Authors :
Almash Saifi; Mukul Sharma; Mragesh Pratap Singh
Volume/Issue :
Volume 10 - 2025, Issue 5 - May
Google Scholar :
https://tinyurl.com/ye4vbzsb
DOI :
https://doi.org/10.38124/ijisrt/25may2116
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The development of intelligent threat detection systems is required due to the increasing complexity and frequency
of cyber attacks. With the use of sophisticated anomaly detection and behavioural analysis, artificial intelligence (AI) has
become a crucial element in improving network security. With an emphasis on AI techniques applicable to network behavior
analysis, current machine learning algorithms for anomaly detection, theoretical risk evaluation of institutional network
threats, and best practices for deploying AI-driven detection systems in real-world networks, this paper provides an extensive
review of recent literature on AI-driven threat detection. Additionally, by incorporating knowledge from recent studies and
business procedures, we offer a conceptual architecture for an AI-based threat detection system.
References :
- Alqahtani, A., & AlShaher, H. (2024). Anomaly-Based Intrusion Detection Systems Using Machine Learning. Journal of Cybersecurity and Information Management, 14(1), 20-33.
- Kimanzi, R., Kimanga, P., Cherori, D., & Gikunda, P. K. (2024). Deep Learning Algorithms Used in Intrusion Detection Systems -- A Review. arXiv preprint arXiv:2402.17020.
- Injadat, M. N., Salo, F., Bou Nassif, A., Essex, A., & Shami, A. (2020). Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection. arXiv preprint arXiv:2008.02327.
- Rahmati, M. (2025). Towards Explainable and Lightweight AI for Real-Time Cyber Threat Hunting in Edge Networks. arXiv preprint arXiv:2504.16118.
- Sewak, M., Sahay, S. K., & Rathore, H. (2022). Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. arXiv preprint arXiv:2206.02733.
- Wikipedia contributors. (2025). Adversarial machine learning. In Wikipedia, The Free Encyclopedia. Retrieved from https://en.wikipedia.org/wiki/Adversarial_machine_learning
- Cypher Scoop. (2024). Leveraging Machine Learning for Anomaly Detection in Cybersecurity. Retrieved from https://www.cypherscoop.com/leveraging-machine-learning-anomaly-detection/
- Journal of Cloud Computing. (2025). AI driven IOMT security framework for advanced malware and ransomware detection in SDN. Retrieved from https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-025-00745-w
- Yubetsu Codex. (2024). A Review of Machine Learning Techniques for Anomaly Detection in Cybersecurity. Retrieved from https://codex.yubetsu.com/article/e5c6468c26e84dd5be8829dcd1346f28
- MDPI Algorithms. (2022). AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection. Retrieved from https://www.mdpi.com/journal/algorithms/special_issues/AI_Cybersecurity_Model
The development of intelligent threat detection systems is required due to the increasing complexity and frequency
of cyber attacks. With the use of sophisticated anomaly detection and behavioural analysis, artificial intelligence (AI) has
become a crucial element in improving network security. With an emphasis on AI techniques applicable to network behavior
analysis, current machine learning algorithms for anomaly detection, theoretical risk evaluation of institutional network
threats, and best practices for deploying AI-driven detection systems in real-world networks, this paper provides an extensive
review of recent literature on AI-driven threat detection. Additionally, by incorporating knowledge from recent studies and
business procedures, we offer a conceptual architecture for an AI-based threat detection system.