|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 92 |
| Published: March 2026 |
| Authors: Uyinomen O. Ekong, Samuel B. Oyong, Victor E. Ekong, Edith O. Abengowe |
10.5120/ijca2026926558
|
Uyinomen O. Ekong, Samuel B. Oyong, Victor E. Ekong, Edith O. Abengowe . Comparative Performance Measures of Machine Learning Algorithms in PHR Security. International Journal of Computer Applications. 187, 92 (March 2026), 30-39. DOI=10.5120/ijca2026926558
@article{ 10.5120/ijca2026926558,
author = { Uyinomen O. Ekong,Samuel B. Oyong,Victor E. Ekong,Edith O. Abengowe },
title = { Comparative Performance Measures of Machine Learning Algorithms in PHR Security },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 92 },
pages = { 30-39 },
doi = { 10.5120/ijca2026926558 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Uyinomen O. Ekong
%A Samuel B. Oyong
%A Victor E. Ekong
%A Edith O. Abengowe
%T Comparative Performance Measures of Machine Learning Algorithms in PHR Security%T
%J International Journal of Computer Applications
%V 187
%N 92
%P 30-39
%R 10.5120/ijca2026926558
%I Foundation of Computer Science (FCS), NY, USA
Personalized health records (PHRs) are digital health records managed by patients to monitor their health information online and potentially share the information with trusted individuals such as physicians, nurses, or pharmacists. Unfortunately, digital health records have become highly valuable on the dark web, an illegal marketplace for stolen health information and related services. This poses a significant threat to patient privacy and security, increasing the risk of malware attacks and exposing individuals to potential embarrassment, ridicule, or even litigation against healthcare institutions for ethical breaches. Common attack agents include viruses, worms, Trojans (e.g., ransomware), key loggers, and rootkits. Types of attack include denial of service (DOS), Probe, remote to local (R2L) and user-to-root (U2R) exploits. To address these threats, this study used machine learning (ML) models such as Random Forest, Decision Tree, K-Nearest Neighbor, Naïve Bayes, and Logistic Regression, leveraging bagging, an ensemble learning technique. The performances of the trained models were evaluated and compared. NSL-KDD dataset was sourced from Kaggle and categorized into normal and attack classes. The dataset was imbalanced with fewer attack samples. To improve model performance, Synthetic Minority Oversampling Technique (SMOTE) was employed, with features extracted using information gain, normalization, principal component analysis, and one-hot encoder. The models learned normal patterns in the dataset to classify malware from normal applications, achieving accuracies of 98% (Random Forest), 98% (Decision Tree), and 96% (K-Nearest Neighbor). This study enhances data security, reduces privacy threats, and fosters patient trust in sharing health records with trusted medical staff.