1 Introduction and background

The health care industry is often the most targeted and attacked hosts by cyber criminals. On March 13, the Brno University Hospital which is a key Covid-19 testing site in the Czech Republic, immediately shutdown all computers as a cyberattack took hold. Czech hospital is not the only medical institution to be targeted by cybercriminals as the novel coronavirus has spread around the world. As the total number of global cases of Covid-19 has swelled above 250,000, hackers have increased their activity as they look to capitalise on the crisis (Burgess 2020). The huge need for e -records of health of patients in the illegal market is intensifying the number of cyber attacks that have destroyed the prestige and funds of health care institutions. Consequently, it is fundamental to curb medical cyber piracy and secure the network infrastructure that supports them (Fernández-Alemán et al. 2013).

Cyberspace can be expressed mathematically using graph theory since the basic structure of a graph is applicable to the interconnected world of computer networks. Nodes can be associated with various types of hardware or virtual systems as well as routers and other internet infrastructure, and edges can represent connections or information flow between nodes (Mahapatra et al. 2020; Dawood 2014). In cybersecurity, a graph-based approach can benefit security operations teams to increase performance and capability by establishing a system of record and intelligence used to inform future threats (Maida 2018).

Strategies for protection of a graph \(G = (V, E)\) by placing one or more guards at every vertex of a subset \(S\) of \(V\), where a guard at \(v\) can protect any vertex in its closed neighborhood have resulted in the study of several graphs domination parameters such as location and secure domination. concept of locating dominating set was introduced and first studied by Slater and secure domination was initiated by Cockayne et al. Various aspects of location and secure domination problems and properties of a graph have been studied in the literature and is shown to be not polynomially solvable (Cockayne et al. 2005). Secure dominating sets can be considered as processors (nodes) from which the information of the patient can be passed on securely to all other processors (nodes) of the system which could be accessed by medical practitioner remotely and the patient and their family but not by hackers (see Fig. 2). This can be accompolished by just monitoring the nodes present in the minimum secure dominating set. Another protection strategy called the locating domination problem which also non-polynomially solvable, is concerned with the protection of vertices of \(G\), using one guard per vertex and require the set of guarded vertices to be a locating domination and this is essential to locate the position of the faulty vertices (Weigt and Zhou 2006; Angel et al. 2021).

Most hospitals do not have the resources to monitor threats to their systems, and many might not even be aware that they are something to be concerned about (Coventry and Branley 2018). Compounding the issue, the vast majority of hospitals don’t have full-time cybersecurity employees. Small, rural hospitals in underserved communities, probably don’t have the money to hire staff or update their systems. Without security staff, they might not be aware of or able to implement security updates announced by a device company (Wetsman 2019). The lack of awareness and lack of resources is the motivation to build robust cybersecurity programs having the ability to detect network activity and pointing to an intrusion attempt on the server so that the system administrator can take appropriate measures in time.

Most malware protection and detection hardware or software is equipped with logging capability used to identify suspicious activity. These softwares monitors the firewall logs to detect a scan or attack on the server, and then can alert administrators or take proactive steps to contain the threat. One can also consider hiring a cybersecurity professional to review the logs for any red-flag trends, such as high frequency of viruses consistently found on a single computer.

A worm is a malware which is transmitted through insecure networks, e-mail attachments, software downloads, and social media links. The combinatorial topology of routing may have a huge impact on the worm propagation and thus some servers play a more essential and significant role than others. Identifying these nodes (servers) are essential to greatly hinder worm propagation. The idea is to find a minimum vertex cover in the graph whose vertices are the routing servers and whose edges are the connections between routing servers. This is the best solution for worm propagation and an exact solution for designing the network defense strategy (Armbruster et al. 2007).

Security and privacy in e-records can be seriously threatened by hackers, viruses, and worms (Fernández-Alemán et al. 2013) (see Fig. 1). If the networks are not rightly monitored at the organizational level, it can undoubtedly jeopardize the kind of care, given to patients. Because of the risks that accompany poorly monitored healthcare IT networks it is essential that healthcare industries should be assisted with a extensible network monitoring solution.

Fig. 1
figure 1

Accessing and hacking health care system

Bloom networks can be considered as healthcare systems (data structures), are interesting in and of themselves as they are both planar and regular which make them particularly attractive as potential structures for massively parallel computers (see Fig. 2). Motivated by the grid, cylinder and torus networks, Antony et al. (2016), introduced the definition of bloom graph. The bloom graphs are very reliable networks as their vertex connectivity equals the degree of regularity.

Fig. 2
figure 2

Bloom’s architecture representing healthcare system

In this paper, the problem of using mobile guards to defend the nodes of a graph \(G=(V,E)\) (network) against a single attack on its vertices (nodes) and edges (links) is studied. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (health centres) which is essential for defending the network against a single malware attack.

2 Preliminaries

A graph \(G = (V, E)\) consists of nonempty set of vertices (or nodes) and \(E\), a set of edges. Each edge has either one or two vertices associated with it, called its endpoints. An edge is said to connect its endpoints. In a graph \(\mathrm{G}\), a set \(S \subseteq V\) is secure in \(\mathrm{G}\) if every attack on S is defendable. The set \(S \subseteq V\) is a dominating set in \(\mathrm{G}\) if every vertex in \(\mathrm{G}\) not in \(S\) has a neighbor in \(\mathrm{S}\). The domination number of \(\mathrm{G}\) denoted by \(\gamma \left(G\right)= min\{|S| : S {\text{is a dominating set of G}}\}\). A secure dominating set in \(\mathrm{G}\) is a set \(S \subseteq V\) that is both a secure set in \(\mathrm{G}\) and also a dominating set in\(\mathrm{G}\). The secure domination number of \(\mathrm{G}\) is \(\gamma s\left(G\right)=min\{|S|: S {\text{is secure dominating set}}\}\). For a graph in Fig. 3, \(\gamma s(G) =3\). This protection strategy defends the vertices of a graph against a single attack on its vertices.

Fig. 3
figure 3

A graph \(\mathrm{with}\) \({\gamma }_{L}\left(\mathrm{G}\right)=\gamma s\left(G\right)=3\)

A set of edges of \(\mathrm{G}\) is called an edge cover if that set covers all the vertices in \(\mathrm{G}\). The cardinality of the minimum edge cover set is called the edge covering number denoted by \({\upbeta }^{\mathrm{^{\prime}}}(\mathrm{G})\). Finding the minimum edge cover is called the edge covering problem (Eze et al. 2020). Edge covers can be applied in network analysis. Another area where the edge covering number plays a role is the traffic phasing problem. A perfect matching \(\mathrm{M}\) in \(\mathrm{G}\) is a maximum number of non-adjacent edges with the property that every vertex is incident with an edge of the matching. \(\mathrm{M}\) is always a minimum edge cover. For the graph in Fig. 7, the minimum edge cover set is given by \(\mathrm{S}\) where, \(\mathrm{S}\) is the set containing the thicker edges.

A locating dominating (LD) set of a graph \(\mathrm{G}\) is a dominating set \(S\) of \(\mathrm{G}\) such that for every two vertices \(u\) and \(v\) in \(V\left(G\right)-S\) such that \(N(u)\cap S\ne N(v)\cap S\). The locating domination number \({\gamma }_{L}\left(\mathrm{G}\right)\) is the lowest cardinality of a LD set of \(G\) (Angel et al. 2021). For a graph in Fig. 3, \({\gamma }_{L}\left(\mathrm{G}\right)=3\). As seen from the example below in Fig. 3, secure domination and locating domination sets mitigates the security issues in any health care system infra structure or topology.

3 The bloom architecture

The bloom network denoted by \({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\), where \(\mathrm{m},\mathrm{ n}> 2\) is defined in [1]. For example, the grid view of bloom networks \({\mathrm{B}}_{\mathrm{3,6}}\) and the flower view of \({\mathrm{B}}_{\mathrm{3,6}}\) are shown in Figs. 4 and 5 respectively and the flower view of bloom network \({\mathrm{B}}_{4, 6}\) is shown in Fig. 6. Antony et al. (2016) identified these new topological representation for bloom networks showed that these representations are isomorphic.

Fig. 4
figure 4

Grid view of \({B}_{\mathrm{3,6}}\)

Fig. 5
figure 5

Flower view of \({B}_{\mathrm{3,6}}\)

Fig. 6
figure 6

Flower view of \({\mathrm{B}}_{\mathrm{4,6}}\)

First and foremost an algorithm for solving the locating dominating set problem for bloom networks is constructed which works on the flower-like structure. To explain the flower structure of bloom networks, \({\mathrm{B}}_{\mathrm{4,6}}\) is considered as an example. From Fig. 6, the inner most cycle which is at the center of \({\mathrm{B}}_{4, 6}\) colored in green is a cycle of length 6 denoted by \({\mathrm{C}}_{6}\). Call all those cliques of length 3 on top of \({\mathrm{C}}_{6}\) colored pink, as petals. These \(\mathrm{n}\) petals together with the center \({\mathrm{C}}_{6}\) is called a floret (pink and green colored edges and the vertices on them) and is denoted by \({\mathrm{f}}_{6}\) (see Fig. 6). All the vertices in level \(\mathrm{i}\), where \(1\le \mathrm{i}\le \mathrm{m}\) are denoted by \({\mathrm{L}}_{\mathrm{i}}\).

3.1 Locating domination for bloom \({\mathbf{B}}_{\mathbf{m},\mathbf{n}}\)

In this section a linear time algorithm for finding the locating dominating set of bloom graph is presented. Denote by \({L}_{i}\), the vertices in level \(i\), where \(1\le i\le m\). Let \({S}_{1}\) denote \(\lceil\frac{n}{2}\rceil\) number of alternate vertices in the level \({L}_{1}\) and \({\mathrm{v}}_{\mathrm{j}}\) denotes any vertex in the level \({L}_{j}\).

3.1.1 Algorithm LD-\({\mathbf{B}}_{\mathbf{m},\mathbf{n}}\)

To find a locating dominating set of a bloom graph.

Input: A bloom graph \({\mathrm{G}=\mathrm{B}}_{\mathrm{m},\mathrm{n}}\) where \(\mathrm{m}>2\), \(\mathrm{n}>2.\)

Output: A LD set \(\mathrm{S}\) of \(\mathrm{G}\).

  1. 1.

    Initialization\(:\mathrm{ S}=\upphi \); i = 1

  2. 2.

    while \((\mathrm{ i}<\mathrm{m})\) do

  3. 3.

    \(\mathrm{S}=\mathrm{S}\cup {\mathrm{v}}_{\mathrm{j}}\)

  4. 4.

    \(\mathrm{i}=\mathrm{i}+1\)

  5. 5.

    end while

  6. 6.

    \(\mathrm{S}=\mathrm{S}\cup {\mathrm{S}}_{1}\)

  7. 7.

    Stop

The proof of correctness of the algorithm is given by the following theorem.

Theorem 3.1.2

If \({\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) is a bloom graph then, \({\gamma }_{L}\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)= \lceil\frac{\mathrm{n}}{2}\rceil+(\mathrm{m}-1)\).

Proof

Let \(\mathrm{G}\) be the bloom graph \({\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) and let \(\mathrm{S}\) be a locating dominating set of \(\mathrm{G}\).

Let the value of m be even or odd. To cover vertices on floret \({\mathrm{f}}_{\mathrm{n}}\), \(\lceil\frac{\mathrm{n}}{2}\rceil\) vertices on \({\mathrm{C}}_{\mathrm{n}}\) are chosen. That is, \(\lceil\frac{\mathrm{n}}{2}\rceil\) number of \({\mathrm{L}}_{1}\) vertices are required to cover all the vertices of \({\mathrm{f}}_{\mathrm{n}}\). Since all \({\mathrm{L}}_{2}\) vertices are already dominated by \({\mathrm{L}}_{1}\) vertices, we choose one vertex from each level. Since there are m levels, we choose one vertex from each of the \(m-1\) levels except \({\mathrm{L}}_{1}\), as \(\lceil\frac{\mathrm{n}}{2}\rceil\) vertices are already chosen from the first level. Thus the set \(\mathrm{S}\) will contain the vertices on levels \({{\mathrm{L}}_{1}, {\mathrm{L}}_{2}, {\mathrm{L}}_{3},\dots ,\mathrm{ L}}_{\mathrm{m}}\). Adding all the vertices in \(\mathrm{S}\), the LD number is \(\lceil\frac{\mathrm{n}}{2}\rceil+(m-1).\)

Suppose if \(\mathrm{S}\) is not minimum. Then there exists a LD set \(\mathrm{D}\) which is minimum. If this is the case, then leaving out a single vertex in any level \({\mathrm{L}}_{\mathrm{i}}\) from the set \(\mathrm{S}\) will contradict the LD set property and so \(\mathrm{S}\) will not be a LD set. Therefore, \(\mathrm{S}\) should to be minimum.

Location problems examine the ability to pinpoint the origin of an event. The nodes in a \({\gamma }_{L}-\) set can be used for safe gaurding the nodes of the network and to locate defective nodes in that network (Majeed et al. 2019). Now, if the minimum edges, covers(domninates) all the nodes then it becomes edge covering. In the following section an edge covering set which covers nodes of a graph, is obtained for the bloom networks.

Theorem 3.1.3

If \({\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) be a bloom graph, then, \({\upbeta }^{\mathrm{^{\prime}}}\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)=\left\{\begin{array}{c}\frac{\mathrm{mn}}{2}, if \; either \; m \; or \; n \; is \;even\\ \lceil\frac{\mathrm{mn}}{2}\rceil, if \; m \; and \; n \; are \; odd\end{array}\right.\)

Proof

Let \({\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) be a bloom graph. Case (i): If either \(\mathrm{m}\) or \(\mathrm{n}\) is even. Then \(\mathrm{mn}\) is even. Since G contains even number of vertices, we conclude that G has a perfect matching. This perfect matching is a minimum edge cover for G. Hence \({\upbeta }^{\mathrm{^{\prime}}}\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)=\frac{\mathrm{mn}}{2}\). Case (ii): If both \(\mathrm{m}\) and \(\mathrm{n}\) are odd. Then \(\mathrm{mn}\) is odd. Since \(\mathrm{G}\) contains odd number of vertices, we conclude that \(\mathrm{G}\) has a near perfect matching (Fig. 7). Therefore, \({\upbeta }^{\mathrm{^{\prime}}}\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)=\frac{\mathrm{mn}+1}{2}=\lceil\frac{\mathrm{mn}}{2}\rceil.\)

Fig. 7
figure 7

Thick edges represent the edge cover of \({\mathrm{B}}_{\mathrm{3,6}}\)

3.2 Secure domination for bloom \({\mathbf{B}}_{\mathbf{m},\mathbf{n}}\)

In this section a linear time algorithm for finding the minimum secure dominating set of bloom graph is given. Denote by \({L}_{i}\), the n number of vertices present in level \(i\), where \(1\le i\le m\). Let \(\mathrm{S}\) denote secure dominating set (SDS) of \({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\) (Fig. 8).

Fig. 8
figure 8

γ \(s\left({\mathrm{B}}_{\mathrm{4,6}}\right)=12\)

3.2.1 Algorithm SDS-\({\mathbf{B}}_{\mathbf{m},\mathbf{n}}\)

To find a minimum secure dominating set of a bloom graph.

Input: A bloom graph \({\mathrm{G}=\mathrm{B}}_{\mathrm{m},\mathrm{n}}\) where \(\mathrm{m}> 2\), \(\mathrm{n}>2.\)

Output: A SDS set \(\mathrm{S}\) of \(\mathrm{G}\).

  1. 1.

    Initialization\(:\mathrm{ S }=\upphi \); i = 1

  2. 2.

    If \(mn\) is even then

  3. 3.

    while \((\mathrm{ i}=\mathrm{m })\) do

  4. 4.

    S = S \(\cup {\mathrm{L}}_{\mathrm{i}}\)

  5. 5.

    i = i + 1

  6. 6.

    end while

  7. 7.

    end if

  8. 8.

    goto step 15

  9. 9.

    If \(mn\) is odd then

  10. 10.

    while \((\mathrm{ i}\le \mathrm{m })\) do

  11. 11.

    S = S \(\cup {\mathrm{L}}_{\mathrm{i}}\)

  12. 12.

    i = i + 1

  13. 13.

    end while

  14. 14.

    endif

  15. 15.

    stop

The proof of correctness of the algorithm is given by the following theorem.

Theorem 3.2.2

If \({\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) is a bloom graph then, γ \(s\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)= \left\{ \begin{array}{c}\frac{mn}{2} \; if \; mn \; is \; even \\ n\lceil\frac{m}{2}\rceil \; if \; mn \; is \; odd.\end{array}\right.\)

Proof

Let \({\mathrm{G}=\mathrm{B}}_{\mathrm{m},\mathrm{ n}}\) be a bloom graph and \(S\) be a minimum secure dominating set of \(\mathrm{G}\).

Case 1: \(mn\) is even.

In level 1, all the \(n\) vertices are selected. These \(n\) vertices will securely dominate both level 1 and level 2 vertices. In level 3, \(n\) vertices are chosen. These \(n\) vertices will securely dominate both level 3 and level 4 vertices. Similarly proceeding for \(\frac{m}{2}\) number of alternate levels, that is, selecting \(n\) from alternate levels till the level \(m\), γ \(s\left({\mathrm{B}}_{\mathrm{m},\mathrm{n}}\right)= \frac{mn}{2}\).

Case 2: \(mn\) is odd.

In this case, \(m\) and \(n\) both should be odd. In each level select \(n\) vertices. There are \(\lceil\frac{m}{2}\rceil\) number of alternate levels. Therefore, selecting \(n\) number of vertices from \(\lceil\frac{m}{2}\rceil\) alternate levels, γ \(s\left({B}_{m,n}\right)=n\lceil\frac{m}{2}\rceil\).

Suppose if \(S\) is not minimum then, there exists another secure dominating set \(\mathrm{S}\) which is minimum. If this is the case, then leaving out a single vertex in any level \({\mathrm{L}}_{\mathrm{i}}\) from the set \(\mathrm{S}\) will leave the vertices unsecured and so \(\mathrm{S}\) will not be a secure dominating set. Therefore, \(\mathrm{S}\) should be of mimimum cardinality.

4 An application of the proposed algorithm

Graphical structures like bloom graphs \(G = (V, E)\) are significant to model a health care centre network with each vertex in \(V\) representing an area in the health care centre hub in a computer network, or processor in a computer system. Each edge in \(E\) denotes connections such as adjacent hubs or rooms in a health care centre network or adjacent processors in a system. Consider an example of \({\mathrm{B}}_{4, 6}\) as shown in Fig. 8. Each vertex in the graph or hubs in the health care network is a potential location for a hacker or a cyber-criminal to attack the health care computer network.

Mobile guards or detection sensors are to be positioned at certain vertices or locations, provided by the proposed algorithm to defend the health care centres from hackers (intruders). Placing the mobile guards at the locations given by the secure dominating set S defends the network for a single attack and this is accomplished with the minimum number of twelve guards or sensors for this twenty four vertices network (refer Fig. 8).

A detection sensor at a vertex \(v\) given by the LD set can detect intruders in adjacent areas and as well as vertex \(v\). Therefore, if a mobile guard is positioned at vertex \(v\), then that guard or the sensor can detect an attacker or intruder in \(N[v]\). To have some fault-tolerance in the system, it is also assumed that only detection devices that are in the closed neighbourhood of the intruder vertex can report, so there can be no false alarms. Placing the mobile guards at the locations given by the location dominating set S defends the network for a single attack and this is accomplished with the minimum resources.

5 Conclusion

The primary purpose of this paper is to propose that graph theory can be significantly applied in cyber security. In today’s healthcare world, most patient’s medical records are electronic, and those systems need to be monitored and maintained. But if a hospital’s network is not being well monitored then they impact patient care or confidentiality and can lead to lackluster healthcare. This article promotes the novel idea of applying graph theory for network monitoring in maintaining the security of patient information. The location domination, secure domination and edge cover problems in graphs are solved for blooms architecture and is shown that this research is beneficial in the security of health care systems. This research will also help minimize problems which frustrate and compromise the efficiency of overworked cyber security staff whose time is so valuable. This study can be extended to evaluate several other domination parameters such as roman domination, secure vertex cover domination and double domination for bloom networks and for topologies which are similar to bloom architecures.