Acknowledgement
이 논문은 2021년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임[No.2020-0-00447, "안전한 의료·헬스케어 서비스를 위한 커넥티드 의료기기 해킹대응 핵심기술 개발"].
References
- Comparitech, "Ransomware attacks on US healthcare organizations cost $20.8bn in 2020," Mar. 2021, https://www.comparitech.com/blog/information-security/ransomware-attacks-hospitals-data/
- 권혁찬, "의료사물인터넷(IoMT) 보안 기술 및 동향," ICT Conver gence Korea 2021, 2021. 3.
- 권혁찬 외, "커넥티드 의료기기 보안 동향 및 이슈," 주간기술동향, 제1911호, 2019. 8.
- A. James and M.B. Simon, "MEDJACK.3-Medical device hijack cyber attack evolve," in Proc. RSA Conf. (San Francisco, CA, USA), Feb. 2017.
- Armis, "URGENT/11-Takeover of a Spacelabs Xprezzon patient monitor," 2019, https://www.youtube.com/watch?v=tpSXr4XhQwM
- Armis, "NAT slipstreaming v2.0," https://www.armis.com/research/nat-slipstreaming-v20/
- Paloalto Networks(zingbox), "IoT guardian for the healthcare industry," White paper, 2016.
- Medigate, "Dedicated medical device-security platform," White paper, 2017.
- L. Fernandez Maimo et al., "Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments," Sensors, vol. 19, no. 5, 2019.
- OpenICE, https://www.openice.info/
- C. Ma et al., "Analysis of multi-types of flow features based on hybrid neural network for improving network anomaly detection," IEEE Access, vol. 7, 2019, pp. 148363-148380. https://doi.org/10.1109/access.2019.2946708
- P. Berezinski et al., "An entropy-based network anomaly detection method," J. Entropy. vol. 17, 2015, pp. 2367-2408. https://doi.org/10.3390/e17042367
- FDA, "Premarket submissions for management of cybersecurity in medical devices," 2014.
- FDA, "Postmarket management of cybersecurity in medical devices," 2016.
- M. Zou et al., "Network phenotyping for network traffic classification and anomaly detection," in Proc. IEEE Int. Symp. Technol. Homeland Secur. (Woburn, MA, USA), oct. 2018, pp. 23-24.
- A. Azmoodeh et. al., "Detecting crypto-ransomware in IoT networks based on energy consumption footprint," J. Ambient Intell. Humanized Comput. vol. 9, 2018, pp. 1141-1152. https://doi.org/10.1007/s12652-017-0558-5
- R.H. Hwang et al., "An LSTM-based deep learning approach for classifying malicious traffic at the packet level," Appl. Sci. vol. 9, 2019.
- B. Seri et al., "Pwned piper," White paper, Armis, 2021, https://www.armis.com/research/pwnedpiper