International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 8, Issue 2 (March-April 2026) Submit your research before last 3 days of April to publish your research paper in the issue of March-April.

Endpoint Security Priority Model (ESPM): A Context-Aware Insider-First Framework for Security and Privacy of Healthcare Resources

Author(s) Mr. Saiprashanth Sivakumar, Dr. K. Shantha Kumar
Country India
Abstract Objective:
Healthcare organizations increasingly face insider threats due to misuse of authorized access to sensitive data such as Electronic Health Records (EHRs), diagnostic reports, and billing information. Existing Endpoint Detection and Response (EDR) systems primarily focus on anomaly detection but lack effective mechanisms to prioritize insider-driven alerts. This study aims to develop a context-aware framework that improves alert prioritization based on insider risk.

Methodology:
This work proposes the Endpoint Security Priority Model (ESPM), which integrates behavioral anomaly indicators with contextual attributes including user role, privilege level, asset criticality, and data sensitivity. Due to privacy constraints, a synthetic scenario-based dataset was created to simulate healthcare workflows and insider threat behaviors. A weighted risk scoring algorithm was applied to compute an explainable insider risk score, which is mapped to priority levels (P0–P3) to support SOC triage.

Key Findings:
The proposed model demonstrated improved prioritization of high-risk insider scenarios. Contextual enrichment reduced irrelevant alerts and enhanced the visibility of critical events impacting sensitive healthcare resources.

Conclusion:
ESPM provides a practical and explainable approach for insider-first alert prioritization in healthcare environments. The framework improves SOC efficiency and supports informed decision-making, making it suitable for integration into existing security monitoring systems.
Field Computer > Network / Security
Published In Volume 8, Issue 2, March-April 2026
Published On 2026-03-30

Share this