Browse > Article

Security Structure for Protection of Emergency Medical Information System  

Shin, Sang Yeol (호원대학교 응급구조학과)
Yang, Hwan Seok (중부대학교 정보보호학과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.8, no.2, 2012 , pp. 59-65 More about this Journal
Abstract
Emergency medical information center performs role of medical direction about disease consult and pre-hospital emergency handling scheme work to people. Emergency medical information system plays a major role to be decreased mortality and disability of emergency patient by providing information of medical institution especially when emergency patient has appeared. But, various attacks as a hacking have been happened in Emergency medical information system recently. In this paper, we proposed security structure which can protect the system securely by detecting attacks from outside effectively. Intrusion detection was performed using rule based detection technique according to protocol for every packet to detect attack and intrusion was reported to control center if intrusion was detected also. Intrusion detection was performed again using decision tree for packet which intrusion detection was not done. We experimented effectiveness using attacks as TCP-SYN, UDP flooding and ICMP flooding for proposed security structure in this paper.
Keywords
Emergency Medical Information System; IDS; Decision Tree;
Citations & Related Records
연도 인용수 순위
  • Reference
1 송형곤, 곽영호, 서길준, "서울응급의료정보센터 이용현황에 관한 분석," 대한응급의학회지, 제13 권 제1호, 2002, pp. 19-22.
2 법제처, "응급의료에 관한법률 제 28 조," 2012.
3 법제처, "응급의료에 관한 시행령 제 24조," 2012.
4 최윤정, "침입탐지시스템의 정확도 향상을 위한 개선된 데이터마이닝 방법론," 디지털산업정보 학회지, 제6권, 제1호, 2010, pp. 1-12.
5 P. N. Tan, M. Steinbach, V. Kumar, "Introduction to Data Mining," Pearson Addison Wesley, 2005, pp. 150-168.
6 신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제 8권, 제1호, 2012, pp. 125-137.
7 ZhiSong Pan, Songcan Chen, GenBao Hu, and DaoQiang Zhang, "Hybrid Neural Network and C4. 5 for misuse Detection," Inter Conference: Machine Learning and Cybernetics, Vol. 4, 2003, pp. 2463-2467.