Authors :
Kuldeep Kumar Ratre; M. Kameshwar Rao; Payal Chandrakar
Volume/Issue :
Volume 10 - 2025, Issue 5 - May
Google Scholar :
https://tinyurl.com/savhntkw
DOI :
https://doi.org/10.38124/ijisrt/25may2278
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Cyber Shield is an AI-powered cybersecurity platform designed to predict and detect cyber threats in real time.
Using supervised machine learning models trained on real- world network traffic, the system accurately classifies
malicious activity and supports proactive defense strategies. Built with a Python backend and a React-based frontend,
Cyber Shield offers an intuitive interface and scalable, containerized deployment via Docker. It integrates live traffic
simulation, real-time prediction, and RESTful APIs for efficient operation. Performance evaluations confirm high
accuracy, precision, and responsiveness. By transitioning from reactive detection to predictive intelligence, Cyber Shield
demonstrates the practical application of AI in cybersecurity. Future improvements include deep learning integration and
automated threat response, making it a robust framework for next-generation digital defense.
References :
- N. Moustafa and J. Slay, “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6. [Online]. Available: https://doi.org/10.1109/MilCIS.2015.7348942
- I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” in ICISSP 2018: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108–116, 2018. [Online]. Available: https://www.scitepress.org/papers/2018/66339/
- A. Roy, S. Cheung, and K. Levitt, “Intrusion Detection through Behavior-Based Anomaly Detection,” in IEEE Network, vol. 9, no. 6, pp. 20–26, 1995. [Online]. Available: https://doi.org/10.1109/65.476987
- A. D. Patel, M. Taghavi, K. Bakhtiyari, and J. C. Junior, “An Intrusion Detection and Prevention System in Cloud Computing: A Systematic Review,” in Journal of Network and Computer Applications, vol. 77, pp. 1–17, 2017. [Online]. Available: https://doi.org/10.1016/j.jnca.2016.10.011
- C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A Survey of Intrusion Detection Techniques in Cloud,” in Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013. [Online]. Available: https://doi.org/10.1016/j.jnca.2012.05.003
- G. Folino, A. Forestiero, and C. Pizzuti, “An Adaptive Distributed Intrusion Detection System Using Cooperating Mobile Agents,” in Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 1137–1151, 2006. [Online]. Available: https://doi.org/10.1016/j.jpdc.2006.04.005
- Scikit-learn developers, “Scikit-learn: Machine Learning in Python,” [Online]. Available: https://scikit-learn.org/
- M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” in Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. [Online]. Available: https://doi.org/10.1109/CISDA.2009.5356528
- I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016. [Online]. Available: https://www.deeplearningbook.org/
- S. Shone, P. N. Ng, R. John, and J. H. T. Liu, “A Deep Learning Approach to Network Intrusion Detection,” in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, 2018. [Online]. Available: https://doi.org/10.1109/TETCI.2017.2758392
- H. Hindy, D. Brosset, E. Bayne, et al., “A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets,” in Computer Networks, vol. 160, pp. 1–30, 2019. [Online]. Available: https://doi.org/10.1016/j.comnet.2019.06.004
- H. Garcia-Molina, J. D. Ullman, and J. Widom, Database Systems: The Complete Book, 2nd ed., Pearson, 2008.
- L. Breiman, “Random Forests,” in Machine Learning, vol. 45, pp. 5–32, 2001. [Online]. Available: https://doi.org/10.1023/A:1010933404324
- TensorFlow Developers, “TensorFlow: An End-to-End Open Source Machine Learning Platform,” [Online]. Available: https://www.tensorflow.org/
- Docker Inc., “Docker Documentation,” [Online]. Available: https://docs.docker.com/
Cyber Shield is an AI-powered cybersecurity platform designed to predict and detect cyber threats in real time.
Using supervised machine learning models trained on real- world network traffic, the system accurately classifies
malicious activity and supports proactive defense strategies. Built with a Python backend and a React-based frontend,
Cyber Shield offers an intuitive interface and scalable, containerized deployment via Docker. It integrates live traffic
simulation, real-time prediction, and RESTful APIs for efficient operation. Performance evaluations confirm high
accuracy, precision, and responsiveness. By transitioning from reactive detection to predictive intelligence, Cyber Shield
demonstrates the practical application of AI in cybersecurity. Future improvements include deep learning integration and
automated threat response, making it a robust framework for next-generation digital defense.