Local cover image
Local cover image
Image from Google Jackets

Intelligent threat detection and response systems for safeguarding cloud-hosted electronic health records from cyber attacks

By: Publication details: Haryana IOSR - International Organization of Scientific Research 2024Edition: Vol.14(4), Jul-AugDescription: 1-10pSubject(s): Online resources: In: IOSR journal of VLSI and signal processing (IOSR-JVSP)Summary: As more people use cloud-based electronic health record (EHR) systems, they make healthcare better, but they also make it easier for cybercriminals to attack. This article describes a system that uses artificial intelligence (AI) and machine learning (ML) to intelligently watch cloud-hosted EHR environments for bad behaviour, find cyberattacks, and automatically take the right steps to stop them. Using supervised machine learning models that have been trained on known threat indicators, the suggested framework constantly looks at log and system data. As soon as an attack is found, established containment and mitigation steps are carried out naturally to lower the harm. The test results show that the framework can correctly identify common EHR attack methods like ransomware and data theft, as well as quickly and effectively protect private patient data.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Status Barcode
Articles Abstract Database Articles Abstract Database School of Engineering & Technology Archieval Section Not for loan 2025-0511
Total holds: 0

As more people use cloud-based electronic health record (EHR) systems, they make healthcare better, but they
also make it easier for cybercriminals to attack. This article describes a system that uses artificial intelligence
(AI) and machine learning (ML) to intelligently watch cloud-hosted EHR environments for bad behaviour, find
cyberattacks, and automatically take the right steps to stop them. Using supervised machine learning models that
have been trained on known threat indicators, the suggested framework constantly looks at log and system data.
As soon as an attack is found, established containment and mitigation steps are carried out naturally to lower the
harm. The test results show that the framework can correctly identify common EHR attack methods like
ransomware and data theft, as well as quickly and effectively protect private patient data.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.