Font Size: a A A

Research On Security Policy And Trust Evaluation Method Of Medical Devices Based On Software Definition

Posted on:2023-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:W M ChenFull Text:PDF
GTID:2532306782465494Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of software,network,hardware equipment and other technologies,medical equipment products are constantly being upgraded.The functions of the new generation of medical equipment products tend to be more complex,and the network requirements are more diversified.The traditional security protection strategy of equipment system based on border security protection is difficult to ensure the operation security and data security of equipment in a complex network environment.Therefore,designing a device configuration system that satisfies good usability,ensures safe and usable device operation,and protects the security and stability of device interaction data is a problem faced by all medical device manufacturers.This paper takes the security of traditional medical equipment as the background,combined with the popular concept of zero trust network,integrates and innovates in the security protection layout.Based on the static trust of traditional medical devices,a continuous trust evaluation mechanism is introduced,which is suitable for the current complex network.Safety protection of equipment in the environment.The core work of the paper includes the following aspects:1.Based on the principle of risk adaptation in zero-trust network security,design an intelligent and efficient intrusion identification mechanism,and classify normal traffic and abnormal traffic through an analysis engine with deep learning function.Complete attack detection,real-time monitoring and alerting of network security status to ensure continuous communication and reliable data transfer in enterprise medical devices.2.By identifying the risk items of device access traffic as the reliability source of the device trust evaluation mechanism,and then combining the success rate of device interaction,satisfaction and data consistency,etc.,conduct a comprehensive trust evaluation of the device.Based on the traditional equipment certificate authentication,data trust and device behavior trust are combined to realize a device trust evaluation model based on behavior and data,in order to deal with the uncertainty caused by complex communication channels and unstable equipment behavior.3.Under the guidance of the zero trust security principle,the traditional medical equipment configuration management system is upgraded and transformed,and then based on the security concepts such as behavioral security situational awareness,real-time monitoring of abnormal traffic,and dynamic trust assessment in the software-defined boundary,network traffic risks,equipment Trust and access control policies are integrated to realize the security and trustworthiness of medical device system access and medical device data.Through the research of this subject,the security concept of "building trust based on network boundary" in the security protection of traditional medical devices is improved,which establishes the foundation for the subsequent implementation of dynamic security strategy based on the trust degree of medical devices,and provides a new idea and method for medical devices to move towards zero trust network security.
Keywords/Search Tags:Medical Internet of things, zero trust, software definition boundary, intrusion identification, trust evaluation
PDF Full Text Request
Related items