Artificial Intelligence for Strengthening Cybersecurity in U.S. Healthcare Systems

Authors

  • Barbara Aryeley Aryee Department of Information Systems, East Tennessee State University (ETSU), Johnson City, TN, USA
  • Jehoiarib Umoren Department of Supply Chain Management, University of Houston, C.T. Bauer College of Business, Houston, Texas, USA
  • Kwadwo Adu Agymang Department of Information Systems, East Tennessee State University (ETSU), Johnson City, TN, USA

DOI:

https://doi.org/10.54536/ajmsi.v4i2.6178

Keywords:

Artificial Intelligence, Cybersecurity, Data Protection, Healthcare, Threat Detection, U.S. Systems

Abstract

The US healthcare industry is grappling with a new level of cybersecurity threats. In fact, data breaches reached 275 million people just in 2024, which is equal to 82% of the U.S. population. All the old ways of doing cybersecurity remain insufficient in the face of ever-evolving threats. These traditional methods involve signature and perimeter-based detection techniques, as well as rule-based access policies. Even with robust cybersecurity investment, 92% of healthcare providers were hit by data breaches in the past few years. This paper explores the use of artificial intelligence technologies to improve cybersecurity in US healthcare systems. This study uses a systematic literature review approach. The research examines today’s threat landscapes, traditional security shortcomings and AI-driven approaches. The study synthesizes data from various sources, including recent studies published in the academic literature, online databases and industry reports covering 2019-2025. The results showed that AI-based methods outperform the traditional techniques. These methods include machine learning based anomaly detection, deep learning models for zero-day exploit detection, and natural language processing (NLP)-based threat analysis. However, implementation challenges persist. These difficulties are the adversarial attacks on AI systems, the transparency of the algorithm, false positives, and HIPAA compliance. The study concludes that artificial intelligence offers transformative potential for healthcare cybersecurity; thus, successful deployment requires careful integration with existing infrastructure, continuous model updating, and collaboration between AI systems and human security specialists. 

Downloads

Download data is not yet available.

References

Abdallah, E. E., & Otoom, A. F. (2022). Intrusion detection systems using supervised machine learning techniques: a survey. Procedia Computer Science, 201, 205-212.

Abirami, T., & Parameshwari, V. Cybersecurity Threat Landscape of Smart and Interconnected Healthcare Systems. In Cybersecurity and Data Science Innovations for Sustainable Development of HEICC (pp. 76-92). CRC Press.

Adukpo, T. K., & Bethel, J. O. (2025). Impact of macroeconomic factors on government spending in Ghana. American Journal of Applied Statistics and Economics, 4(1). https://doi.org/10.54536/ajase.v4i1.5833

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.

Algarni, A. M., & Thayananthan, V. (2025). Cybersecurity for Analyzing Artificial Intelligence (AI)-Based Assistive Technology and Systems in Digital Health. Systems, 13(6), 439.

Alshoulie, M., & Mehmood, A. (2025). Deep learning approaches for malware detection: A comprehensive review of techniques, challenges, and future directions. IEEE Access.

Alzahrani, A. A. (2023). Using Artificial Intelligence and Cybersecurity in Medical and Healthcare Applications. Alzahrani, AA.

Apruzzese, G., Laskov, P., Montes de Oca, E., Mallouli, W., Brdalo Rapa, L., Grammatopoulos, A. V., & Di Franco, F. (2023). The role of machine learning in cybersecurity. Digital Threats: Research and Practice, 4(1), 1-38.

Arefin, S. (2024). Strengthening healthcare data security with AI-powered threat detection. International Journal of Scientific Research and Management (IJSRM), 12(10), 1477-1483.

Arrieta, A. B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., ... & Herrera, F. (2020). Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information fusion, 58, 82-115.

Azam, Z., Islam, M. M., & Huda, M. N. (2023). Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree. Ieee Access, 11, 80348-80391.

Biggio, B., & Roli, F. (2018, October). Wild patterns: Ten years after the rise of adversarial machine learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2154-2156).

Burrell, D. N. (2024). Understanding healthcare cybersecurity risk management complexity. Land Forces Academy Review, 29(1), 38-49.

Chinnasamy, R., Subramanian, M., Easwaramoorthy, S. V., & Cho, J. (2025). Deep learning-driven methods for network-based intrusion detection systems: A systematic review. ICT Express.

Frumento, E. (2019). Cybersecurity and the evolution of healthcare: challenges and threats behind its evolution. In M_Health current and future applications (pp. 35-69). Cham: Springer International Publishing.

Gokah, B. E., Amoako, E. K., Adom, S. G., Abakah, L. K., & Sampson, E. (2025). AI-driven user experience (UX) frameworks to enhance trust and security in U.S. online banking. Finance & Accounting Research Journal, 7(9), 465–478. https://doi.org/10.51594/farj.v7i9.2069

Halvorsen, J., Izurieta, C., Cai, H., & Gebremedhin, A. (2024). Applying generative machine learning to intrusion detection: A systematic mapping study and review. ACM Computing Surveys, 56(10), 1-33.

Han, D., Wang, Z., Zhong, Y., Chen, W., Yang, J., Lu, S., ... & Yin, X. (2021). Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors. IEEE Journal on Selected Areas in Communications, 39(8), 2632-2647.

Hermes, S., Riasanow, T., Clemons, E. K., Böhm, M., & Krcmar, H. (2020). The digital transformation of the healthcare industry: exploring the rise of emerging platform ecosystems and their influence on the role of patients. Business Research, 13(3), 1033-1069.

Ibraheem, I. O., & Tosho, A. U. (2024). Zero-day attack vulnerabilities: mitigation using machine learning for performance evaluation. Journal of Computers for Society, 5(1), 43-58.

Iman, M., Arabnia, H. R., & Rasheed, K. (2023). A review of deep transfer learning and recent advancements. Technologies, 11(2), 40.

Jayabharathi, S., & Ilango, V. (2022, September). Anomaly detection using machine learning techniques: A systematic review. In International Conference on Advances in Data-Driven Computing and Intelligent Systems (pp. 553-572). Singapore: Springer Nature Singapore.

Kasri, W., Himeur, Y., Alkhazaleh, H. A., Tarapiah, S., Atalla, S., Mansoor, W., & Al-Ahmad, H. (2025). From vulnerability to defense: The role of large language models in enhancing cybersecurity. Computation, 13(2), 30.

Khan, Z. A., & Herrmann, P. (2019). Recent advancements in intrusion detection systems for the Internet of Things. Security and Communication Networks, 2019(1), 4301409.

Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the Internet of Things: techniques, deployment strategy, validation strategy, attacks, public datasets, and challenges. Cybersecurity, 4(1), 18.

Kioskli, K., Fotis, T., & Mouratidis, H. (2021, August). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-9).

Kizza, J. M. (2024). Access control and authorization. In Guide to Computer Network Security (pp. 195-214). Cham: Springer International Publishing.

Laith, A. E., Jaouni, H., & Mihyar, A. (2025). Addressing cyberbiosecurity challenges in the modern era of biotechnology and artificial intelligence: cyberbiosecurity in the age of biotechnology and AI. Global Biosecurity.

Li, S., Surineni, K., & Prabhakaran, N. (2025). Cyber-Attacks on Hospital Systems: A Narrative Review. The American Journal of Geriatric Psychiatry: Open Science, Education, and Practice.

Naghib, A., Jafari Navimipour, N., Hosseinzadeh, M., & Sharifi, A. (2023). A comprehensive and systematic literature review on the big data management techniques in the Internet of Things. Wireless Networks, 29(3), 1085-1144.

Narteh-Kofi, E., Asamoah, E., Adukpo, T. K., Mensah, N. (2025). Mergers and Acquisitions in the U.S. Capital Market: Theoretical Foundations, Market Dynamics and Strategic Implications. EPRA International Journal of Economics, Business and Management Studies (EBMS), 12(3), 71-80. https://doi.org/10.36713/epra20500

Narteh-Kofi, E., Raji, Y. M., Asamoah, E., & Adukpo, T. K. (2025). The role of artificial intelligence in enhancing decision-making and efficiency in mergers and acquisitions: A case study approach within the U.S. capital market. International Journal for Multidisciplinary Research (IJFMR), 7(3). https://doi.org/10.36948/ijfmr.2025.v07i03.44171

Narteh-Kofi, E., Sampson, E., Hattoh, E., Akingbade, R., & Agbeve, V. (2025, July 30). Optimizing target identification in the U.S. capital market mergers and acquisitions through artificial intelligence: Implications for financial efficiency, compliance, and national economic competitiveness. International Journal for Multidisciplinary Research (IJFMR), 7(4). https://doi.org/10.36948/ijfmr.2025.v07i04.51702

Neoaz, N. (2025). Harnessing Artificial Intelligence for Cybersecurity in Healthcare and Food Processing: A Review of Emerging Trends and the Role of Generative Models like ChatGPT. Global Trends in Science and Technology, 1(3), 144-162.

Nisioti, A., Mylonas, A., Yoo, P. D., & Katos, V. (2018). From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods. IEEE Communications Surveys & Tutorials, 20(4), 3369-3388.

Olatuyi, T. (2025). Pragmatic Approaches to Data Breach Prevention: Strategies Employed by IT Managers (Doctoral dissertation, Walden University).

Ozkan-Okay, M., Akin, E., Aslan, Ö., Kosunalp, S., Iliev, T., Stoyanov, I., & Beloev, I. (2024). A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cybersecurity solutions. IEEe Access, 12, 12229-12256.

Rezaiezadeh Roukerd, F., & Rajabi, M. M. (2024). Anomaly detection in groundwater monitoring data using LSTM-Autoencoder neural networks. Environmental Monitoring and Assessment, 196(8), 692.

Salama, R., Altrjman, C., & Al-Turjman, F. (2024). Healthcare cybersecurity challenges: a look at current and future trends. Computational intelligence and Blockchain in complex systems, 97-111.

Sani, Z. N., & Aryee, B. A. (2025). Optimizing drug supply chains to prevent shortages in rural U.S. hospitals. EPRA International Journal of Economics, Business and Management Studies. https://doi.org/10.36713/epra24022

Soe, Y. N., Feng, Y., Santosa, P. I., Hartanto, R., & Sakurai, K. (2019). Rule generation for signature-based detection systems of cyber attacks in IoT environments. Bulletin of Networking, Computing, Systems, and Software, 8(2), 93-97.

Umoren, J., Korang, A., Utomi, E., Adukpo, T. K., Mensah, N. (2025). The Importance of Utilizing Big Data Analytics in U.S. Healthcare Supply Chain Management. EPRA International Journal of Multidisciplinary Research, 11(3), 411-421. https://doi.org/10.36713/epra20572

Umoren, J., Utomi, E., & Adukpo, T. K. (2025). AI-powered predictive models for U.S. healthcare supply chains: Creating AI models to forecast and optimize supply chain. EPRA International Journal of Multidisciplinary Research (IJMR). https://doi.org/10.36713/epra22481

Wang, Q., Su, M., Zhang, M., & Li, R. (2021). Integrating digital technologies and public health to fight the COVID-19 pandemic: key technologies, applications, challenges, and outlook of digital healthcare. International Journal of Environmental Research and Public Health, 18(11), 6053.

Yaqoob, T., Abbas, H., & Atiquzzaman, M. (2019). Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review. IEEE Communications Surveys & Tutorials, 21(4), 3723-3768.

Zhang, X., & Saltman, R. (2022). Impact of electronic health record interoperability on telehealth service outcomes. JMIR medical informatics, 10(1), e31837.

Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial intelligence applications in cybersecurity: State-of-the-art in research. IEEe Access, 10, 93104-93139.

Downloads

Published

2025-12-30

How to Cite

Aryee, B. A., Umoren, J., & Agymang, K. A. (2025). Artificial Intelligence for Strengthening Cybersecurity in U.S. Healthcare Systems. American Journal of Medical Science and Innovation, 4(2), 150-158. https://doi.org/10.54536/ajmsi.v4i2.6178

Similar Articles

1-10 of 55

You may also start an advanced similarity search for this article.