| DOI | Resolve DOI: https://doi.org/10.1016/B978-0-443-15299-3.00007-5 |
|---|
| Author | Search for: Hazratifard, Mehdi; Search for: Agrawal, Vibhav; Search for: Gebali, Fayez; Search for: Elmiligi, Haytham; Search for: Mamun, Mohammad1 |
|---|
| Affiliation | - National Research Council of Canada. Digital Technologies
|
|---|
| Format | Text, Book Chapter |
|---|
| Subject | machine learning; continuous authentication; anomaly detection; telehealth; smart healthcare; insider attack detection |
|---|
| Abstract | The healthcare industry is experiencing a digital transformation through telehealth. As a result, users’ information is at risk of being compromised by intruders. Machine learning can provide the sector with reliable protection against potential threats to address security and privacy concerns. In this chapter, we explore possible machine-learning solutions to two security challenges in the telehealth system: continuous authentication and detecting insider attacks.
Authentication is the process of confirming the identity of a device or a person before connecting to the system. One of the most effective authentication techniques in telehealth is to verify IoT devices constantly to enhance cybersecurity protection on an ongoing basis. Continuous authentication uses machine learning algorithms to monitor all telehealth network activities, from users and devices, and utilizes classification techniques to detect unauthorized activities. This method relies on the verification of the identity of registered users to avoid unauthorized access as a proactive approach to mitigate the security risks. The main advantage of using machine learning over traditional authentication methods is that it does not need the user's attention while being authenticated continuously over time. Another advantage is higher reliability and accuracy. The second security challenge is insider attacks. Insider attacks occur when a user is authenticated legitimately to the system and aims to perform malicious activities such as stealing confidential information. Machine learning-based outlier detection methods are often used to identify users’ abnormal behaviors and prevent further access to confidential information. |
|---|
| Publication date | 2023-06-23 |
|---|
| Publisher | Elsevier |
|---|
| In | |
|---|
| Language | English |
|---|
| Peer reviewed | Yes |
|---|
| Export citation | Export as RIS |
|---|
| Report a correction | Report a correction (opens in a new tab) |
|---|
| Record identifier | e91c003b-6cd5-46a8-a560-45c50d33a626 |
|---|
| Record created | 2023-06-28 |
|---|
| Record modified | 2023-06-28 |
|---|