Full Text

Research Article

Parameters to Consider for DDoS Attack Mitigation on Biomedical Devices in Healthcare


Abstract
The proliferation of connected biomedical devices in healthcare has introduced unprecedented vulnerabilities, including susceptibility to Distributed Denial of Service (DDoS) attacks. This paper reviews existing literature to identify critical parameters and considerations for mitigating DDoS attacks on biomedical devices in healthcare settings. Key factors explored include device characteristics, network infrastructure, mitigation techniques, regulatory compliance, and emerging challenges. By synthesizing current research and best practices, this review aims to provide healthcare practitioners and cybersecurity professionals with a comprehensive framework for protecting biomedical devices against DDoS attacks.

Keywords: Bio Devices, DDoS, IoMT, Content Delivery Networks, Incident Response, Compliance

1. Introduction
The inclusion of networked biomedical devices in healthcare systems has transformed patient care by enabling live monitoring and improved treatment options. Nevertheless, this interconnected nature also exposes these devices to cybersecurity risks, notably DDoS attacks, which have the potential to disrupt vital healthcare services and jeopardize patient safety1. Effectively addressing these threats necessitates a deep comprehension of the distinctive factors and complexities associated with biomedical devices within healthcare settings.


Figure
1:
DDoS Attack in a high-speed network scenario

·
Device Characteristics and Vulnerabilities:
Biomedical devices, crucial components in modern healthcare systems, exhibit specific characteristics that significantly impact their susceptibility to Distributed Denial of Service (DDoS) attacks3,6,10,13. Understanding these characteristics is essential for developing effective strategies to mitigate such threats.

1.1. Characteristics Influencing Susceptibility to DDoS Attacks

1.      Real-time Requirements:

Biomedical devices like infusion pumps or cardiac monitors operate in real-time environments where timely and continuous data transmission is critical for patient care.
·Impact of DDoS: DDoS attacks can disrupt the availability and reliability of these devices by flooding network channels or overwhelming communication protocols.
·Example: An infusion pump requires uninterrupted communication to deliver medications accurately. A DDoS attack that delays or interrupts data transmission could potentially affect patient safety.
2.      Resource Constraints:

Many biomedical devices are designed with limited computing resources such as processing power, memory, and bandwidth.
·Impact of DDoS: These constraints can limit their ability to handle or recover from sustained DDoS attacks. Devices may become unresponsive or fail to perform critical functions.
·Example: A wearable cardiac monitor with limited battery life and processing capabilities may struggle to maintain connectivity during a prolonged DDoS attack, affecting its ability to transmit vital data to healthcare providers.

3.Embedded Systems Security:

Biomedical devices often run on embedded systems, which are specialized computing systems designed to perform specific functions within constrained environments.
·Challenges: Updating firmware or applying security patches to embedded systems can be complex due to operational constraints (e.g., continuous operation requirements) or device lifecycles (e.g., long deployment periods without updates).
·Vulnerability to Exploitation: Without timely updates, these devices may have known vulnerabilities that malicious actors can exploit, including vulnerabilities exposed during DDoS attacks.
·Example: An MRI machine running on embedded systems may have firmware vulnerabilities that, if exploited during a DDoS attack, could compromise patient data integrity or even device functionality.

1.2. Mitigating DDoS Risks in Biomedical Devices
1.Network Segmentation and Monitoring:
·Strategy: Implementing network segmentation to isolate critical biomedical devices from less critical systems.
·Benefit: Reduces the impact of DDoS attacks by containing disruptions within segmented areas and allows for targeted monitoring and response.

2.Traffic Filtering and Rate Limiting:
·Strategy: Deploying traffic filtering mechanisms to identify and block malicious traffic patterns associated with DDoS attacks.
·Benefit: Protects biomedical devices by mitigating the effects of volumetric attacks and ensuring essential data transmission remains uninterrupted.

3.      Embedded Security Enhancements:
·Strategy: Enhancing embedded system security through rigorous vulnerability assessments, secure coding practices, and timely patch management.
·Benefit: Reduces the attack surface and strengthens device resilience against exploitation during DDoS attacks and other cybersecurity threats.

4.      Incident Response Planning:
·Strategy: Developing and testing incident response plans specifically tailored to DDoS scenarios affecting biomedical devices.

·Benefit: Enables prompt detection, containment, and recovery from DDoS incidents, minimizing disruption to patient care and system operations.

 5.      Education and Awareness:
·Strategy: Educating healthcare staff and device operators about cybersecurity risks and best practices for mitigating DDoS threats.
·Benefit: Enhances vigilance and readiness to respond effectively to potential DDoS attacks, promoting a culture of cybersecurity awareness across healthcare organizations.

In conclusion, the distinct characteristics of biomedical devices, including their real-time requirements, resource constraints, and embedded system security challenges, significantly influence their susceptibility to DDoS attacks. Addressing these challenges requires a multifaceted approach that combines technical solutions, operational protocols, and continuous vigilance to safeguard patient safety and maintain the integrity of healthcare delivery systems.

 2. Network Infrastructure Considerations
In the context of healthcare cybersecurity, protecting biomedical devices from Distributed Denial of Service (DDoS) attacks is critical to ensuring continuous and reliable patient care2,6,12,13.The network architecture that supports these devices plays a pivotal role in mitigating the impact of such attacks. Here, we delve into three key considerations for network infrastructure aimed at enhancing DDoS resilience in healthcare environments:

 2.1. Segmentation and Isolation
Biomedical devices, such as infusion pumps, patient monitors, and imaging systems, often operate on the same network as administrative and guest devices8,10. This mixed environment poses a significant risk where a compromised or flooded device can affect critical healthcare operations. Implementing segmentation involves dividing the network into smaller, isolated segments or VLANs (Virtual Local Area Networks).

Key practices include
1.Segmentation: Dividing the network into logical segments based on device type, function, or sensitivity level. For instance, separating biomedical devices from administrative computers and guest Wi-Fi networks.
2.Isolation: Placing critical biomedical devices in isolated segments with strict access controls and firewall rules. This isolation helps contain potential breaches and limits the spread of DDoS traffic within the network.
3.Access Control: Implementing access control lists (ACLs) and firewall rules to regulate traffic flow between network segments, ensuring that only necessary communication is allowed.

Segmentation and isolation strategies reduce the attack surface and mitigate the impact of DDoS attacks by limiting their propagation and isolating affected devices.

2.2. Redundancy and Scalability
Ensuring network redundancy and scalability is crucial for maintaining service availability during DDoS attacks, which often flood network links and overwhelm infrastructure capacity9.

Key practices include
1.Redundant Network Paths: Designing networks with multiple paths and redundant links to ensure that if one path is disrupted by a DDoS attack, traffic can still flow through alternative routes. Redundancy reduces the likelihood of complete service outage.
2.Load Balancing: Implementing load balancing mechanisms to distribute incoming traffic across multiple servers or network resources. This distributes the impact of DDoS attacks and improves overall system resilience.
3.Scalable Infrastructure: Designing network infrastructure that can dynamically scale resources, such as bandwidth and server capacity, to accommodate increased traffic during an attack. Cloud-based services and scalable architectures are often leveraged for this purpose.

Redundancy and scalability strategies ensure that critical healthcare services remain accessible and operational even under sustained DDoS attack conditions.

2.3. Traffic Monitoring and Analysis

Effective detection of DDoS attacks requires continuous monitoring of network traffic and proactive analysis to identify anomalies indicative of attack patterns7.

Key practices include
1.Intrusion Detection Systems (IDS): Deploying IDS sensors at critical points within the network to monitor incoming and outgoing traffic for suspicious patterns or deviations from normal behavior. IDS systems can detect known attack signatures and anomalies in traffic volume or patterns.
2.Network Traffic Analysis Tools: Utilizing tools like NetFlow analyzers, packet sniffers (e.g., Wireshark), and SIEM platforms to capture, analyze, and visualize network traffic. These tools provide insights into traffic patterns, bandwidth utilization, and potential DDoS activity.
3. Automated Response Mechanisms: Integrating automated response mechanisms within IDS or SIEM platforms to initiate protective measures automatically when DDoS attacks are detected. This may include traffic redirection, firewall rule adjustments, or alert notifications to security teams.

By monitoring and analyzing network traffic in real-time, healthcare organizations can detect and mitigate DDoS attacks swiftly, minimizing the impact on critical biomedical devices and ensuring uninterrupted patient care.

 

Figure 2: Network Traffic Type and Characteristics

Incorporating robust network infrastructure considerations such as segmentation, redundancy, scalability, and traffic monitoring is essential for effective DDoS mitigation in healthcare environments. These measures not only bolster cybersecurity defenses but also safeguard the availability and reliability of biomedical devices crucial to patient safety and healthcare delivery. Implementing these strategies requires a comprehensive understanding of network architecture, cybersecurity best practices, and regulatory compliance to mitigate the evolving threat landscape of DDoS attacks in healthcare.

 3. Mitigation Techniques
Biomedical devices are integral to modern healthcare, enabling critical patient care through network connectivity. However, their connectivity also exposes them to cybersecurity threats, including Distributed Denial of Service (DDoS) attacks. Effective mitigation strategies are essential to ensure the reliable operation of these devices, safeguarding patient health and data integrity1,4,5,10,12. This detailed overview explores pivotal approaches for defending biomedical devices against DDoS attacks.
3.1       Rate limiting and filtering
Rate limiting and filtering involve setting thresholds and rules to control network traffic, ensuring that only legitimate requests are processed by biomedical devices. This approach mitigates the impact of DDoS attacks by preventing devices from being overwhelmed by excessive traffic.

 Key Techniques
1.Traffic Filtering Rules: Define specific rules based on IP addresses, protocols, and traffic patterns to filter out known malicious traffic. This can be done using firewalls, intrusion prevention systems (IPS), and network security devices.
2.Threshold Limits: Set limits on the number of requests a device can handle per second. Requests exceeding these limits are dropped, preventing devices from being overloaded. This can be implemented using rate-limiting tools like iptables or software- defined networking (SDN) controllers.
3.Access Control Lists (ACLs): Implement ACLs to restrict access to biomedical devices to trusted IP addresses or networks. ACLs can be configured on routers and switches to enforce these restrictions.

Figure 3: Packet Speed Category

 Benefits

1.Reduces the likelihood of overwhelming biomedical devices with excessive traffic, preserving their operational integrity.
2.Ensures that critical medical applications remain responsive and available during an attack.
3.Helps maintain service availability by blocking malicious traffic at the network perimeter, reducing the load on internal networks and devices.

4. 2 Cloud-Based Protection Services
Cloud-based DDoS protection services offer scalable and robust solutions to mitigate large-scale DDoS attacks. These services absorb and filter attack traffic before it reaches biomedical devices, leveraging the extensive resources of cloud infrastructure.

Key Services
1.Traffic Scrubbing Centers: Divert traffic through scrubbing centers that filter out malicious packets, allowing only clean traffic to reach the devices. This service can be provided by cloud security vendors like AWS Shield or Cloudflare.
2.Content Delivery Networks (CDNs): Utilize CDNs to distribute traffic across a network of servers, reducing the impact of DDoS attacks on any single point. CDNs also improve performance by caching content closer to end-users.
3.Elastic Scaling: Leverage cloud infrastructure to dynamically scale resources in response to traffic spikes. This ensures continuous operation by allocating additional resources as needed during an attack.

 Benefits
1.Provides robust protection against large-scale DDoS attacks that exceed the capacity of on-premises defenses.
2.Enhances the availability and performance of biomedical devices by offloading attack traffic to the cloud.
3.Offers automated and adaptive protection, reducing the need for constant manual intervention and allowing healthcare IT staff to focus on other critical tasks.

 4.1. Behavioral Analysis
Behavioral analysis involves using machine learning algorithms to monitor and analyze the behavior of biomedical devices, detecting anomalies that may indicate a DDoS attack. This proactive approach helps in identifying and mitigating sophisticated attack vectors.

 Key Techniques
1.Baseline Behavior Modeling: Establish normal behavior patterns for biomedical devices, including typical traffic volumes, communication patterns, and usage metrics. This baseline is critical for identifying deviations that may signal an attack.
2.Anomaly Detection Algorithms: Employ machine learning models to identify deviations from established baselines. These algorithms can detect unusual spikes in traffic or abnormal request patterns indicative of a DDoS attack.
3.Real-time Monitoring: Continuously monitor device behavior in real-time, providing instant alerts and automated responses to detected anomalies. Real-time monitoring can be achieved through network monitoring tools and SIEM (Security Information and Event Management) systems.

Benefits
1.Enables early detection of sophisticated and evolving DDoS attack vectors that may bypass traditional defenses.
2.Reduces false positives by distinguishing between legitimate traffic surges and actual attack traffic, minimizing unnecessary interventions.
3.Enhances the overall security posture of biomedical devices by continuously adapting to new threats and attack patterns.

Implementing a combination of rate limiting and filtering, cloud-based protection services, and behavioral analysis provides a comprehensive defense against DDoS attacks targeting biomedical devices. These strategies ensure the continuous operation and reliability of critical healthcare infrastructure, protecting patient safety and maintaining data integrity. In the face of increasingly sophisticated cyber threats, adopting tailored mitigation approaches is crucial for the healthcare sector. By leveraging these advanced techniques, healthcare organizations can enhance their cybersecurity resilience, ensuring the uninterrupted delivery of essential medical services

 5. Regulatory and Compliance Requirements
In healthcare, cybersecurity is critical due to the sensitive nature of patient data and the essential services provided. Regulatory frameworks like the Health Insurance Portability and Accountability Act (HIPAA) in the United States enforce strict requirements for protecting patient information2,14. This section examines how compliance with these regulations affects DDoS mitigation strategies, emphasizing data privacy, confidentiality, incident response, and reporting.

 5.1       Data Privacy and Confidentiality

5.1.1. Ensuring patient data confidentiality and integrity during DDoS attacks: DDoS attacks can overwhelm healthcare systems, leading to potential disruptions in service and exposing vulnerabilities that could be exploited to compromise patient data confidentiality and integrity3,15. Ensuring the protection of patient data during such attacks is crucial for maintaining trust and compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act).

5.1.2. Strategies to ensure data confidentiality and integrity
1.Robust Encryption Protocols: Data at Rest: Encrypt patient data stored in databases and file systems using strong encryption algorithms (e.g., AES-256). This ensures that even if an attacker gains access to the storage, the data remains unreadable.
2. Data in Transit: Implement end-to-end encryption for data transmitted over networks using protocols like TLS (Transport Layer Security). This prevents interception and unauthorized access during data transfer.

5.2. Network Segmentation
1.Isolate Critical Systems: Segment the network to isolate critical systems that store or process patient data from other parts of the network. Use VLANs (Virtual Local Area Networks) and firewalls to control and monitor traffic between segments.
2.Implement Demilitarized Zones (DMZs): Use DMZs to host public-facing services while keeping internal systems with sensitive data behind additional layers of security.

 5.3. Intrusion Detection and Prevention Systems (IDPS)
1.Deploy IDPS to monitor network traffic for signs of intrusion and abnormal activity. These systems can help detect attempts to exploit vulnerabilities during a DDoS attack.
2.Use anomaly detection algorithms to identify patterns that deviate from normal behavior, which may indicate an ongoing attack.

5.4. Regular Security Audits and Vulnerability Assessments
1.Conduct regular security audits to identify and remediate vulnerabilities in systems and applications. This includes patch management to ensure software is up-to-date with the latest security fixes.
2.Perform penetration testing to simulate DDoS attacks and other threats, allowing you to identify weaknesses and improve defenses.

5.5. Data Backup and Recovery Plans
1.Maintain regular backups of patient data and ensure they are stored securely, preferably in an offsite location. This helps in quick recovery in case of data loss or corruption during an attack.
2.Test backup and recovery procedures regularly to ensure data can be restored promptly and accurately.

5.6. Access Controls and Monitoring
1.Implement strict access controls to limit who can access patient data. Use multi-factor authentication (MFA) and role-based access control (RBAC) to enhance security.
2. Monitor access logs and audit trails to detect unauthorized access attempts and respond promptly.

6. Incident Response and Reporting

A well-defined incident response protocol is essential for effectively managing DDoS attacks and minimizing their impact on healthcare operations14.Timely reporting of incidents ensures compliance with legal and regulatory requirements and helps in coordinating response efforts.

Key components of incident response protocols

1. Incident Response Plan (IRP)
1.Preparation: Develop and maintain an IRP that outlines roles, responsibilities, and procedures for responding to DDoS attacks. Ensure that all staff are trained on the IRP and conduct regular drills to test readiness.
2. Identification: Define criteria for identifying and classifying DDoS attacks. Use monitoring tools and alerts to detect suspicious activity early.

 2. Incident Handling Procedures
1.Containment: Implement immediate measures to contain the attack and prevent further damage. This may include rerouting traffic, blocking malicious IP addresses, and activating DDoS protection services.
2.Eradication: Identify and eliminate the root cause of the attack. This may involve applying patches, updating configurations, or removing malicious code.
3.Recovery: Restore affected systems and services to normal operation. Verify that all systems are secure and functioning correctly before resuming full operations.

 3. Communication and Coordination
1.Internal Communication: Establish clear communication channels within the organization to keep all stakeholders informed during an incident. This includes IT staff, management, and affected departments.
2.External Communication: Coordinate with external partners, such as ISPs, DDoS protection services, and law enforcement, to manage the attack. Develop templates for notifying patients and regulatory bodies as required.

 4. Timely Reporting
1.Regulatory Reporting: Understand and comply with legal requirements for reporting security incidents, such as HIPAA breach notification rules. Ensure reports are filed within mandated timeframes.
2. Internal Reporting: Document all actions taken during the incident, including timelines, decisions, and communications. Conduct a post-incident review to identify lessons learned and improve the IRP.

5. Continuous Improvement
1.Post-Incident Analysis: After resolving an incident, conduct a thorough analysis to understand what happened, why it happened, and how it can be prevented in the future. Update the IRP based on these insights.
2.Regular Training and Drills: Provide ongoing training for staff and conduct regular drills to ensure preparedness. Update training materials and protocols based on the latest threat intelligence and best practices.

 Ensuring patient data confidentiality and integrity during DDoS attacks and establishing robust incident response protocols are critical for maintaining the security and resilience of healthcare systems. By integrating encryption, network segmentation, IDPS, regular audits, access controls, and comprehensive incident response plans, healthcare organizations can effectively mitigate the impact of DDoS attacks and protect sensitive patient data. Timely reporting and continuous improvement further enhance the ability to respond to and recover from such incidents, ensuring compliance and maintaining patient trust.

 7. Emerging Challenges and Future Directions
The constantly changing cybersecurity landscape in healthcare presents ongoing challenges and requires proactive measures to protect against Distributed Denial of Service (DDoS) attacks. This section explores the emerging challenges and future directions for DDoS mitigation, focusing on key areas such as the growth of the Internet of Medical Things (IoMT)1,4,11, the importance of security awareness and training, and the necessity for interoperability and standards.

 7.1. IoMT Expansion
The growth of Internet of Medical Things (IoMT) devices brings new attack vectors and complexities in DDoS mitigation. IoMT includes interconnected medical devices and applications that collect, process, and transmit health data over the internet, such as wearable health monitors, smart infusion pumps, connected imaging systems, and remote patient monitoring devices18.

 Challenges
1.Increased Attack Surface: Every additional IoMT device represents a potential entry point for attackers, and the vast number and variety of these devices make securing the entire ecosystem difficult.
2.Device Vulnerabilities: Many IoMT devices have limited processing power and memory, making it hard to implement robust security features. They often run outdated software, leaving them vulnerable to known exploits.
3.Complex Network Architectures: IoMT devices operate across different networks and platforms, complicating the task of monitoring and managing security throughout the system.
4.Data Sensitivity: IoMT devices handle highly sensitive patient data, making them attractive targets for attackers looking to disrupt services or steal information.

Future Directions
1.Enhanced Security Protocols: Developing and deploying advanced security protocols specifically designed for IoMT devices, such as encryption, secure boot processes, and regular firmware updates.
2.AI and Machine Learning: Utilizing artificial intelligence and machine learning to detect and respond to unusual behavior in IoMT devices in real- time.
3.Network Segmentation: Implementing network segmentation to isolate IoMT devices from critical infrastructure, reducing the potential impact of a DDoS attack.

7.2. Security Awareness and Training
Increasing cybersecurity awareness and training among healthcare professionals and device users is crucial for effective threat mitigation. Human error and lack of awareness often contribute to the success of cyberattacks, including DDoS attacks17.

 Challenges
1.Low Awareness Levels: Healthcare professionals may not fully understand the cybersecurity risks associated with the devices and systems they use.
2.Busy Schedules: The demanding nature of healthcare work can make it hard for professionals to allocate time for cybersecurity training.
3.Evolving Threat Landscape: As cybersecurity threats constantly evolve, ongoing education and training are necessary to keep up with the latest threats and mitigation strategies.

Future Directions
1.Comprehensive Training Programs: Creating comprehensive training programs that are regularly updated to cover the latest threats and best practices in cybersecurity.
2. Interactive and Engaging Methods: Using interactive and engaging training methods, such as simulations and gamified learning, to improve retention and application of cybersecurity knowledge.
3.Policy Development: Developing clear policies and procedures for cybersecurity, including regular drills and exercises to reinforce training.

 7.3. Interoperability and Standards
Establishing interoperable security standards and protocols is vital for ensuring robust DDoS resilience across diverse biomedical devices and platforms16. Interoperability allows different systems and devices to work together seamlessly, facilitating comprehensive security management.

Challenges
1.Diverse Ecosystem: The healthcare ecosystem includes a wide range of devices, systems, and vendors, each with unique security practices and protocols.
2.Lack of Standardization: The absence of universally accepted security standards makes it difficult to implement consistent security measures across all devices and systems.
3.Regulatory Compliance: Ensuring compliance with various regulatory requirements (e.g., HIPAA, GDPR) adds complexity to achieving interoperability.

 Future Directions
1.Standard Development: Collaborating with industry stakeholders to create and adopt universal security standards and protocols for IoMT devices and healthcare systems.
2.Regulatory Support: Working with regulatory bodies to ensure new standards align with existing regulations and provide clear implementation guidelines.
3. Open-Source Solutions: Encouraging the use of open-source security solutions that can be widely adopted and customized to meet the specific needs of different healthcare environments.

 The healthcare sector faces significant challenges in mitigating DDoS attacks due to the expansion of IoMT, the need for increased security awareness, and the requirement for interoperable standards. Addressing these challenges necessitates a multifaceted approach that includes technological advancements, continuous education, and collaborative efforts to develop and implement universal security protocols. By proactively tackling these emerging challenges, healthcare organizations can enhance their resilience against DDoS attacks and ensure the uninterrupted delivery of critical healthcare services.

 8. Conclusion
Protecting biomedical devices in healthcare from DDoS attacks requires a multifaceted approach encompassing device-specific considerations, network infrastructure resilience, regulatory compliance, and proactive mitigation strategies5,8,9.This literature review consolidates current knowledge and identifies critical parameters to guide healthcare organizations and cybersecurity professionals in safeguarding patient safety and maintaining service continuity amidst evolving cyber threats.

 9. References

  1.     Bhutia NT, Verma H, Chauhan N, Awasthi LK. DDoS Attacks Detection in ‘Internet of Medical Things’ using machine learning techniques. 2022 IEEE Conference on interdisciplinary approaches in technology and management for social innovation 2022; 1-6.
  2. Zlatolas LM, Welzer T, Lhotska L. Data breaches in healthcare: security mechanisms for attack mitigation. Springer 2024.
  3. Martínez LA, Perez MG, Ruiz-Martinez A. A comprehensive review of the state-of-the-art on security and privacy issues in healthcare. ACM Computing Surveys. 2022;55: 1-38.
  4. EBU Tech. Mitigation of Distributed Denial of Service (DDoS) Attacks. Geneva 2015.
  5. Ennemoser FJ, Sattler P, Zirngibl J. State of the Art of DDoS Mitigation Techniques. University of Munich 2022.
  6. American’s Cyber Defense Agency. Understanding and Responding to Distributed Denial-of-Service Attacks. ACDA 2024.
  7. Both T. Design principles for network distributed denial of service defense. Lulea University of Technology 2022.
  8. Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H. Three tier network architecture to mitigate ddos attacks on hybrid cloud environments. Proceedings of the second international conference on information and communication technology for competitive strategies 2016;109: 1-7.
  9. Nawaz G, Junaid M, Akhunzada A, et al. Detecting and mitigating DDOS attacks in SDNs using deep neural network. Computers, Materials  Continua 2023;77: 2157-2178.
  10. Singh C, Jain AK. A comprehensive survey on DDoS attacks detection & mitigation in SDN-IoT network. e-Prime-Advances in Electrical Engineering, Electronics and Energy 2024;8.
  11. Haseeb-Ur-Rehman RMA, Aman AHM, Hasan MK, et al. High-Speed network DDoS attack detection: A survey. Sensors 2023;23: 6850.
  12. Adedeji KB, Abu-Mahfouz AM, Kurien, AM. DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. J Sens Actuator Netw 2023;12: 51.
  13. Mishra N, Singh RK, Yadav SK. Detection of DDoS vulnerability in cloud computing using the perplexed bayes classifier. Comput Intell Neurosci 2022;2022: 9151847.
  14. https://www.hhs.gov/sites/default/files/healthcare-sector-ddos-guide- analyst-tlpclear.pdf
  15. Basil NN, Ambe S, Ekhator C, Fonkem E. Health records database and inherent security concerns: A review of the literature. Cureus 2022;14: 30168.
  16. Kwon J, Johnson ME.  Security practices and regulatory compliance in the healthcare industry. J Am Med Inform Assoc 2013;20: 44-51.
  17. Valdovinos A, Pérez-Diaz JA, Choo K-KR, Botero JF. Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions. J Network Comp Appl 2021;187: 103093.
  18. Saharan S, Gupta V. Prevention of DDoS attacks: A comprehensive review and future directions. Inform Security J: A Global Perspective 2024; 1-33.