Detection of Cyber-Attacks

  • Luis Ayala


Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours. They deliberately limit the amount of data they steal at any one-time and use common protocols like HTTP or SSL. Hackers also choose a logical pivot point to attack that allows them to spread their malware across the hospital network. The attention of medical equipment operators and the building maintenance engineers is critical to detection of unusual operations and they are usually the first to notice anomalies in equipment and system behavior.


Intrusion Detection System Trojan Horse Network Intrusion Detection System Antivirus Software Intrusion Prevention System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Luis Ayala 2016

Authors and Affiliations

  • Luis Ayala
    • 1
  1. 1.FredericksburgUSA

Personalised recommendations