Series-1 (Jul. - Aug. 2024)Jul. - Aug. 2024 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Cover Paper
ABSTRACT: As more people use cloud-based electronic health record (EHR) systems, they make healthcare better, but they also make it easier for cybercriminals to attack. This article describes a system that uses artificial intelligence (AI) and machine learning (ML) to intelligently watch cloud-hosted EHR environments for bad behaviour, find cyberattacks, and automatically take the right steps to stop them. Using supervised machine learning models that have been trained on known threat indicators, the suggested framework constantly looks at log and system data. As soon as an attack is found, established containment and mitigation steps are carried out naturally to lower the harm. The test results show that...
Keywords: Cloud-Hosted Electronic Health Records, Machine Learning, Threat Detection, Cyberattacks, Healthcare Security, Intrusion Detection Systems, Incident Response Automation, Behavior-Based Detection
[1]
Alwaheidi, M. K., & Islam, S. (2022). Data-Driven Threat Analysis For Ensuring Security In Cloud Enabled
Systems. Sensors, 22(15), 5726.
[2]
Alwaheidi, M. K., & Islam, S. (2022). Data-Driven Threat Analysis For Ensuring Security In Cloud Enabled
Systems. Sensors, 22(15), 5726.
[3]
Chen, P. P., Tsui, N. T., Fung, A. S., Chiu, A. H., Wong, W. C., Leong, H. T., ... & Lau, J. Y. (2017). In-Situ Medical Simulation For Pre-Implementation Testing Of Clinical Service In A Regional Hospital In Hong Kong. Hong Kong Medical Journal, 23(4), 404.
[4]
Chowdhury, M. G. U. (2016). Securing Web Systems: A Case Study Of Cybercrime Web Database System (Doctoral Dissertation, University Of Massachusetts Lowell).
[5]
Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (2023). Cyberattacks And Security Of Cloud Computing: A Complete Guideline. Symmetry, 15(11), 1981.