Font Size: a A A

Research On Traffic Detection Method Of Medical Protocol Data Traffic Transmission Based On Traffic

Posted on:2022-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:Q G WuFull Text:PDF
GTID:2494306572469224Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of Internet,big data,and cloud computing technology,the informatization level of medical institutions is higher and higher.At the same time,leaking medical data without the approval of national regulators will bring security risks to the country and society.Therefore,the monitoring of medical protocol data transmission is critical.In this paper,the data flow collection method,the data flow reorganization method and the feature database storage method of the medical protocol are studied.In the research of data flow collection method of medical protocol,This paper proposes a multi-pattern matching algorithm based on feature pattern strings.This algorithm is more suitable for medical feature matching than traditional multi-pattern matching algorithms.There is no need to construct the failure function of the algorithm in the preprocessing process,which speeds up the preprocessing of the algorithm.The method avoids complex logic and does not affect the performance of the original algorithm.Experiments show that the multi-pattern matching algorithm based on the characteristic pattern string is due to the original method in the algorithm preprocessing process,and the experimental results show that the proposed method can recognize and collect the medical protocol data traffic and achieve the desired effect.In the research of medical protocol data reorganization method,This paper proposes a protocol analysis method based on word vector state transition in the research of the medical protocol data restoration method.This method is used to construct lexical unit for HL7 and provides item set closure and state transition function,which significantly improves the performance of HL7 protocol analysis..Theoretically,the time complexity of this algorithm is slower than string parsing,binary tree parsing,state machine parsing,and regular expression parsing.The experimental results show that the analysis speed of this analysis method is more than four times that of the open-source analysis library hl7apy..In collecting the medical protocol data flow,it is necessary to establish the medical protocol feature library.When the medical protocol feature library is managed,the medical protocol features may be transmitted in the network and cause leakage.,Therefore,to guarantee the confidentiality of the medical protocol feature database and in the aspect of data storage security protection,this paper proposes an attribute-based encryption method combining user revocation and attribute revocation and realizes the attribute based encryption based on the strategy of cipher user revocation and attribute revocation function.Finally,a medical protocol data transmission monitoring system is implemented in this paper.Based on the above research methods,the leakage situation of the collected medical data is analyzed.Establish the network topology of medical protocol data transmission,and it can detect the internal network port and find the available medical protocol data transmission port.This system can provide support for the flow monitoring of medical data.
Keywords/Search Tags:Traffic Acquisition, HL7, DICOM, CP-ABE, Attribute Revocation, User Revocation
PDF Full Text Request
Related items