Advancing Intelligent Threat Detection Systems Powered by AI: A Comprehensive Review and Conceptual Framework


Authors : Almash Saifi; Mukul Sharma; Mragesh Pratap Singh

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/ye4vbzsb

DOI : https://doi.org/10.38124/ijisrt/25may2116

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The development of intelligent threat detection systems is required due to the increasing complexity and frequency of cyber attacks. With the use of sophisticated anomaly detection and behavioural analysis, artificial intelligence (AI) has become a crucial element in improving network security. With an emphasis on AI techniques applicable to network behavior analysis, current machine learning algorithms for anomaly detection, theoretical risk evaluation of institutional network threats, and best practices for deploying AI-driven detection systems in real-world networks, this paper provides an extensive review of recent literature on AI-driven threat detection. Additionally, by incorporating knowledge from recent studies and business procedures, we offer a conceptual architecture for an AI-based threat detection system.

References :

  1. Alqahtani, A., & AlShaher, H. (2024). Anomaly-Based Intrusion Detection Systems Using Machine Learning. Journal of Cybersecurity and Information Management, 14(1), 20-33. 
  2. Kimanzi, R., Kimanga, P., Cherori, D., & Gikunda, P. K. (2024). Deep Learning Algorithms Used in Intrusion Detection Systems -- A Review. arXiv preprint arXiv:2402.17020. 
  3. Injadat, M. N., Salo, F., Bou Nassif, A., Essex, A., & Shami, A. (2020). Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection. arXiv preprint arXiv:2008.02327. 
  4. Rahmati, M. (2025). Towards Explainable and Lightweight AI for Real-Time Cyber Threat Hunting in Edge Networks. arXiv preprint arXiv:2504.16118. 
  5. Sewak, M., Sahay, S. K., & Rathore, H. (2022). Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. arXiv preprint arXiv:2206.02733.
  6. Wikipedia contributors. (2025). Adversarial machine learning. In Wikipedia, The Free Encyclopedia. Retrieved from https://en.wikipedia.org/wiki/Adversarial_machine_learning 
  7. Cypher Scoop. (2024). Leveraging Machine Learning for Anomaly Detection in Cybersecurity. Retrieved from https://www.cypherscoop.com/leveraging-machine-learning-anomaly-detection/ 
  8. Journal of Cloud Computing. (2025). AI driven IOMT security framework for advanced malware and ransomware detection in SDN. Retrieved from https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-025-00745-w 
  9. Yubetsu Codex. (2024). A Review of Machine Learning Techniques for Anomaly Detection in Cybersecurity. Retrieved from https://codex.yubetsu.com/article/e5c6468c26e84dd5be8829dcd1346f28 
  10. MDPI Algorithms. (2022). AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection. Retrieved from https://www.mdpi.com/journal/algorithms/special_issues/AI_Cybersecurity_Model 

The development of intelligent threat detection systems is required due to the increasing complexity and frequency of cyber attacks. With the use of sophisticated anomaly detection and behavioural analysis, artificial intelligence (AI) has become a crucial element in improving network security. With an emphasis on AI techniques applicable to network behavior analysis, current machine learning algorithms for anomaly detection, theoretical risk evaluation of institutional network threats, and best practices for deploying AI-driven detection systems in real-world networks, this paper provides an extensive review of recent literature on AI-driven threat detection. Additionally, by incorporating knowledge from recent studies and business procedures, we offer a conceptual architecture for an AI-based threat detection system.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe