ARCHIVES
Original Article
A Unified AI Framework for Early Threat Detection in Healthcare: Combining Anomaly Detection, Sequence Learning, and CTI Correlation
Kalyana Krishna Kondapalli1
1 CEO, Mytecz, India
Published Online: May-August 2026
Pages: 123-128
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502013References
1. M. Dekker and L. Alevizos, "A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance
decision-making," Security and Privacy, vol. 7, no. 1, pp. 1–18, 2024, doi: 10.1002/spy2.333.
2. S. Hansen and A. J. Baroody, "Beyond the boundaries of care: Electronic health records and the changing practices of healthcare,"
Information and Organization, vol. 33, no. 3, p. 100477, 2023.
3. Z. Almahmoud, P. D. Yoo, O. Alhussein, I. Farhat, and E. Damiani, "A holistic and proactive approach to forecasting cyber threats,"
Scientific Reports, vol. 13, no. 1, pp. 1–15, 2023, doi: 10.1038/s41598-023-35198-1.
4. A. R. Iossifova and S. Meyer-Goldstein, "Impact of standards adoption on healthcare transaction performance: The case of HIPAA,"
International Journal of Production Economics, vol. 141, no. 1, pp. 277–285, 2013.
5. J. Xing and Z. Zhang, "Hierarchical network security measurement and optimal proactive defense in cloud computing environments,"
Security and Communication Networks, vol. 2022, pp. 1–12, 2022, doi: 10.1155/2022/6783223.
6. M. Tahmasebi, "Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises," Journal of
Information Security, vol. 15, no. 2, pp. 106–133, 2024, doi: 10.4236/jis.2024.152008.
7. Y. Creado and V. Ramteke, "Active cyber defence strategies and techniques for banks and financial institutions," Journal of Financial Crime,
vol. 27, no. 3, pp. 771–780, 2020, doi: 10.1108/JFC-01-2020-0008.
8. N. U. I. Hossain, S. Rahman, and S. A. Liza, "Cyber-susiliency index: A comprehensive resiliency-sustainability-cybersecurity index for
healthcare supply chain networks," Decision Analytics Journal, vol. 9, p. 100319, 2023.
9. G. Apruzzese, P. Laskov, E. Montes De Oca, W. Mallouli, L. Brdalo Rapa, A. V. Grammatopoulos, and F. Di Franco, "The role of machine
learning in cybersecurity," Digital Threats: Research and Practice, vol. 4, no. 1, pp. 1–38, 2023, doi: 10.1145/3545574.
10. Y. Zheng, Z. Li, X. Xu, and Q. Zhao, "Dynamic defenses in cyber security: Techniques, methods, and challenges," Digital Communications
and Networks, vol. 8, no. 4, pp. 422–435, 2022, doi: 10.1016/j.dcan.2021.07.006.
11. H. I. Kure, S. Islam, M. Ghazanfar, A. Raza, and M. Pasha, "Asset criticality and risk prediction for an effective cybersecurity risk
management of cyber-physical systems," Neural Computing and Applications, vol. 34, no. 1, pp. 493–514, 2022, doi: 10.1007/s00521-021-
06400-0.
12. A. Yeboah-Ofori, S. Islam, S. W. Lee, Z. U. Shamszaman, K. Muhammad, M. Altaf, and M. S. Al-Rakhami, "Cyber threat predictive
analytics for improving cyber supply chain security," IEEE Access, vol. 9, pp. 94318–94337, 2021, doi: 10.1109/ACCESS.2021.3087109.
13. Y. Kim, I. Lee, H. Kwon, K. Lee, and J. Yoon, "Ban: Predicting APT attack based on Bayesian network with MITRE ATT&CK framework,"
IEEE Access, vol. 11, pp. 91949–91968, 2023, doi: 10.1109/ACCESS.2023.3306593.
14. N. Thapa, Z. Liu, A. Shaver, A. Esterline, B. Gokaraju, and K. Roy, "Secure cyber defense: An analysis of network intrusion-based dataset
CCD-IDSv1 with machine learning and deep learning models," Electronics, vol. 10, no. 15, pp. 1–13, 2021, doi:
10.3390/electronics10151747.
15. M. Javaid, A. Haleem, R. P. Singh, and R. Suman, "Towards insighting cybersecurity for healthcare domains: A comprehensive review of
recent practices and trends," Cyber Security and Applications, vol. 1, p. 100016, 2023.
decision-making," Security and Privacy, vol. 7, no. 1, pp. 1–18, 2024, doi: 10.1002/spy2.333.
2. S. Hansen and A. J. Baroody, "Beyond the boundaries of care: Electronic health records and the changing practices of healthcare,"
Information and Organization, vol. 33, no. 3, p. 100477, 2023.
3. Z. Almahmoud, P. D. Yoo, O. Alhussein, I. Farhat, and E. Damiani, "A holistic and proactive approach to forecasting cyber threats,"
Scientific Reports, vol. 13, no. 1, pp. 1–15, 2023, doi: 10.1038/s41598-023-35198-1.
4. A. R. Iossifova and S. Meyer-Goldstein, "Impact of standards adoption on healthcare transaction performance: The case of HIPAA,"
International Journal of Production Economics, vol. 141, no. 1, pp. 277–285, 2013.
5. J. Xing and Z. Zhang, "Hierarchical network security measurement and optimal proactive defense in cloud computing environments,"
Security and Communication Networks, vol. 2022, pp. 1–12, 2022, doi: 10.1155/2022/6783223.
6. M. Tahmasebi, "Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises," Journal of
Information Security, vol. 15, no. 2, pp. 106–133, 2024, doi: 10.4236/jis.2024.152008.
7. Y. Creado and V. Ramteke, "Active cyber defence strategies and techniques for banks and financial institutions," Journal of Financial Crime,
vol. 27, no. 3, pp. 771–780, 2020, doi: 10.1108/JFC-01-2020-0008.
8. N. U. I. Hossain, S. Rahman, and S. A. Liza, "Cyber-susiliency index: A comprehensive resiliency-sustainability-cybersecurity index for
healthcare supply chain networks," Decision Analytics Journal, vol. 9, p. 100319, 2023.
9. G. Apruzzese, P. Laskov, E. Montes De Oca, W. Mallouli, L. Brdalo Rapa, A. V. Grammatopoulos, and F. Di Franco, "The role of machine
learning in cybersecurity," Digital Threats: Research and Practice, vol. 4, no. 1, pp. 1–38, 2023, doi: 10.1145/3545574.
10. Y. Zheng, Z. Li, X. Xu, and Q. Zhao, "Dynamic defenses in cyber security: Techniques, methods, and challenges," Digital Communications
and Networks, vol. 8, no. 4, pp. 422–435, 2022, doi: 10.1016/j.dcan.2021.07.006.
11. H. I. Kure, S. Islam, M. Ghazanfar, A. Raza, and M. Pasha, "Asset criticality and risk prediction for an effective cybersecurity risk
management of cyber-physical systems," Neural Computing and Applications, vol. 34, no. 1, pp. 493–514, 2022, doi: 10.1007/s00521-021-
06400-0.
12. A. Yeboah-Ofori, S. Islam, S. W. Lee, Z. U. Shamszaman, K. Muhammad, M. Altaf, and M. S. Al-Rakhami, "Cyber threat predictive
analytics for improving cyber supply chain security," IEEE Access, vol. 9, pp. 94318–94337, 2021, doi: 10.1109/ACCESS.2021.3087109.
13. Y. Kim, I. Lee, H. Kwon, K. Lee, and J. Yoon, "Ban: Predicting APT attack based on Bayesian network with MITRE ATT&CK framework,"
IEEE Access, vol. 11, pp. 91949–91968, 2023, doi: 10.1109/ACCESS.2023.3306593.
14. N. Thapa, Z. Liu, A. Shaver, A. Esterline, B. Gokaraju, and K. Roy, "Secure cyber defense: An analysis of network intrusion-based dataset
CCD-IDSv1 with machine learning and deep learning models," Electronics, vol. 10, no. 15, pp. 1–13, 2021, doi:
10.3390/electronics10151747.
15. M. Javaid, A. Haleem, R. P. Singh, and R. Suman, "Towards insighting cybersecurity for healthcare domains: A comprehensive review of
recent practices and trends," Cyber Security and Applications, vol. 1, p. 100016, 2023.
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026