","doi":"10.1109/ICCSCE58721.2023.10237161","DOIUrl":null,"url":null,"abstract":"The magnitude, complexity, and diversity of cyber threats against the Internet of Medical Things have increased over the past several years, making it challenging to implement effective defence strategies against these cyber-attacks, especially against ransomware. Balancing security requirements and rapid innovation and adoption with the Internet of Medical Things is challenging in healthcare industries. Hence, this article presents the identified features in ransomware architecture that triggered the ransomware attacks against the Internet of Medical Things. The experiment was conducted in a controlled lab environment, with open-source tools and by using hybrid analysis. As a result, thirteen (13) related features that include initial access, persistence, execution, defence evasion, credential access, discovery, impact, command and control, privilege escalation, lateral movement, collection, network communication and MD5 have been identified by analyzing vulnerabilities, potential attack routes, and the effects of a successful security breach against the IoMT. In the future, this work can be used as a reference and guidance for other researchers with the same interest.","PeriodicalId":287947,"journal":{"name":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review\",\"authors\":\"Tamara Nusairat, M. Saudi, Azuan Ahmad\",\"doi\":\"10.1109/ICCSCE58721.2023.10237161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The magnitude, complexity, and diversity of cyber threats against the Internet of Medical Things have increased over the past several years, making it challenging to implement effective defence strategies against these cyber-attacks, especially against ransomware. Balancing security requirements and rapid innovation and adoption with the Internet of Medical Things is challenging in healthcare industries. Hence, this article presents the identified features in ransomware architecture that triggered the ransomware attacks against the Internet of Medical Things. The experiment was conducted in a controlled lab environment, with open-source tools and by using hybrid analysis. As a result, thirteen (13) related features that include initial access, persistence, execution, defence evasion, credential access, discovery, impact, command and control, privilege escalation, lateral movement, collection, network communication and MD5 have been identified by analyzing vulnerabilities, potential attack routes, and the effects of a successful security breach against the IoMT. In the future, this work can be used as a reference and guidance for other researchers with the same interest.\",\"PeriodicalId\":287947,\"journal\":{\"name\":\"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSCE58721.2023.10237161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSCE58721.2023.10237161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Recent Assessment for the Ransomware Attacks Against the Internet of Medical Things (IoMT): A Review
The magnitude, complexity, and diversity of cyber threats against the Internet of Medical Things have increased over the past several years, making it challenging to implement effective defence strategies against these cyber-attacks, especially against ransomware. Balancing security requirements and rapid innovation and adoption with the Internet of Medical Things is challenging in healthcare industries. Hence, this article presents the identified features in ransomware architecture that triggered the ransomware attacks against the Internet of Medical Things. The experiment was conducted in a controlled lab environment, with open-source tools and by using hybrid analysis. As a result, thirteen (13) related features that include initial access, persistence, execution, defence evasion, credential access, discovery, impact, command and control, privilege escalation, lateral movement, collection, network communication and MD5 have been identified by analyzing vulnerabilities, potential attack routes, and the effects of a successful security breach against the IoMT. In the future, this work can be used as a reference and guidance for other researchers with the same interest.