Machine Learning Approaches to Mitigate Insider Threats in Electronic Health Records Systems
Published: 2026
Abstract
The increasing of convert the healthcare system to be as digital system, becoming necessary to secure electronic health records against inside threats. Although the existing numerous research provides solutions and utilizes machine learning techniques to enhance security of the records, it remains fragmented and lacks comprehensive synthesis of approaches. In this paper aims to present a comprehensive and rigorous study for an appropriate method based on ML to detect and mitigate insider threats in EHR systems. PRISMA methodology is used to follow. It starts to analyze 537 primary studies from different major databases where it looks to identify the relevant research in the same scope. Then it reduced to 25 studies after applying the standards of inclusion and exclusion. This study focuses on comparing the algorithms and techniques that have been used, the challenges faced with the implementation process, and the gap of existing studies. The study findings reveal trends, limitations, challenges, and future directions to develop and support the intelligence system and protect privacy and secure healthcare records.
Keywords
How to Cite the Article
Alessa, A., Alduwayl, Y., & Rahman, M. M. H. (2026). Machine Learning Approaches to Mitigate Insider Threats in Electronic Health Records Systems. Journal of Cyber Security and Risk Auditing, 2026(1), 1–19. https://doi.org/10.63180/jcsra.thestap.2026.1.1 https://doi.org/10.63180/jcsra.thestap.2026.1.1
Machine Learning Approaches to Mitigate Insider Threats in Electronic Health Records Systems is licensed under CC BY 4.0
References
- Si-Ahmed, A., Al-Garadi, M. A., & Boustia, N. (2024). Explainable machine learning-based security and privacy protection framework for Internet of Medical Things systems. arXiv Preprint. https://arxiv.org/abs/2403.09752
- Yoon, J., Mizrahi, M., Ghalaty, N. F., et al. (2023). EHR-Safe: Generating high-fidelity and privacy-preserving synthetic electronic health records. npj Digital Medicine, 6, Article 141. https://doi.org/10.1038/s41746-023-00888-7
- G. A., & Prasanna, S. (2024). Secure and resilient: An integrated methodology for enhancing electronic health record (EHR) data security and privacy in healthcare. In Proceedings of the 9th International Conference on Science, Technology, Engineering and Mathematics (ICONSTEM) (pp. 1–10). IEEE. https://doi.org/10.1109/ICONSTEM60960.2024.10568848
- Barnawi, A., Chhikara, P., Tekchandani, R., Kumar, N., & Alzahrani, B. (2024). A differentially privacy-assisted federated learning scheme to preserve data privacy for IoMT applications. IEEE Transactions on Network and Service Management, 21(4), 4686–4700.
- Saraswat, B. K., Saxena, A., & Vashist, P. C. (2023). Machine learning techniques for analysing security practices in electronic health records. In Proceedings of the 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS) (pp. 998–1005). IEEE.
- Lee, J., Kim, J., Jeong, H., & Lee, K. (2025). A machine learning-based ransomware detection method for attackers’ neutralization techniques using format-preserving encryption. Sensors, 25(8), 2406. https://doi.org/10.3390/s25082406
- Sharma, D., & Prabha, C. (2023). Security and privacy aspects of electronic health records: A review. In Proceedings of the International Conference on Advancement in Computation & Computer Technologies (InCACCT) (pp. 815–820). IEEE.
- Sundar, S., & Priyadharshini, A. (2024). Advanced security framework for patient monitoring systems: Integrating machine learning and encryption for enhanced data protection. In Proceedings of the International Conference on Emerging Research in Computational Science (ICERCS) (pp. 1–8). IEEE.
- Nowrozy, R., Ahmed, K., Wang, H., & McIntosh, T. (2023). Towards a universal privacy model for electronic health record systems: An ontology and machine learning approach. Informatics, 10(3), 60. https://doi.org/10.3390/informatics10030060
- Alarfaj, K. A., & Rahman, M. H. (2024). The risk assessment of the security of electronic health records using risk matrix. Applied Sciences, 14(13), 5785. https://doi.org/10.3390/app14135785
- Khalid, N., Qayyum, A., Bilal, M., Al-Fuqaha, A., & Qadir, J. (2023). Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Computers in Biology and Medicine, 158, 106848. https://doi.org/10.1016/j.compbiomed.2023.106848
- Naidu, U. G., Lakkshmanan, A., Krishna, J. G., Elamathi, E., & Reddy, T. S. (2025). Federated AI framework for privacy-preserving differential diagnosis across distributed medical networks. In Proceedings of the 6th International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 932–940). IEEE.
- Anupama, H. S., Pradeep, K. R., Niranjanamurthy, M., Kanthraju, V., Darshan, C., & Murthy, S. (2024). Adversarial learning for de-identification of medical records. In Proceedings of the International Conference on Knowledge Engineering and Communication Systems (ICKECS) (Vol. 1, pp. 1–5). IEEE.
- Bin Sarhan, B., & Altwaijry, N. (2022). Insider threat detection using machine learning approach. Applied Sciences, 13(1), 259. https://doi.org/10.3390/app13010259
- Agrawal, A., Baniya, P., Alazzawi, E. M., Rakesh, N., Bhushan, B., & Jamil, A. (2024). Detection of DoS and DDoS attacks using machine learning and blockchain in IoMT networks. In Proceedings of the 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings) (pp. 1–5). IEEE.
- Jahan, I., Mahabub, S., & Hossain, M. R. (2024). Optimizing data analysis and security of electronic health records (EHR): Role of machine learning for usability interface revolution. Nanotechnology Perceptions, 4011–4022.
- Herrera-Silva, J. A., & Hernández-Álvarez, M. (2023). Dynamic feature dataset for ransomware detection using machine learning algorithms. Sensors, 23(3), 1053. https://doi.org/10.3390/s23031053
- ElGawish, R., Abo-Rizka, M., ElGohary, R., & Hashim, M. (2022). Detecting ransomware within real healthcare medical records adopting Internet of Medical Things using machine and deep learning techniques. International Journal of Advanced Computer Science and Applications, 13(2).
- Hurst, W., Tekinerdogan, B., Alskaif, T., Boddy, A., & Shone, N. (2022). Securing electronic health records against insider threats: A supervised machine learning approach. Smart Health, 26, 100354. https://doi.org/10.1016/j.smhl.2022.100354
- Jaafar, H. S., Abed, A. A., & Al-Shareeda, M. A. (2026). A Secure Industrial Internet of Things (IIoT) Framework for Real-Time PI Control and Cloud-Integrated Industrial Monitoring. STAP Journal of Security Risk Management, 2026(1), 77–86. https://doi.org/10.63180/jsrm.thestap.2026.1.5
- Saraswat, B. K., Varshney, N., & Vashist, P. C. (2024). Machine learning-driven assessment and security enhancement for electronic health record systems. International Journal of Experimental Research and Review, 43, 160–175.
- Ramesh, H., Ismail, N., Abd Rahman, N. A., & Ali, A. (2026). PhishGuard: AI-Driven Graph-Based Analysis for Smarter Email Security. STAP Journal of Security Risk Management, 2026(1), 31–45. https://doi.org/10.63180/jsrm.thestap.2026.1.2
- Zhang, S., Guo, F., Jing, C., & Wu, C. (2024). Electronic medical record privacy protection scheme based on attribute encryption technology. In Proceedings of the IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (Vol. 7, pp. 402–412). IEEE.
- Alotaibi, A., Aldawghan, H., & Rahman, M. M. H. (2026). IoT Security Concerns with Non-Fungible Tokens: A Review. STAP Journal of Security Risk Management, 2026(1), 1–30. https://doi.org/10.63180/jsrm.thestap.2026.1.1
- Yeng, P. K., Fauzi, M. A., Yang, B., & Yayilgan, S. Y. (2022). Analysing digital evidence towards enhancing healthcare security practice: The KID model. In Proceedings of the 1st International Conference on AI in Cybersecurity (ICAIC) (pp. 1–9). IEEE.
- Ang, S., Ho, M., Huy, S., & Janarthanan, M. (2026). A Multi-Layered Adaptive Cybersecurity Framework for the Banking Sector Integrating Next-Gen Firewalls with AI-Driven IDPS. STAP Journal of Security Risk Management, 2026(1), 67–76. https://doi.org/10.63180/jsrm.thestap.2026.1.4
- Addula, S. R., Norozpour, S., & Amin, M. (2025). Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing. Jordanian Journal of Informatics and Computing, 2025(1), 38–48. https://doi.org/10.63180/jjic.thestap.2025.1.5
- Al-Na’amneh, Q., Aljawarneh, M., Alhazaimeh, A. S., Hazaymih, R., & Shah, S. M. (2025). Securing Trust: Rule-Based Defense Against On/Off and Collusion Attacks in Cloud Environments. STAP Journal of Security Risk Management, 2025(1), 85–114. https://doi.org/10.63180/jsrm.thestap.2025.1.5
- Alghareeb, M. S., Almaiah, M., & Badr, Y. (2024). Cyber Security Threats in Wireless LAN: A Literature Review. International Journal of Cybersecurity Engineering and Innovation, 2024(1).
- Abu Laila, D. (2025). Responsive Machine Learning Framework and Lightweight Utensil of Prevention of Evasion Attacks in the IoT-Based IDS. STAP Journal of Security Risk Management, 2025(1), 59–70. https://doi.org/10.63180/jsrm.thestap.2025.1.3
- Alrajeh, M., Almaiah, M., & Mamodiya, U. (2026). Cyber Risk Analysis and Security Practices in Industrial Manufacturing: Empirical Evidence and Literature Insights. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- Al-Shehari, T., Al-Razgan, M., Alfakih, T., Alsowail, R. A., & Pandiaraj, S. (2023). Insider threat detection model using anomaly-based isolation forest algorithm. IEEE Access, 11, 118170–118185. https://doi.org/10.1109/ACCESS.2023.3325032
- Addula, S. R., Norozpour, S., & Amin, M. (2025). Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing. Jordanian Journal of Informatics and Computing, 2025(1), 38–48. https://doi.org/10.63180/jjic.thestap.2025.1.5
- Al-shareeda, M., & Alrudainy, H. (2026). Sustainable and Secure Energy Optimization Strategies in the Internet of Healthcare Things (IoHT). International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- Ali, A. (2024). Adaptive and Context-Aware Authentication Framework Using Edge AI and Blockchain in Future Vehicular Networks. STAP Journal of Security Risk Management, 2024(1), 45–56. https://doi.org/10.63180/jsrm.thestap.2024.1.3
- Albinhamad, H., Alotibi, A., Alagnam, A., Almaiah, M., & Salloum, S. (2025). Vehicular Ad-hoc Networks (VANETs): A Key Enabler for Smart Transportation Systems and Challenges. Jordanian Journal of Informatics and Computing, 2025(1), 4–15. https://doi.org/10.63180/jjic.thestap.2025.1.2
- Chandak, A., & Chandak, P. (2026). Blockchain technology in health care an extensive scoping review of the existing applications, challenges, and future directions. International Journal of Cybersecurity Engineering and Innovation, 2026(1).
- Tabassum, M., Mahmood, S., Bukhari, A., Alshemaimri, B., Daud, A., & Khalique, F. (2024). Anomaly-based threat detection in smart health using machine learning. BMC Medical Informatics and Decision Making, 24(1), 347. https://doi.org/10.1186/s12911-024-02430-9
