Vulnerability prediction for secure healthcare supply chain service delivery

Article


Islam, S., Abba, A., Ismail, U., Mouratidis, H. and Papastergiou, S. 2022. Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer-Aided Engineering. 29 (4), pp. 389-409. https://doi.org/10.3233/ICA-220689
AuthorsIslam, S., Abba, A., Ismail, U., Mouratidis, H. and Papastergiou, S.
Abstract

Healthcare organisations are constantly facing sophisticated cyberattacks due to the sensitivity and criticality of patient health care information and wide connectivity of medical devices. Such attacks can pose potential disruptions to critical services delivery. There are number of existing works that focus on using Machine Learning(ML) models for pre-dicting vulnerability and exploitation but most of these works focused on parameterized values to predict severity and exploitability. This paper proposes a novel method that uses ontology axioms to define essential concepts related to the overall healthcare ecosystem and to ensure semantic consistency checking among such concepts. The application of on-tology enables the formal specification and description of healthcare ecosystem and the key elements used in vulnerabil-ity assessment as a set of concepts. Such specification also strengthens the relationships that exist between healthcare-based and vulnerability assessment concepts, in addition to semantic definition and reasoning of the concepts. Our work also makes use of Machine Learning techniques to predict possible security vulnerabilities in health care supply chain services. The paper demonstrates the applicability of our work by using vulnerability datasets to predict the exploitation. The results show that the conceptualization of healthcare sector cybersecurity using an ontological approach provides mechanisms to better understand the correlation between the healthcare sector and the security domain, while the ML algorithms increase the accuracy of the vulnerability exploitability prediction. Our result shows that using Linear Regres-sion, Decision Tree and Random Forest provided a reasonable result for predicting vulnerability exploitability.

KeywordsHealthcare supply chain service; Ontology; Vulnerability exploitability prediction; Machine learning; Cyber security
JournalIntegrated Computer-Aided Engineering
Journal citation29 (4), pp. 389-409
ISSN1069-2509
Year2022
PublisherIOS Press
Accepted author manuscript
License
File Access Level
Anyone
Digital Object Identifier (DOI)https://doi.org/10.3233/ICA-220689
Publication dates
Online26 Aug 2022
Publication process dates
Deposited01 Dec 2023
Copyright holder© 2022, The Authors
Permalink -

https://repository.uel.ac.uk/item/8wz09

Download files


Accepted author manuscript
  • 101
    total views
  • 51
    total downloads
  • 12
    views this month
  • 4
    downloads this month

Export as

Related outputs

Building a Human-Centric SOC: A New Framework for Success
Mwangi, J., Wall, J., Ismail, U. and Al-Nemrat, A. 2025. Building a Human-Centric SOC: A New Framework for Success. 16th International Conference on Global Security, Safety & Sustainability, ICGS3-24. Online 25 - 27 Nov 2024 Springer.
Fall Detection System with Accelerometer and Threshold-based Algorithm
Tang, D., Usman, A. B. and Abba, A. 2023. Fall Detection System with Accelerometer and Threshold-based Algorithm. YHIoT Research Journal. 1 (1).
Modelling language for cyber security incident handling for critical infrastructures
Mouratidis, H., Islam, S., Santos-Olmo, A., Sanchez, L. E. and Ismail, U. M. 2023. Modelling language for cyber security incident handling for critical infrastructures. Computers & Security. 128 (Art. 103139). https://doi.org/10.1016/j.cose.2023.103139
Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata
Abba, A., Cavalcanti, A. and Jacob, J. 2021. Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata. SBMF 2021: 24th Brazilian Symposium on Formal Methods. Online 06 - 10 Dec 2021 Springer, Cham. https://doi.org/10.1007/978-3-030-92137-8_5