AI-Driven Cyber Threat Detection in the Healthcare Sector: A Machine Learning Approach

Authors

  • Twisha Patel Assistant Professor, School of Engineering, P P Savani University, Dhamdod, Kosamba, Gujarat, India Author

DOI:

https://doi.org/10.32628/IJSRST251279

Keywords:

Cyber security, Machine learning, Convolutional Neural Network, Recurrent Neural Network, Long-Short Term Memory, Bi-directional LSTM, Generative adversarial network

Abstract

The increasing digitization of healthcare systems has led to improved patient care but has also exposed critical infrastructure to growing cybersecurity threats. This study focuses on the development and comparative analysis of various machine learning (ML) models to detect cyber-attacks targeting the healthcare industry. By utilizing publicly available cybersecurity datasets enriched with healthcare-specific attack vectors, we evaluate the performance of models including Decision Trees, Random Forest, Support Vector Machines (SVM), k-Nearest Neighbours (k-NN), and Artificial Neural Networks (ANN). These models are assessed on multiple metrics such as accuracy, precision, recall, F1-score, and false positive rate. Our findings reveal that ensemble methods, particularly Random Forest and gradient-boosted algorithms, achieve superior detection rates while maintaining a low false alarm ratio. The study also highlights the importance of feature selection and data preprocessing in enhancing model performance. The results underscore the potential of ML-based approaches to act as intelligent, real-time defence systems in securing electronic health records and maintaining data integrity within healthcare infrastructures. This work provides a foundational benchmark for future developments in AI-driven cyber defence systems tailored to the healthcare sector.

Downloads

Download data is not yet available.

References

C. Liu, J. Yang, R. Chen, Y. Zhang, and J. Zeng,Research on immunity based intrusion detection technology for the internet of things, in Proc. of the International Conference on Natural Computation, vol. 1, Shanghai, China, July 2011. DOI: https://doi.org/10.1109/ICNC.2011.6022060

Fu et al., An Intrusion Detection Scheme Based on Anomaly Mining in Internet of Things, In IEEE International Conference on Wireless, Mobile & Multimedia Networks (ICWMMN 2011), Beijing, 2011, pp. 315-320. DOI: 10.1049/cp.2011.1014. DOI: https://doi.org/10.1049/cp.2011.1014

T. H. Lee, C.-H. Wen, L.-H. Chang, H.-S. Chiang, and M.-C. Hsieh, A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN, in Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Y.-M. Huang, H.-C. Chao, D.-J. Deng, and J. J. J. H. Park, Eds. Dordrecht: Springer Netherlands, 2014, pp. 120531213. DOI: https://doi.org/10.1007/978-94-007-7262-5_137

R. Mitchell and I.-R. Chen, A survey of intrusion detection techniques for cyber-physical systems, ACM Comput. Surv., vol. 46, no. 4, pp. 55:1355:29, Mar. 2014. DOI: https://doi.org/10.1145/2542049

J. P. Amaral, L. M. Oliveira, J. J. P. C. Rodrigues, G. Han, and L. Shu, Policy and network-based intrusion detection system for ipv6-enabled wireless sensor networks, in Proc. of IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, June 2014, pp. 17963 1801. DOI: https://doi.org/10.1109/ICC.2014.6883583

A. Javaid, Q. Niyaz,W. Sun, and M. Alam, ``A deep learning approach for network intrusion detection system,'' presented at the 9th EAI Int. Conf. Bio-inspired Inf. Commun. Technol. (BIONETICS), New York, NY, USA, May 2016 , pp. 21-26. DOI: https://doi.org/10.4108/eai.3-12-2015.2262516

N. K. Thanigaivelan, E. Nigussie, R. K. Kanth, S. intrusion detection in software defined networking,'' in Proc. Int. Conf. Wireless Netw. Mobile Commun. (WINCOM), Oct. 2016, pp. 258-263. DOI: https://doi.org/10.1109/WINCOM.2016.7777224

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, ``Deep learning approach for network Virtanen, and J. Isoaho, Distributed internal anomaly detection system for internetof-things, in Proc. of 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, Jan 2016, pp. 3193320

T. Janarthanan and S. Zargari, "Feature selection in UNSW-NB15 and KDDCUP'99 datasets," 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, 2017, pp. 1881-1886. DOI: https://doi.org/10.1109/ISIE.2017.8001537

R. Priya, S. Sivasankaran, P. Ravisasthiri and S. Sivachandiran A Survey on Security Attacks in Electronic Healthcare Systems International Conference on Communication and Signal Processing, April 6-8, 2017,India. DOI: https://doi.org/10.1109/ICCSP.2017.8286448

B. A. Tama and K. H. Rhee, Attack Classification Analysis of IoT Network via Deep Learning Approach, Research Briefs on Information & Communication Technology Evolution (ReBICTE), 2018. Doi: 10.22667/ReBiCTE.2017.11.15.015 A. Tama and K. H. Rhee, Attack Classification Analysis of IoT Network via Deep Learning Approach, Research Briefs on Information & Communication Technology Evolution (ReBICTE), 2018. Doi: 10.22667/ReBiCTE.2017.11.15.015.

M. Mozaffari, W. Saad, M. Bennis, Y. Nam, and M. Debbah, A tutorial on UAVs for wireless networks: Applications, challenges, and open problems, IEEE Communications Surveys & Tutorials, 2019. DOI: https://doi.org/10.1109/COMST.2019.2902862

Downloads

Published

26-06-2025

Issue

Section

Research Articles