AI-Enabled Machine Learning Solutions for Cybersecurity and Web Analytics in Enterprise Healthcare Systems with SAP

Main Article Content

Vinícius Gabriel Lopes

Abstract

The increasing digitization of enterprise healthcare systems has heightened the need for advanced cybersecurity and intelligent web analytics to protect sensitive data and ensure operational resilience. This study presents an AI-enabled machine learning framework designed to enhance cybersecurity and web analytics in enterprise healthcare environments using SAP platforms. The proposed approach leverages big data analytics and machine learning models to detect cyber threats, identify anomalies, and analyze web traffic patterns in real time. By integrating AI-driven security mechanisms with SAP-based enterprise systems, the framework enables proactive threat detection, risk mitigation, and improved system visibility. Privacy-aware controls, access management, and data governance mechanisms are incorporated to safeguard patient information and maintain regulatory compliance. Experimental analysis demonstrates improved detection accuracy, scalability, and performance, making the proposed solution suitable for large-scale, cloud-enabled healthcare enterprises.

Article Details

Section

Articles

How to Cite

AI-Enabled Machine Learning Solutions for Cybersecurity and Web Analytics in Enterprise Healthcare Systems with SAP. (2025). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(6), 13194-13201. https://doi.org/10.15662/IJRPETM.2025.0806023

References

1. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.

2. Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, SE-13(2), 222–232.

3. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316.

4. Shwartz-Ziv, R., & Armon, A. (2022). Tabular data: Deep learning is not all you need. Information Fusion, 81, 84–90.

5. Mahajan, N. (2024). AI-Enabled Risk Detection and Compliance Governance in Fintech Portfolio Operations. Cuestiones de Fisioterapia, 53(03), 5366-5381.

6. Ramalingam, S., Mittal, S., Karunakaran, S., Shah, J., Priya, B., & Roy, A. (2025, May). Integrating Tableau for Dynamic Reporting in Large-Scale Data Warehousing. In 2025 International Conference on Networks and Cryptology (NETCRYPT) (pp. 664-669). IEEE.

7. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.

8. M. R. Rahman, “Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices”, jictra, vol. 15, no. 1, pp. 17–23, Dec. 2025, doi: 10.51239/jictra.v15i1.348.

9. Pimpale, S. (2025). A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics. arXiv preprint arXiv:2511.16399.

10. Kumar, A., Anand, L., & Kannur, A. (2024, November). Optimized Learning Model for Brain-Computer Interface Using Electroencephalogram (EEG) for Neuroprosthetics Robotic Arm Design for Society 5.0. In 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC) (pp. 30-35). IEEE.

11. Raju, S., & Sindhuja, D. (2024). Transparent encryption for external storage media with mobile-compatible key management by Crypto Ciphershield. PatternIQ Mining, 1(3), 12-24.

12. Nagarajan, G. (2024). A Cybersecurity-First Deep Learning Architecture for Healthcare Cost Optimization and Real-Time Predictive Analytics in SAP-Based Digital Banking Systems. International Journal of Humanities and Information Technology, 6(01), 36-43.

13. Genne, S. (2025). Bridging the Digital Divide: Mobile Web Engineering as a Pathway to Equitable Higher Education Access. Journal of Computer Science and Technology Studies, 7(7), 560-566.

14. Kesavan, E. (2022). Driven learning and collaborative automation innovation via Trailhead and Tosca user groups. International Scientific Journal of Engineering and Management, 1(1), Article 00058. https://doi.org/10.55041/ISJEM00058

15. Potdar, A., Gottipalli, D., Ashirova, A., Kodela, V., Donkina, S., & Begaliev, A. (2025, July). MFO-AIChain: An Intelligent Optimization and Blockchain-Backed Architecture for Resilient and Real-Time Healthcare IoT Communication. In 2025 International Conference on Innovations in Intelligent Systems: Advancements in Computing, Communication, and Cybersecurity (ISAC3) (pp. 1-6). IEEE.

16. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

17. Panda, M. R., Musunuru, M. V., & Sardana, A. (2025). Federated Reinforcement Learning for Adaptive Fraud Behavior Analytics in Digital Banking. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(3), 90-96.

18. Kusumba, S. (2024). Accelerating AI and Data Strategy Transformation: Integrating Systems, Simplifying Financial Operations Integrating Company Systems to Accelerate Data Flow and Facilitate Real-Time Decision-Making. The Eastasouth Journal of Information System and Computer Science, 2(02), 189-208.

19. Cherukuri, B. R. (2025). Enhanced trimodal emotion recognition using multibranch fusion attention with epistemic neural networks and Fire Hawk optimization. Journal of Machine and Computer, 58, Article 202505005. https://doi.org/10.53759/7669/jmc202505005

20. Kasireddy, J. R. (2025, April). The Role of AI in Modern Data Engineering: Automating ETL and Beyond. In International Conference of Global Innovations and Solutions (pp. 667-693). Cham: Springer Nature Switzerland.

21. Natta, P. K. (2023). Harmonizing enterprise architecture and automation: A systemic integration blueprint. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(6), 9746–9759. https://doi.org/10.15662/IJRPETM.2023.0606016

22. Madabathula, L. (2024). Metadata-driven multi-tenant data ingestion for cloud-native pipelines. International Journal of Computer Technology and Electronics Communication (IJCTEC), 7(6), 9857–9865. https://doi.org/10.15680/IJCTECE.2024.0706020

23. Khan, M. I. (2025). Big Data Driven Cyber Threat Intelligence Framework for US Critical Infrastructure Protection. Asian Journal of Research in Computer Science, 18(12), 42-54.

24. Singh, A. (2021). Mitigating DDoS attacks in cloud networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(4), 3386–3392. https://doi.org/10.15662/IJEETR.2021.0304003

25. Chivukula, V. (2023). Calibrating Marketing Mix Models (MMMs) with Incrementality Tests. International Journal of Research and Applied Innovations (IJRAI), 6(5), 9534–9538.

26. Kumar, S. S. (2023). AI-Based Data Analytics for Financial Risk Governance and Integrity-Assured Cybersecurity in Cloud-Based Healthcare. International Journal of Humanities and Information Technology, 5(04), 96-102.

27. Manda, P. (2024). THE ROLE OF MACHINE LEARNING IN AUTOMATING COMPLEX DATABASE MIGRATION WORKFLOWS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(3), 10451-10459.

28. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

29. Vasugi, T. (2023). An Intelligent AI-Based Predictive Cybersecurity Architecture for Financial Workflows and Wastewater Analytics. International Journal of Computer Technology and Electronics Communication, 6(5), 7595-7602.

30. Adari, V. K. (2024). How Cloud Computing is Facilitating Interoperability in Banking and Finance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11465-11471.

31. Kumar, R. (2024). Real-Time GenAI Neural LDDR Optimization on Secure Apache–SAP HANA Cloud for Clinical and Risk Intelligence. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(5), 8737-8743.

32. Kavuru, Lakshmi Triveni. (2024). Cross-Platform Project Reality: Managing Work When Teams Refuse to use the Same Tool. International Journal of Multidisciplinary Research in Science Engineering and Technology. 10.15680/IJMRSET.2024.0706146.

33. Vimal Raja, G. (2024). Intelligent Data Transition in Automotive Manufacturing Systems Using Machine Learning. International Journal of Multidisciplinary and Scientific Emerging Research, 12(2), 515-518.

34. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.

35. Karnam, A. (2024). Next-Gen Observability for SAP: How Azure Monitor Enables Predictive and Autonomous Operations. International Journal of Computer Technology and Electronics Communication, 7(2), 8515–8524. https://doi.org/10.15680/IJCTECE.2024.0702006

36. Archana, R., & Anand, L. (2025). Residual u-net with Self-Attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.

37. Fazilath, M., & Umasankar, P. (2025, February). Comprehensive Analysis of Artificial Intelligence Applications for Early Detection of Ovarian Tumours: Current Trends and Future Directions. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1-9). IEEE.

38. Patnaik, S. K., Sidhu, M. S., Gehlot, Y., Sharma, B., & Muthu, P. (2018). Automated skin disease identification using deep learning algorithm. Biomedical & Pharmacology Journal, 11(3), 1429.

39. Eberle, W., & Holder, L. (2007). Insider threat detection using graph-based approaches. Journal of Applied Security Research, 4(1), 32–81.

40. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.

41. Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331.