345
Views
16
CrossRef citations to date
0
Altmetric
Original Research

Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon, , ORCID Icon, ORCID Icon & ORCID Icon show all
Pages 355-371 | Published online: 28 Apr 2020

Abstract

Introduction

The imperative need for ensuring optimal security of healthcare web applications cannot be overstated. Security practitioners are consistently working at improvising on techniques to maximise security along with the longevity of healthcare web applications. In this league, it has been observed that assessment of security risks through soft computing techniques during the development of web application can enhance the security of healthcare web applications to a great extent.

Methods

This study proposes the identification of security risks and their assessment during the development of the web application through adaptive neuro-fuzzy inference system (ANFIS). In this article, firstly, the security risk factors involved during healthcare web application development have been identified. Thereafter, these security risks have been evaluated by using the ANFIS technique. This research also proposes a fuzzy regression model.

Results

The results have been compared with those of ANFIS, and the ANFIS model is found to be more acceptable for the estimation of security risks during the healthcare web application development.

Conclusion

The proposed approach can be applied by the healthcare web application developers and experts to avoid the security risk factors during healthcare web application development for enhancing the healthcare data security.

Introduction

Evaluating and mitigating the security risks in healthcare web applications has become the prime concern of researchers and security practitioners around the world. Several statistics have revealed that the instances of data breaches in the context of healthcare have jeopardised both the patients and the hospital management systems. Pilfering and poaching of any data is a grave crime; more so when the highly classified information of patient’s medical report is breached and tampered with, it can result in fatal consequences as it would affect the patient’s treatment procedures. Dedicated efforts are being made to enhance healthcare web application security in order to increase the accountability and determine whether and to what extent our investments in products and processes are making our systems more secure. In most of the cases, ‘compromising on designs’ has been observed to be one of the major security risks.Citation1 In order to reduce the “time-to-market”, the developers tend to rush the designing phase. As a result, security is not often engineered into the product and is also not the elemental concern during the developmental process of the web applications. This norm presents before us a dire need to consider security during early developmental stages. According to Gary McGraw,Citation2 the three pillars of the application security are risk management framework, Touchpoints and knowledge. So, if one wants to upgrade security, risk management is one of the fundamental approaches to be emphasized upon. Risk management helps in proper planning of the possible security risks at the time of application development, thereby helping the developers in prioritizing risks and taking proactive measures to avoid them.Citation3

There are several risk assessment approaches; however, each is imbued with a set of limitations that often hamper the efforts of security practitioners. Different risk assessment approaches include preliminary hazard analysis (PHA), failure mode and effects analysis (FMEA), failure mode, effects and criticality analysis (FMECA), event trees, fault tree analysis (FTA), critical incident technique, decision tree analysis (DTA) and probabilistic risk assessment.Citation4 PHA is deployed in an organization to determine the risks associated with events that occurred in the past. FMEA is not applicable at the initial phases of development,Citation5 while the FMECA can only be performed after performing FMEA, and FTA is mostly considered as a reactive approach. The Critical Incident Technique is not very illustrative.Citation6 DTA results are dependent upon the planning and decisions; therefore it is prone to errors.Citation7 ANFIS, on the other hand, is a hybrid system consisting of both fuzzy logic and neural networks. Being a hybrid system, it contains the connectionism and adaptivity of neural networks with the human-like reasoning of a fuzzy system. At present, it is being deployed in several medical prognosis and treatment procedures. For instance, ANFIS technique is used to: determine the blood sugar levels of a diabetic personCitation8 predict the duration of stay in ICU at the time of cardiac arrestCitation9 assure security in web-based neuroscience applications;Citation10 predict chronic kidney diseaseCitation11 and assess the risk in software projects which find their application in healthcare scenario.Citation12 The empirical study undertaken in this research endeavour also found that the proposed ANFIS provides a better estimation of the security risks at early developmental phases.

The paper starts with the problem formulation section followed by the research contributions made by the authors. The next section discusses the various studies conducted in this domain and then, the methodology for security risk evaluation during secure healthcare web application development has been discussed in detail. Further, the security risk factors of healthcare web application identified at design phase based on literature review and experts' suggestions are mentioned. Next section enlists the empirical aspects and the findings. Finally, the obtained results are discussed followed by the conclusion of the research work. 

Problem Formulation

Risk may be defined as the potential for loss or damage when a threat exploits vulnerability.Citation13 For risk management, developers usually rely upon understanding and experience and do not apply proper risk management mechanisms. The need for the risk management can only be judged if one gets to know the extent of severity of the occurrence of any event. As per this research endeavour, the main concern of the researchers is to focus on the “security” risks that may affect the security of a healthcare web application. Healthcare data, being sensitive in nature, may lead to serious security issues. The healthcare information security breaches in 2016 have affected more than 27 million patients globally.Citation14 With an enormous increase in digitization, the healthcare stakeholders are largely dependent upon the Internet-enabled applications for their health. The demand for a secure application is thus the top priority for them. Assessing security risks at the design phase will nip the security risks in the bud and help in the development of a secure application. Therefore, as the first priority, the researchers of the present study have identified the security risks at the design phase by discussing with the experts. Thereafter, the impact of these risk factors has been gauged through ANFIS.

Research Contributions

There are many classifications for security risk management in healthcare web application development. The key levels are: Literature review; Security Risk Identification; Security Risk Analysis, Security Risk Assessment; Security Risk Action; Review and revision.Citation15 The authors have also followed a similar workflow in this research work. Initially, the security risks existing at the design level have been selected through experts’ suggestions from the Common Weaknesses Enumeration (CWE) list.Citation16 Further, the given risks have been quantitatively analysed through an adaptive neuro-fuzzy inference system (ANFIS) technique. Based on the above discussion, various research contributions made by the authors are as follows:

  1. The authors have identified the different security risks that may exist during the early developmental phases of healthcare web application. Experts’ opinions have been collated for compiling this list.

  2. An adaptive neuro-fuzzy technique for security risk evaluation of web healthcare applications is proposed.

  3. The different security risks are evaluated through the proposed ANFIS technique.

  4. The estimation is validated with the help of fuzzy regression modelling .

Related Work

Several noteworthy research initiatives have been undertaken in the context of security risk management and this domain continues to be the foci of the security experts and researchers.Citation17 However, the quantification of the security risk factors through the previous approaches is extremely challenging.Citation18,Citation19 There are several studies that have implemented the neuro-fuzzy technique for estimating the results. For example, Wang et alCitation20 have stated that for assessing the actual security of any healthcare web application, proper quantification is mandatory which itself is a very complex procedure. Praynlin et alCitation21 and Sangaiah et alCitation22 divided the neuro-fuzzy into two major types of fuzzy models which are required for assessment of security risks. The models propositioned were traditional models and conceptual models based on fuzzy sets analysis.

Sonia et alCitation23 proposed a method for security risk evaluation. With the help of fuzzy numbers, the researchers have measured the security risks of healthcare web application. For example, Ming-Chang Lee has used sets during management of security risk.Citation24 Dark et alCitation25 have applied the fuzzy set theory that evaluates the cost and time performance, security risk management and utilization of healthcare web application development scheme. Shedden et alCitation26 utilized the structure of security risk for qualitative assessment of security risk of healthcare web application. Guan et alCitation27 proposed a fuzzy-based procedure for security risk evaluation and have used drawings for designing the security risk models.

Some researchers have also used the fuzzy inference idea for stating the unpredictability and analytic hierarchy process technique for making structure. Furthermore, they have used this structure for ranking the alternative risk factors security during the healthcare web application development.Citation28 Some have made use of assembled fuzzy based decision-making method for security risk assessment,Citation29 while others have used the fuzzy analytic hierarchy process technique for assessment of security risks.Citation30 However, these research studies also have their share of flaws. Most of these studies do not consider the inaccuracy of the experts while citing their opinions. Existing models of security risk analysis for secure healthcare web application development are limited. Nowadays, many decision-making problems remain debatable for the developers.Citation18Citation20

The nature of development of healthcare web application is accompanied by imposed uncertainties which largely depend upon a person’s thought process about the security risk management during healthcare web application development. In continuation with the above issues, Jang et alCitation31 proposed the introductory study in neural network in the field of security risk in 1993. The researchers used the neural network for identification of security risk. van Staalduinen et alCitation32 have applied a network of neural fuzzy for evaluation of security risk during secure healthcare web application development. Gao et alCitation33 proposed a novel method for security risk evaluation that makes use of K-means clustering algorithm.

From the above discussion, it is obvious that the implementation of the hybrid neuro-fuzzy technique is expected to provide a better estimation of security risk in the early phases of development of a web application. The use of this technique would reduce the cost and effort invested in developing the security characteristics in a given healthcare web application. Therefore, the researchers have proposed a risk management hybrid scheme with the connectivity of neural networks and human-like behaviour of a fuzzy system, so as to reduce the security risks at the early stages of the healthcare web application development life cycle.

Methodology

This research work aims at determining the systematic ranking of security risk factors more efficiently than the various existing methods. The approach is also intended to help the developers in executing sensitivity analysis for security risk factors. The accuracy is also claimed to be high. The methodology is as follows:

Security risk factors identification: Locating the security risks at design phase of healthcare web application development.

Data collection: Collecting the essential data related to the identified security risk factors.

Security risk evaluation: By implementing ANFIS.

Performance evaluation: Estimating the proposed ANFIS.

Validation: Validating the acquired results.

maps the step-by-step methodology undertaken for this study. The first step involves the identification of the security risk factors with the help of the experts’ suggestions. As per the severity level of these risk factors, a Common Weaknesses Enumeration (CWE), a list of the common healthcare web application security weaknesses is developed. Secondly, the data for risk analysis are collected with respect to the identified security risks through the questionnaire. Then, the security risk is evaluated through ANFIS. Thereafter, the performance of the proposed ANFIS is estimated and lastly, the results obtained are validated with the help of the fuzzy multiple regression modelling.

Figure 1 Methodology adopted.

Figure 1 Methodology adopted.

The results obtained through ANFIS are compared with those obtained from Fuzzy Multiple Regression Modelling. Multiple regression equation for each security risk factor is then calculated in order to estimate the association between the results and the independent variables. The correlative results obtained thereby prove that ANFIS, the hybrid learning approach, may be considered as highly efficient and precise in estimating the healthcare web application security risk at the early stages of web development.

Security Risk Factor Identification

In the proposed research work, the security risks that exist at the design phase of healthcare web application development life cycle have been identified.Citation16 For this, the researchers garnered the suggestions of the experts who cited the major causes of security risks that are likely to be introduced at the design phase. consists of eight significant security risks with their detailed description and related security factor.

Table 1 Security Risk Factors at Design Phase

Empirical Study

An empirical study is the collection and analysis of primary data based on direct observations. Moreover, the empirical approach may be regarded as a way to give quantified evidence to the usefulness of the methodology. The researchers have therefore adopted such a study so as to quantify the observations and legitimize the efforts devoted to accomplish the intended objective. Thus, this section of research has been subdivided into the following sections which are enunciated below.

Data Collection

The knowledge database includes knowledge of academia experts and cybersecurity professionals from the industry.Citation42 The questionnaires were distributed amongst 100 experts having experience of about 10 years and finally, 51 valid questionnaires were collected on the basis of completeness and precision (Appendix). As the knowledge obtained was usually linguistic in nature, a pre-processing was required in order to convert this knowledge to numerical data. It has been emphasized by various researchers that what cannot be measured, cannot be controlled.Citation43 Hence, meticulous calculations have been enlisted in this study to elicit corroborative results. The matrix representation of severity with respect to the probability of the security risk factors is in . For calculating the magnitude of security risk for each factor with respect to the linguistic variable, authors have used the fuzzy values table created from Chang and Lee.Citation44 represents the fuzzified numeric values of security risks.

Table 2 Matrix Representation of Security Risk

Table 3 Linguistic and Fuzzy Values

Further, the triangular fuzzy numbers (TFNs) are used for converting the linguistic values into the numerical values. In addition, shows the linguistic values that are in the form of semantic variables including probability of occurrence; severity and security risk. Finally, after the conversion of the linguistic variables into TFNs, the Centre of Area (COA) method has been applied for de-fuzzifying the TFN into corresponding values of BNP, where BNP is the best non-fuzzy performance of the security risk and F= (fl, fm, fh) shows a TFN and is evaluated using equation 1.

(1)

The detailed description of these techniques has been illustrated further. The data based on the opinions of the first expert are presented in . helps in quantifying the security risk factor (third column of ). The arithmetic values including probability of occurrence; severity and size of every factor of security risk can be evaluated with the collective help of and BNP method.

Table 4 Probability and Severity Given by Expert 1 for Each Security Risk Factor

The same procedure is then repeated for 51 experts, and the knowledge database is created. Here, the authors have assumed that the data is normally distributed. We know that if the data are assumed to be normally distributed, ie, N (0, σ2), its histogram should have a plot like normal distribution with mean zero.

represents the normal probability illustration and the probability illustration of residuals for “risk probability” and is about the normal probability and residuals diagrams for “risk severity” for the first factor “ACPVPM”. The plots clearly represent that the opinions of experts convey normal distribution. A similar method has been implemented on the other seven security risk factors. The results in all cases depict that the observations are normally distributed.

Figure 2 Normal probability plot for probability of security risk occurrence.

Figure 2 Normal probability plot for probability of security risk occurrence.

Figure 3 Normal probability plot for severity of security risk.

Figure 3 Normal probability plot for severity of security risk.

Security Risk Assessment and Prediction Through Fuzzy Regression Modelling

The authors have used the Multiple Regression Model as each of the inputs is found to be less correlated with the output variable. With the help of MINITAB 18, the step-wise regression technique evaluated the first security risk factor of “ACPVPM” during the healthcare web application development.Citation45 represents the recommended fuzzy system for assessment of security risk.

Figure 4 Security risk assessment using the proposed fuzzy system.

Figure 4 Security risk assessment using the proposed fuzzy system.

Security Risk Assessment and Prediction by ANFIS

As the quantification helps in analysing the effect of the risk outcomes on the security of the healthcare web application, we can say that the magnitude of each security risk is a function of probability of its occurrence.Citation42 Therefore, for the procedure of fuzzy systems design through neural network, the researchers have considered the probability of security risk occurrence and its severity as the inputs, and the magnitude of security risk as the output of system.

shows the diagrammatic representation of this fuzzy system with two inputs and one output.

Figure 5 Layered structure of neuro-fuzzy system.

Figure 5 Layered structure of neuro-fuzzy system.

Linear relation is used between these inputs; this is given in the equations (2) and (3):

(2)
(3)

where A1, A2, B1 and B2 are the membership functions of each of the inputs of x and y; and p1, p2, q1, q2, r1 and r2 are the linear parameters of then-part of the system.

ANFIS consists of five different layers that have their own respective significances. The nodes in the first and fourth layer are meant to adapt to the function parameter while every node in the second, third and the fifth layer is non-adaptive in nature.Citation45 The design of these systems is based on the information that system parameters and fuzzy values are calculated logically with the help of the neural network. Neuro-fuzzy systems utilize two algorithms including hybrid learning and error back-propagation so as to relate input and output values.Citation46 The basic flaw of this technique is that the system is required to be trained.Citation47 Further, the least square method has been used by the authors to derive the best parameters. It is already known that if the membership functions of inputs are not known, the solution space will be very large. So, the convergence will turn out to be a time taking process because then it will be performed in two steps viz. forward step (for calculation of errors) and backward step (for operating the parameters).

Performance Evaluation

In this section, the researchers have explained how the security risk is being assessed through the proposed technique and how its performance is being evaluated. The authors have used 80% (40) of these data for the training purpose and the remaining 20% (10) has been applied for testing the system.Citation48 The ANFIS structure of the proposed system has been shown in . The logic operator, AND has been taken in joining the rules. A code has been programmed in MATLAB 18 healthcare web applications for the same.Citation45 Finally, the output of the program (the ideal membership functions for probability of occurrence, security risk severity, etc.) is obtained.

Figure 6 ANFIS structure.

Figure 6 ANFIS structure.

Minimum error occurrence has been considered as the basis for the selection of best membership function. The performance of the designed fuzzy system has been evaluated on the basis of two types of errors, viz., RMSE (Root Mean Squared Error) and MSE (Mean Squared Error). The correlation coefficient, R between the obtained data and the data predicted by ANFIS has been calculated as per the given formulae (equations (4) to (6)).

(4)
(5)
(6)

where Ai, Fi and n denote the obtained data, predicted data and the frequency of observations, respectively. Similarly, A’ = and F’ = (

 shows the implementation of alternative situations with their errors.

Table 5 Performance of ANFIS for Security Risk Factors at Design Phase

Prediction and Sensitivity Analysis

The significance of prediction is that it helps in estimating the intermediate as well as the overall outcome of the proposed analysis. shows the security risk prediction of each security risk factor and the overall security risk of the proposed model. Sensitivity analysis provides the researchers with the test of robustness of the model. The overall sensitivity analysis, ie, probability and severity of the occurrence of each security risk have been clearly shown in .

Table 6 Prediction of Overall Security Risk Through ANFIS

Table 7 Sensitivity Analysis of the Factors of Security Risk

Validation of Security Risk Assessment Through Fuzzy Multiple Regression Modeling

Validation and verification of the technique being used for solving any problem needs comparison of obtained results. This comparison has to be between the method employed at present and the alternative methods that have already been enlisted earlier in the previous research studies. In the above case study, the authors have taken the ANFIS for assessment of security risk. The plot for validation against the training data has been shown in . The circle in the plot clearly depicts that the validation plot lies exactly between the actual data plot and the observed data plot. Hence, the research work is said to be validated. Similarly, all the other security risk factors identified in Security Risk Factor Identification section of this paper have been analysed.

Figure 7 Plot of validation against training data.

Figure 7 Plot of validation against training data.

Normally, multiple regression equations (MRE) can be shown as equation (7).

(7)

where b0 is a constant value, and b1 and b2 represent regression coefficients.

shows the Multiple Regression Equations for each identified security risk factor, whereas consists of the Multiple Regression Equation for security risk through the hierarchy. depicts the prediction of overall Security Risk through Fuzzy Multiple Regression Modelling. shows the comparison of the obtained results through ANFIS and Fuzzy Multiple Regression model.

Table 8 Multiple Regression Equation for Each Security Risk Factor

Table 9 Multiple Regression Equation for Security Risk Through the Hierarchy

Table 10 Prediction of Overall Security Risk Through Fuzzy Multiple Regression Modelling

Table 11 Comparison Between ANFIS [AS] and Fuzzy Multiple Regression Modelling [FM]

show the residual plots for individual security risk factors as identified in the previous sections. shows the residual plot for the security risk through hierarchy. depicts the correlation between the results through ANFIS and multiple fuzzy regression modelling.

Figure 8 Residual plot for ACPVPM.

Figure 8 Residual plot for ACPVPM.

Figure 9 Residual plot for PCF.

Figure 9 Residual plot for PCF.

Figure 10 Residual plot for CVDP.

Figure 10 Residual plot for CVDP.

Figure 11 Residual plot for UPC.

Figure 11 Residual plot for UPC.

Figure 12 Residual plot for RCT.

Figure 12 Residual plot for RCT.

Figure 13 Residual plot for USP.

Figure 13 Residual plot for USP.

Figure 14 Residual plot for DCWIC.

Figure 14 Residual plot for DCWIC.

Figure 15 Residual plot for EITV.

Figure 15 Residual plot for EITV.

Figure 16 Residual plot for security risk through the hierarchy.

Figure 16 Residual plot for security risk through the hierarchy.

Table 12 Correlation Between Both Results

Discussion

The medical data include information from vital signs such as heart rate, temperature, respiratory-rate, and blood-tests. If this data falls prey to any kind of cyber-attack, it can lead to serious security issues. As per a healthcare data security breach reported in January 2019, 1.57 million patients’ data of Inmediata Health Group were exposed because of misconfigured database.Citation49 A similar breach was notified by the University of Washington, Medicine, in February 2019 that affected 974,000 individuals. The reason behind this breach was also a misconfigured server.Citation49 The common loophole in both the breaches was misconfiguration of database/server and that could have been avoided if the security risks were evaluated at the design phase. Therefore, this research work intends to afford solutions for all security practitioners by propounding the use of ANFIS technique to assess the security risks at the time of designing a healthcare web application. The proper quantification of each security risk in the early stages will help the developers prioritize the risks and will result in the development of a more secure healthcare web application.

This study commenced its objective by identifying the eight major security risks that may persist during the design phase itself and are likely to affect the security of any healthcare web application. In the ensuing part of the study, these risks were assessed through the ANFIS technique. The overall security risk was calculated to be 3.03425. For corroborating and authenticating the efficacy of the proposed approach, the overall security risk value was estimated through multiple fuzzy regression modelling (2.4631) and the values obtained were compared (). The results obtained through both the approaches were found to be highly correlated (). This conclusively proves that employing the proposed ANFIS technique for security risk estimation at the initial stages of any healthcare web application would be highly effective. The only limitation of this study could be the unintentional exclusion of any important security risk factor as the selected risks are not all-inclusive.

Conclusion

The proposed approach is basically for the security risk quantification so that the management of security risks existing at the design phase becomes easier for the developers. The advantages of the designed system are that this method is based upon the opinions of security professionals and experienced researchers. The implementation of artificial intelligence makes it a learning system. It can learn from past experiences and hence escalate its performance. It can be applied for both quantitative and qualitative factors and thereby help in technical planning of security risks. The ranking of risks will be a major contribution of this system which will further help in arranging the various risks into a proper hierarchical structure. The limitation of this research work is that the list of security risks identified by the researchers is not exhaustive. Some of the security risk factors might have been left unselected; making room for some error. The future study of the proposed work may include its comparison with the traditional risk assessment approaches.

Acknowledgments

This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant No. (D-596-611-1441). The authors, therefore, gratefully acknowledge DSR technical and financial support.

Disclosure

The authors report no conflicts of interest in this work.

References