Results for 'threat detection'

987 found
Order:
  1. AI-Driven Threat Detection in Multi-Cloud Environments: A Proactive Security Approach.Afreen Sajida Siddique Samar Nilesh Dasgupta - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (1):4142-4145.
    The proliferation of multi-cloud architectures has introduced significant complexities in cyber security, necessitating advanced solutions to safeguard distributed infrastructures. Traditional security models often fall short in addressing the dynamic and heterogeneous nature of multi-cloud environments. Artificial Intelligence (AI) has emerged as a transformative force in enhancing threat detection capabilities, offering proactive and adaptive security measures. This paper explores the integration of AI - driven threat detection systems within multi-cloud frameworks, emphasizing their role in identifying and mitigating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Real-Time Cyber Threat Detection and Response System.P. Abirami V. Phanikumar, V. Venkata Nani, V. Premkumar, Y. Nithish Naidu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The Real-Time Cyber Threat Detection and Response System is an intelligent security framework designed to proactively identify, analyze, and respond to cyber threats in real time. With the growing sophistication of cyberattacks targeting critical infrastructure, traditional static defense mechanisms are no longer sufficient. This system addresses that gap by leveraging machine learning algorithms and dimensionality reduction techniques such as Principal Component Analysis (PCA) to enable accurate and efficient threat detection. The system captures input data, such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Looking for trouble: A common threat-detection mechanism underlying pain, fear, and anxiety.Luca Barlassina - forthcoming - Mind and Language.
    I put forward a novel cognitive architecture for pain, fear, and anxiety, according to which these three capacities are underpinned by a common threat-detection mechanism. This mechanism takes information about potential threats as input, assesses whether the threat is actual and, if it deems it is, outputs a threat representation. If this is correct, pain, fear, and anxiety turn out to be different manifestations of the same cognitive mechanism. I defend my proposal by discussing a large (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Response.B. Yogeshwari - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (3):2217-2223.
    The rapid evolution of cyber threats has made traditional cybersecurity methods increasingly inadequate. Artificial Intelligence (AI) has emerged as a transformative technology in the field of cybersecurity, offering enhanced capabilities for detecting and responding to cyber threats in real time. This paper explores the role of AI in revolutionizing cybersecurity, focusing on its applications in threat detection, anomaly detection, and automated response systems. Through the use of machine learning algorithms, AI can analyze vast amounts of data, identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Performance-Based Threat Detection in Cloud Environments.Iyer Arjun Mohan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    Cloud computing environments, with their vast scale and dynamic nature, are prime targets for cyber- attacks. The effectiveness of traditional security systems is often limited due to high false-positive rates, delayed response times, and resource constraints. Performance-based threat detection (PB-TD) represents an innovative approach that focuses on leveraging system performance metrics (e.g., CPU usage, memory utilization, network traffic) to identify anomalies indicative of potential security threats. This paper explores the application of performance-based metrics to enhance the accuracy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Securing Software-Defined Networks: Threat Detection and Mitigation Strategies in Programmable Infrastructure.Parsons Nate - 2019 - International Journal of Advanced Research in Education and Technology 6 (1):31-34.
    As Software-Defined Networking (SDN) gained traction in 2018, its separation of the control and data planes introduced both architectural flexibility and new security challenges. This research investigates the attack vectors specific to SDN environments—such as controller hijacking, flow rule manipulation, and DoS targeting centralized control. The study evaluates threat detection techniques including flow anomaly analysis, policy validation, and controller redundancy. It also proposes a hybrid intrusion prevention model that combines machine learning with rule-based policies for real-time mitigation. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. AI Powered SOCs Detect and Respond to Cyber Security Threats in Real Time by using Deep Learning.Kadari Rohith DrK V. Shiny - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The increasing complexity and volume of cyber threats necessitate a more advanced and proactive approach to cybersecurity. Traditional Security Operations Centers (SOCs) rely on rule-based systems and manual analysis, which are often insufficient to counter evolving attack vectors. Artificial Intelligence (AI), particularly Machine Learning (ML) and Blockchain technology, has emerged as a game-changer in enhancing SOC operations, improving threat detection, response, and mitigation capabilities. Machine Learning algorithms can analyze vast amounts of security data in real time, identifying anomalies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Real-Time Malware Detection Using Machine Learning Algorithms.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-8.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  11. Threat Forecasting - Machine Learning Applications in Next-Generation Identity Protection.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4769-4776.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Intelligent Detection of Fake Profiles on Social Media Using Machine Learning.V. Revathi - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-6.
    Social networking platforms play a vital role in global communication, but they are increasingly vulnerable to security threats due to the presence of fake profiles. Fraudulent accounts are often created for misinformation, cyber fraud, identity theft, cyberbullying, and unauthorized data harvesting, compromising user privacy and damaging the credibility of social media platforms. While existing security systems, such as Facebook's Immune System (FIS), attempt to detect fake accounts, they struggle against sophisticated fraudulent profiles. Traditional detection methods primarily rely on static (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Smart Instruction Detection for IOT Network using BOT Dataset.Polamada Obi Reddy Dr M. Maruthupermal - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9328-9333.
    IoT Security Enhancement Using Machine Learning for Real-Time Threat Detection. The Internet of Things (IoT) is a network of interconnected devices that communicate over the internet, offering convenience and efficiency but also posing significant security risks. This project focuses on enhancing IoT security by detecting cyber threats such as DDoS, DoS, reconnaissance, and data theft in real-time. The main objective is to improve the accuracy and efficiency of threat detection using machine learning models like Random Forest. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Spammer Detection and Fake user Identification on Social Networks.K. Samanth Kumar M. Saketh Reddy, K. Manoj Sagar, R. Saketh, S. Saketh, CHSakshitha - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4):6267-6271.
    With the exponential growth of online social networks, now boasting over 4 billion active users, maintaining data integrity and ensuring user security has become increasingly challenging. Social media platforms face numerous security threats, including the creation of fake profiles by malicious users seeking to steal sensitive information, spread misinformation, or engage in fraudulent activities. Due to the anonymity afforded by these platforms, detecting such deceptive accounts manually is both difficult and inefficient. This project focuses on the detection of fake (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. AI-powered phishing detection: Integrating natural language processing and deep learning for email security.Saswata Dey - 2023 - World Journal of Advanced Engineering Technology and Sciences 2023 (10(02)):394-415.
    Phishing attacks are major threats to email security and pose challenges, while cyber attackers utilize increasingly sophisticated means to deceive the user and steal away important information. Well-established ways of detecting phishing attacks, such as rule-based systems or simple machine-learning models, usually cannot deal efficiently with such advanced threats. This research proposes an approach to detect phishing attacks on email systems, which deploys natural language processing and deep learning technologies. The method proposes to improve the detection accuracies and efficiencies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud (...) systems. By synergizing advanced visualization tools with machine learning algorithms, the study aims to provide insights into how financial institutions can bolster their defenses against evolving threats. Ethical considerations, usability, and the real-world impact of data visualization in combating financial crime are also scrutinized. This research contributes to the evolving discourse on leveraging visualization technologies to fortify financial systems against illicit activities, fostering a proactive and responsive approach to safeguarding economic ecosystems. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  18. Proactive Cybersecurity: Predictive Analytics and Machine Learning for Identity and Threat Management.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (12):17488-17496.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Proactive Cybersecurity: Predictive Analytics and Machine Learning for Identity and Threat Management.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (12):17488-17496.
    Due to the development of advanced identity based attacks and even complex cyber threats, merely possessing defensive cyber security capabilities is not enough today. In this study, we investigate how predictive analytics based machine learning (ML) can be employed for pro-active identity management and threat detection. In this study, the authors assess some models of machine learning – Decision Trees, Random Forests, Support Vector Machines (SVM), and a new hybrid one – to determine which best allows for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Synthetic Media Detection, the Wheel, and the Burden of Proof.Keith Raymond Harris - 2024 - Philosophy and Technology 37 (4):1-20.
    Deepfakes and other forms of synthetic media are widely regarded as serious threats to our knowledge of the world. Various technological responses to these threats have been proposed. The reactive approach proposes to use artificial intelligence to identify synthetic media. The proactive approach proposes to use blockchain and related technologies to create immutable records of verified media content. I argue that both approaches, but especially the reactive approach, are vulnerable to a problem analogous to the ancient problem of the criterion—a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. AI vs Cyber Threats: Real-World Case Studies on Securing Healthcare Data.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):396-404.
    The increasing rate and sophistication of cyber attacks pose a major risk to health data security. Traditional security systems cannot handle advanced ransomware, insider threats, and phishing attacks and hence incorporation of artificial intelligence (AI) into cybersecurity solutions becomes the need of the hour. AI-based security solutions leverage machine learning, behavior analysis, and real-time anomaly detection to identify and counter threats before they affect sensitive patient information. This study examines real-world case studies where AI successfully prevented cyberattacks in healthcare (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  23. Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  24. Phishing Website Detection using Ensemble Machine Learning Approach.MohammadAsif Dr R. J. Aarthi - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    Phishing attacks pose a significant threat to online security by tricking users into revealing sensitive information through deceptive websites. These attacks are frequently used as entry points for broader cyber intrusions, risking both personal and organizational data. Traditional detection systems often rely on predefined rules or manual feature extraction, which limits their effectiveness, especially against new or zero-day phishing threats. To overcome these limitations, this project proposes an intelligent phishing website detection system utilizing an ensemble machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Smart IoT-Based Wildlife Detection & Crop Protection System.P. Jayashri Vaishnavi V., Sowmiya S., Nivya E. V., DrK. Poornapriya, DrS. Roshini - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    Agricultural productivity is significantly impacted by wildlife intrusion and unfavourable environmental conditions, necessitating the integration of modern technology to enhance crop protection and growth monitoring. This project presents an intelligent IoT and sensor-based automation system designed to safeguard crops while ensuring optimal growth conditions. The system incorporates multiple sensors to monitor environmental parameters and detect potential threats in real time. A soil moisture sensor continuously assesses soil moisture levels, and when low moisture is detected, it automatically activates a water motor (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Deepfake Video Detection using Transfer Learning.Athithya M. Anlin C. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    : Deepfake technology enables the creation of hyper-realistic fake videos, posing significant threats in domains like politics, law enforcement, and cybersecurity. This project proposes a deepfake detection framework leveraging facial feature embeddings using FaceNet512, followed by classification through transfer learning models. Unlike traditional CNN-based detectors that analyze full video frames, this method isolates and processes facial data, ensuring higher efficiency and accuracy. Additionally, a real-time email alert system notifies users upon deepfake detection. Evaluation across benchmark datasets like DFDC (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Online Recruitment Fraud (ORF) Detection using Deep Learning.Yuvaraj S. Dinesh Kumar V. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    : The rise of digital platforms for job recruitment has brought with it a growing threat of fraudulent job postings, undermining the trust and safety of online hiring systems. This paper proposes an advanced fraud detection system based on the ALBERT (A Lite BERT) model to identify fraudulent job postings. The system will utilize a dataset created by merging job postings from multiple sources to better capture both legitimate and fraudulent job listings. A comprehensive pre-processing pipeline, including data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques to improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Real-Time DDoS Detection using XGBOOST and Lightgbm in SDN.Gottapu Pavan Kumar DrD Bhavana - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    The increasing prevalence of Distributed Denial-of-Service (DDoS) attacks in Software- Defined Networking (SDN)-based IoT environments poses a significant security challenge. Existing detection methods often suffer from limited accuracy, high false positive rates, and poor scalability, leading to delayed mitigation and network disruptions. This project proposes an ensemble learning approach combining K-Nearest Neighbors (KNN) and Light GBM to enhance real-time DDoS attack detection and mitigation. KNN efficiently classifies network traffic based on proximity, while Light GBM utilizes gradient boosting to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Collaborative Anomaly Detection in IoT Using Federated Deep Learning.Bansal Riya Anjali - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (5).
    With the exponential growth of the Internet of Things (IoT), ensuring the security of IoT devices and networks has become a significant challenge. Anomaly detection techniques play a pivotal role in identifying unusual behaviors that may indicate cyber threats. Traditional anomaly detection systems often struggle with scalability, privacy concerns, and the need for continuous model improvement. In this paper, we propose a collaborative anomaly detection framework for IoT systems based on Federated Deep Learning (FDL). This framework allows (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Android Malware Detection.Thadukala Sai Kumar K. Kotteeswari, Amugadda Nitish Kumar, Nallagorla Ashok - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9318-9322.
    With the rapid expansion of Android-based mobile applications, ensuring user security and privacy has become a growing concern. Android's open-source nature and widespread adoption have made it a prime target for malware developers. Traditional malware detection approaches, such as signature-based and heuristic techniques, are increasingly insufficient against sophisticated and evolving threats. This project aims to develop an intelligent Android malware detection system using machine learning techniques to identify malicious applications based on behavioral and static features extracted from APK (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. AI and Cybersecurity in 2024: Navigating New Threats and Unseen Opportunities.Tripathi Praveen - 2024 - International Journal of Computer Trends and Technology 72 (8):26-32.
    In 2024, the intersection of artificial intelligence (AI) and cybersecurity presents both unprecedented challenges and significant opportunities. This article explores the evolving landscape of AI-driven cyber threats, the advancements in AI-enabled security measures, and the strategic responses required to navigate these new realities. Leveraging statistics, trends, and expert insights, we delve into how organizations can enhance their cybersecurity posture in the face of sophisticated AI threats.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  34. AI-Powered Network Intrusion Detection Systems.K. Krishnakumar Vikram A., Ammar Hameed Shnain, Rubal Jeet, C. Vennila, Pooja Sahu - 2024 - International Conference on Communication, Computing and Signal Processing 1 (1):1-6.
    This study aims at analyzing and outlining anAI-based NIDS design and comparing different implementation models to improve the current state of network protection. Current NIDS do not assist organizations against modern cyber threats hence relies on machine learning and deep learning for real-time protections. The detailed plan of work includes the use of signature and anomaly detection techniques in parallel and the use of ensemble technique for increasing the detectors capabilities and decrease the false positive rates. The study employs (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Dynamic Intrusion Detection Systems Powered by Machine Learning Algorithms.Sandeep Belidhe Ashish Reddy Kumbham - 2024 - International Journal of Innovative Research in Science, Engineering and Technology (Ijirset) 13 (6):12405-12411.
    This remains the case because cyberattacks are becoming more frequent and sophisticated, and as a result, the IDS must also be innovative and evolving to protect sensitive networks. Traditional intrusion detection techniques are replaced by more advanced and dynamic Methodologies based on Machine Learning (ML) algorithms. These dynamic systems capture significant data flows, search for potentially pathological patterns, and forecast threats in real time. By simulating and analyzing real-time cases, this paper discusses the architecture for ML-based IDS, how this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Decentralized AI for Secure IoT: Federated Learning Meets Intrusion Detection.Sinha Krish Prem - 2019 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 6 (8):1634-1639.
    The proliferation of Internet of Things (IoT) devices has significantly expanded the attack surface for cyber threats, necessitating robust security measures. Traditional Intrusion Detection Systems (IDS) often rely on centralized architectures, which can compromise data privacy and scalability. This paper explores the integration of Federated Learning (FL) into IDS for IoT networks, enabling decentralized model training while preserving data privacy. By leveraging local computation and aggregating model updates, FL facilitates collaborative learning across distributed IoT devices. The proposed approach aims (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Sensor-based Water Waste Impurities Detection and Design of Elevator Boat using Raspberry Pi and Motor Drivers.Bhagyashree Chaturkar ProfSupriya Sawashere, Isha Chauragade, Khushbu Godbole, , Atharva Darodkar - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (5).
    This paper explores the development of a sensor-based system for detecting water impurities and designing an elevator-equipped robotic boat for autonomous waste collection. Leveraging RaspberryPi for real- time data processing and motor drivers for precise navigation, this project aims to address the pressing issue of water pollution. The proposed system integrates advanced sensors, robotics, and IoTtechnologies to enhance water quality management. Water pollution poses a significant threat to environmental and public health, driven by the accumulation of chemical impurities and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Deep Learning For Grapevine Disease Detection.Salah-Aldin S. Aldaya & Samy S. Abu-Naser - 2025 - International Journal of Academic Information Systems Research (IJAISR) 9 (6):12-20.
    The global cultivation of grapes reaches approximately 77.8 million tons annually, according to the International Organization of Vine and Wine. While grapes remain a vital agricultural commodity and dietary staple worldwide, their production faces serious threats from common diseases like black rot, Esca, and leaf blight. Current disease detection methods in modern vineyards primarily depend on manual visual inspection, a practice that often delays diagnosis and leads to reduced yields and compromised fruit quality. The integration of automated detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. End - to - End Deep Learning for Detecting Web Attacks.C. Gnanendra DrK Upendra Babu - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9380-9387.
    Web attacks, such as SQL injection, cross-site scripting (XSS), and distributed denial-ofservice (DDoS), pose significant threats to the security and integrity of online systems. Traditional detection methods, relying on rulebased systems or shallow machine learning, often struggle to keep pace with the evolving sophistication of these attacks. This paper proposes an end-to-end deep learning framework for detecting web attacks, leveraging the power of neural networks to automatically learn complex patterns and features from raw web traffic data. Unlike conventional approaches (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) techniques with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, case (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  46. Automated Cyber Threat Identification and Natural Language Processing.Kuruvamanikindi Venkatesh, M. Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja & Dr K. Pavan Kumar - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    The time window between the disclosure of a new cyber vulnerability and its use by cybercriminals has been getting smaller and smaller over time. Recent episodes, such as the Log4j vulnerability, exemplify this well. Within hours after the exploit being released, attackers started scanning the internet looking for vulnerable hosts to deploy threats like crypto currency miners and ransom ware on vulnerable systems. Thus, it becomes imperative for the cybersecurity defense strategy to detect threats and their capabilities as early as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Generative AI in Digital Insurance: Redefining Customer Experience, Fraud Detection, and Risk Management.Adavelli Sateesh Reddy - 2024 - International Journal of Computer Science and Information Technology Research 5 (2):41-60.
    This abstract summarizes, in essence, what generative AI means to the insurance industry. The kind of promise generated AI offers to insurance is huge: in risk assessment, customer experience, and operational efficiency. Natural disaster impact, financial market volatility, and cyber threat are augmented with techniques of real time scenario generation and modeling as well as predictive simulation based on synthetic data. One of the challenges that stand in the way of deploying these AI methods, however, is data privacy, model (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Illegal Migration in India: Threats and Strategic Solutions for National Security and Socioeconomic Stability.Divyanshu Kumar Jha - manuscript - Translated by Divyanshu Kumar Jha.
    Illegal migration has become a critical and ongoing challenge for India, affecting the country’s national security, economic stability, and social harmony. This paper focuses specifically on individuals who enter or remain in India without legal authorization and engage in criminal activities, misuse public resources, or violate laws. Unlike legal migrants or refugees who seek protection and contribute positively, these unauthorized migrants often strain India’s infrastructure and public services, creating challenges for law enforcement and governance. This study analyzes the risks posed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Cloudshield: The Future of Cloud Security.Asma Tabassum Ateeb Baig H. - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):493-497.
    Cloud computing has become an integral part of modern IT infrastructure, enabling organizations to store, process, and manage data with unprecedented flexibility and scalability. However, as more critical and sensitive data moves to the cloud, the need for robust security mechanisms becomes increasingly vital. This paper introduces "CloudShield," a forward-thinking security framework designed to address the emerging challenges of cloud security. We explore the core components of this model, including AI-powered threat detection, enhanced encryption protocols, decentralized access management, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. AI-Powered Cloud Security: Revolutionizing Cyber Defense in the Digital Age.V. Talati Dhruvitkumar - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (3):4762-4768.
    The rapid evolution of cloud computing and the increasing sophistication of cyber threats have necessitated a paradigm shift in the approach to cybersecurity. The rapid growth of cloud computing has revolutionized business operations with unparalleled scalability, flexibility, and access to enormous computational power. Nevertheless, exponential growth has also led to an exponential rise in security threats, with cloud environments being the main target for cyberattacks. Conventional security controls lag behind the rising complexity of these threats. Artificial intelligence (AI) has become (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987