{"title":"HER环境下基于PCA的非法使用检测方法","authors":"Donghwi Lee, Byong Hun Kim, Kuinam J. Kim","doi":"10.1109/ICISA.2010.5480257","DOIUrl":null,"url":null,"abstract":"Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detecting Method on Illegal Use Using PCA under HER Environment\",\"authors\":\"Donghwi Lee, Byong Hun Kim, Kuinam J. Kim\",\"doi\":\"10.1109/ICISA.2010.5480257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic\",\"PeriodicalId\":313762,\"journal\":{\"name\":\"2010 International Conference on Information Science and Applications\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2010.5480257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
在EHR(Electronic Health Recode)环境下使用的电子信息可以在医院内与EHR系统连接的所有系统中进行查询、修改或删除,这得益于网络系统。在医院内部,登录EHR系统后,正在使用分配适当权限的RBAC系统。在RBAC(role -based access control)中,用户的角色可以通过网络入侵和用户登录信息调制而被误用或滥用。目前的RBAC系统是通过管理角色中包含的权限分配来防止用户的误用或滥用,但通过有效的网络监控和网络流量分析,可以发现通过网络调制被滥用的用户信息。然而,在EHR系统甚至连接到Internet的环境中,仅通过监控网络流量来发现被滥用和误用的角色需要花费大量的分析时间。本文采用主成分分析方法,对RBAC系统传输的相关数据进行主成分提取,进行线性变换,在大量网络流量中进行相关性分析,有效地检测出使用不当的角色
Detecting Method on Illegal Use Using PCA under HER Environment
Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic