Volume 10 , Issue 1 , PP: 14-22, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
C. Meenaloshini 1 * , A. R. Darshika Kelin 2 , Keirolona Safana Seles 3
Doi: https://doi.org/10.54216/JCHCI.100102
As cyber threats become more complex, real-time systems are needed to detect and eliminate attacks. Traditional network intrusion detection systems based on rule based static method tend to be ineffective against novel emerging threats. In this paper, we propose an improved real time cyber threat detection system using adaptive machine learning techniques used to analyze network traffic and find anomalies. Our proposed approach uses a blend of supervised and unsupervised learning models such that the system maintains high detection accuracy with minimal false positives, while maintaining continuous adaptation to constantly evolving threats. On critical network traffic features like packet size, flow duration, source and destination IP addresses, transmission protocols, the system is then trained. They show experimentally better detection accuracy, responsiveness and adaptability than conventional IDS. In this work, contributions of adaptive machine learning for robustness against dynamic and evolving threats in network environments are highlighted as significant strides towards improving real time cybersecurity infrastructure.
Cyber threat detection , Network traffic analysis , Real-time detection , Machine learning , Anomaly detection , Adaptive systems , Intrusion detection systems , Supervised learning , Unsupervised learning
[1] M. Aminu, A. Akinsanya, D. A. Dako, and O. Oyedokun, "Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms," International Journal of Computer Applications Technology and Research, vol. 13, no. 8, pp. 11–27, 2024.
[2] K. D. O. Ofoegbu, O. S. Osundare, C. S. Ike, O. G. Fakeyede, and A. B. Ige, "Real-Time Cybersecurity threat detection using machine learning and big data analytics: A comprehensive approach," Journal of Network and Computer Applications, 2024.
[3] W. Villegas-Ch, J. Govea, R. Gutierrez, A. M. Navarro, and A. Mera-Navarrete, "Effectiveness of an Adaptive Deep Learning-Based Intrusion Detection System," IEEE Access, vol. 12, pp. 1–15, 2024.
[4] B. R. Maddireddy and B. R. Maddireddy, "Adaptive Cyber Defense: Using Machine Learning to Counter Advanced Persistent Threats," International Journal of Advanced Engineering Technologies and Innovations, vol. 1, no. 03, pp. 305–324, 2023.
[5] J. Paramesh et al., "Developing an Adaptive Security Framework for Real-Time Threat Detection and Response in Cloud-Network Systems," in 2024 International Conference on Cybernation and Computation (CYBERCOM), Nov. 2024, pp. 644–648.
[6] A. Fenjan et al., "Adaptive Intrusion Detection System Using Deep Learning for Network Security," in Proceedings of the Cognitive Models and Artificial Intelligence Conference, May 2024, pp. 279–284.
[7] P. Martinez, "Adaptive Protection: Leveraging Machine Learning in Cybersecurity Strategies," Journal of Innovative Technologies, vol. 6, no. 1, pp. 45–59, 2023.
[8] M. Sumithra, B. Buvaneswari, and T. Janeswaran, "Adaptive AI-Driven Security Protocol for Cloud-Based Data Storage," Computers & Security, vol. 112, p. 102532, 2022.
[9] H. Gonaygunta, G. S. Nadella, P. P. Pawar, and D. Kumar, "Study on Empowering Cyber Security by Using Adaptive Machine Learning Methods," in 2024 Systems and Information Engineering Design Symposium (SIEDS), May 2024, pp. 166–171.
[10] O. A. Ajala et al., "Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time," Magna Scientia Advanced Research and Reviews, vol. 10, no. 1, pp. 312–320, 2024.
[11] N. Rajathi, G. Saritha, and V. J. Ramya, "Adaptive Intrusion Detection in Cyber-Physical Systems Using Reinforcement Learning-Based Autoencoders," in 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS), Nov. 2024, pp. 1–7.
[12] V. P. PM and S. Soumya, "Advancements in Anomaly Detection Techniques in Network Traffic: The Role of Artificial Intelligence and Machine Learning," Journal of Scientific Research and Technology, vol. 2, no. 1, pp. 38–48, 2024.
[13] V. S. Rao et al., "Ai driven anomaly detection in network traffic using hybrid cnn-gan," Journal of Advances in Information Technology, vol. 15, no. 7, pp. 886–895, 2024.
[14] A. D. Ramgude and R. K. Sharma, "Blockchain-Enabled Adaptive Security Framework for IoT Networks," IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17245–17256, 2022.
[15] I. H. Ji et al., "Artificial intelligence-based anomaly detection technology over encrypted traffic: a systematic literature review," Sensors, vol. 24, no. 3, p. 898, 2024.
[16] E. Edozie, A. N. Shuaibu, B. O. Sadiq, and U. K. John, "Artificial intelligence advances in anomaly detection for telecom networks," Artificial Intelligence Review, vol. 58, no. 4, p. 100, 2025.
[17] R. Changala et al., "Using Generative Adversarial Networks for Anomaly Detection in Network Traffic: Advancements in AI Cybersecurity," in 2024 International Conference on Data Science and Network Security (ICDSNS), Jul. 2024, pp. 1–6.
[18] C. Rookard and A. Khojandi, "Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments," IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 987–1001, 2024.
[19] T. Talaei Khoei and N. Kaabouch, "A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems," Information, vol. 14, no. 2, p. 103, 2023.
[20] S. Mishra and M. Shanthalakshmi, "Cross-Modal Deep Learning for Steganalysis in Encrypted Network Flows," IEEE Transactions on Information Forensics and Security, vol. 19, pp. 112–125, 2024.
[21] S. J. Pinto, P. Siano, and M. Parente, "Review of cybersecurity analysis in smart distribution systems and future directions for using unsupervised learning methods for cyber detection," Energies, vol. 16, no. 4, p. 1651, 2023.
[22] P. K. Mvula, P. Branco, G. V. Jourdan, and H. L. Viktor, "A Survey on the Applications of Semi-supervised Learning to Cyber-security," ACM Computing Surveys, vol. 56, no. 10, pp. 1–41, 2024.
[23] J. Paul, "Comparative Analysis of Supervised vs. Unsupervised Learning in API Threat Detection," Computers & Security, vol. 126, p. 103075, 2023.
[24] O. A. Ajala et al., "Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time," Magna Scientia Advanced Research and Reviews, vol. 10, no. 1, pp. 312–320, 2024.
[25] V. Hnamte et al., "DDoS attack detection and mitigation using deep neural network in SDN environment," Computers & Security, vol. 138, p. 103661, 2024.
[26] I. A. Kandhro et al., "Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures," IEEE Access, vol. 11, pp. 9136–9148, 2023.
[27] K. S. Suriya, R. Adhithya, and A. H., "Edge-Based Anomaly Detection for IoT Security in Smart Parking Systems," IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5689–5698, 2022.
[28] S. Ahmed et al., "Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron," Future Internet, vol. 15, no. 2, p. 76, 2023.
[29] K. Alam, M. Al Imran, U. Mahmud, and A. Al Fathah, "Cyber Attacks Detection And Mitigation Using Machine Learning In Smart Grid Systems," Journal of Science and Engineering Research, vol. 11, pp. 1–15, 2024.