4.1 Article

A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

Journal

FUTURE INTERNET
Volume 13, Issue 4, Pages -

Publisher

MDPI
DOI: 10.3390/fi13040090

Keywords

damage assessment; information warfare; malicious transactions; transactions dependency

Ask authors/readers for more resources

In the era of the Internet of things, companies have transitioned from paper-based data to electronic formats, with healthcare databases being a prime target for attackers. This paper introduces a novel approach inspired by COVID-19 infection behavior to assess database damage in healthcare systems efficiently. The proposed parallel algorithm significantly outperforms existing algorithms in terms of both time and memory, providing a minimized execution time.
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N boolean AND 3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.1
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available