HER环境下基于PCA的非法使用检测方法

Donghwi Lee, Byong Hun Kim, Kuinam J. Kim
{"title":"HER环境下基于PCA的非法使用检测方法","authors":"Donghwi Lee, Byong Hun Kim, Kuinam J. Kim","doi":"10.1109/ICISA.2010.5480257","DOIUrl":null,"url":null,"abstract":"Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detecting Method on Illegal Use Using PCA under HER Environment\",\"authors\":\"Donghwi Lee, Byong Hun Kim, Kuinam J. Kim\",\"doi\":\"10.1109/ICISA.2010.5480257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic\",\"PeriodicalId\":313762,\"journal\":{\"name\":\"2010 International Conference on Information Science and Applications\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2010.5480257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

在EHR(Electronic Health Recode)环境下使用的电子信息可以在医院内与EHR系统连接的所有系统中进行查询、修改或删除,这得益于网络系统。在医院内部,登录EHR系统后,正在使用分配适当权限的RBAC系统。在RBAC(role -based access control)中,用户的角色可以通过网络入侵和用户登录信息调制而被误用或滥用。目前的RBAC系统是通过管理角色中包含的权限分配来防止用户的误用或滥用,但通过有效的网络监控和网络流量分析,可以发现通过网络调制被滥用的用户信息。然而,在EHR系统甚至连接到Internet的环境中,仅通过监控网络流量来发现被滥用和误用的角色需要花费大量的分析时间。本文采用主成分分析方法,对RBAC系统传输的相关数据进行主成分提取,进行线性变换,在大量网络流量中进行相关性分析,有效地检测出使用不当的角色
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detecting Method on Illegal Use Using PCA under HER Environment
Electronic information used under EHR(Electronic Health Recode) environment can be searched, modified or deleted in all the systems connected with EHR system inside a hospital, thanks to network systems. Inside a hospital, after logging in EHR system, RBAC system, which allots proper rights to users, is being used. In RBAC(Role-based access control), users' role can be misused or abused through packet modulation by network intrusion and modulation on log-in information of users. Current RBAC system is preventing misuse or abuse of users by managing authority allotment included in role, but users' information that is abused through network modulation can be detected through efficient network monitoring and network traffic analysis. However, in the environment where EHR system is connected even to the Internet, much analysis time is needed to find abused and misused roles only by monitoring network traffic. In this thesis, we, using Principal Component Analysis, can draw principal components of related data transmitted from RBAC system, make linear transformation, analyze correlation and detect use of improper role efficiently among a lot of network traffic
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信