4 research outputs found

    A parallelized database damage assessment approach after cyberattack for healthcare systems

    Get PDF
    In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+Nˆ3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory

    A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

    No full text
    In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N^3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory

    Multi-Disciplinary Monitoring Networks for Mesoscale Underground Experiments: Advances in the Bedretto Reservoir Project

    No full text
    The Bedretto Underground Laboratory for Geosciences and Geoenergies (BULGG) allows the implementation of hectometer (>100 m) scale in situ experiments to study ambitious research questions. The first experiment on hectometer scale is the Bedretto Reservoir Project (BRP), which studies geothermal exploration. Compared with decameter scale experiments, the financial and organizational costs are significantly increased in hectometer scale experiments and the implementation of high-resolution monitoring comes with considerable risks. We discuss in detail risks for monitoring equipment in hectometer scale experiments and introduce the BRP monitoring network, a multi-component monitoring system combining sensors from seismology, applied geophysics, hydrology, and geomechanics. The multi-sensor network is installed inside long boreholes (up to 300 m length), drilled from the Bedretto tunnel. Boreholes are sealed with a purpose-made cementing system to reach (as far as possible) rock integrity within the experiment volume. The approach incorporates different sensor types, namely, piezoelectric accelerometers, in situ acoustic emission (AE) sensors, fiber-optic cables for distributed acoustic sensing (DAS), distributed strain sensing (DSS) and distributed temperature sensing (DTS), fiber Bragg grating (FBG) sensors, geophones, ultrasonic transmitters, and pore pressure sensors. The network was realized after intense technical development, including the development of the following key elements: rotatable centralizer with integrated cable clamp, multi-sensor in situ AE sensor chain, and cementable tube pore pressure sensor.ISSN:1424-822
    corecore