Cyber Shield: Intelligent Cyber Attack Prediction & Real-Time Threat Detection


Authors : Kuldeep Kumar Ratre; M. Kameshwar Rao; Payal Chandrakar

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/savhntkw

DOI : https://doi.org/10.38124/ijisrt/25may2278

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Cyber Shield is an AI-powered cybersecurity platform designed to predict and detect cyber threats in real time. Using supervised machine learning models trained on real- world network traffic, the system accurately classifies malicious activity and supports proactive defense strategies. Built with a Python backend and a React-based frontend, Cyber Shield offers an intuitive interface and scalable, containerized deployment via Docker. It integrates live traffic simulation, real-time prediction, and RESTful APIs for efficient operation. Performance evaluations confirm high accuracy, precision, and responsiveness. By transitioning from reactive detection to predictive intelligence, Cyber Shield demonstrates the practical application of AI in cybersecurity. Future improvements include deep learning integration and automated threat response, making it a robust framework for next-generation digital defense.

References :

  1. N. Moustafa and J. Slay, “UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6. [Online]. Available: https://doi.org/10.1109/MilCIS.2015.7348942
  2. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” in ICISSP 2018: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108–116, 2018. [Online]. Available: https://www.scitepress.org/papers/2018/66339/
  3. A. Roy, S. Cheung, and K. Levitt, “Intrusion Detection through Behavior-Based Anomaly Detection,” in IEEE Network, vol. 9, no. 6, pp. 20–26, 1995. [Online]. Available: https://doi.org/10.1109/65.476987
  4. A. D. Patel, M. Taghavi, K. Bakhtiyari, and J. C. Junior, “An Intrusion Detection and Prevention System in Cloud Computing: A Systematic Review,” in Journal of Network and Computer Applications, vol. 77, pp. 1–17, 2017. [Online]. Available: https://doi.org/10.1016/j.jnca.2016.10.011
  5. C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A Survey of Intrusion Detection Techniques in Cloud,” in Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013. [Online]. Available: https://doi.org/10.1016/j.jnca.2012.05.003
  6. G. Folino, A. Forestiero, and C. Pizzuti, “An Adaptive Distributed Intrusion Detection System Using Cooperating Mobile Agents,” in Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 1137–1151, 2006. [Online]. Available: https://doi.org/10.1016/j.jpdc.2006.04.005
  7. Scikit-learn developers, “Scikit-learn: Machine Learning in Python,” [Online]. Available: https://scikit-learn.org/
  8. M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” in Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. [Online]. Available: https://doi.org/10.1109/CISDA.2009.5356528
  9. I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, MIT Press, 2016. [Online]. Available: https://www.deeplearningbook.org/
  10. S. Shone, P. N. Ng, R. John, and J. H. T. Liu, “A Deep Learning Approach to Network Intrusion Detection,” in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 41–50, 2018. [Online]. Available: https://doi.org/10.1109/TETCI.2017.2758392
  11. H. Hindy, D. Brosset, E. Bayne, et al., “A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets,” in Computer Networks, vol. 160, pp. 1–30, 2019. [Online]. Available: https://doi.org/10.1016/j.comnet.2019.06.004
  12. H. Garcia-Molina, J. D. Ullman, and J. Widom, Database Systems: The Complete Book, 2nd ed., Pearson, 2008.
  13. L. Breiman, “Random Forests,” in Machine Learning, vol. 45, pp. 5–32, 2001. [Online]. Available: https://doi.org/10.1023/A:1010933404324
  14. TensorFlow Developers, “TensorFlow: An End-to-End Open Source Machine Learning Platform,” [Online]. Available: https://www.tensorflow.org/
  15. Docker Inc., “Docker Documentation,” [Online]. Available: https://docs.docker.com/

Cyber Shield is an AI-powered cybersecurity platform designed to predict and detect cyber threats in real time. Using supervised machine learning models trained on real- world network traffic, the system accurately classifies malicious activity and supports proactive defense strategies. Built with a Python backend and a React-based frontend, Cyber Shield offers an intuitive interface and scalable, containerized deployment via Docker. It integrates live traffic simulation, real-time prediction, and RESTful APIs for efficient operation. Performance evaluations confirm high accuracy, precision, and responsiveness. By transitioning from reactive detection to predictive intelligence, Cyber Shield demonstrates the practical application of AI in cybersecurity. Future improvements include deep learning integration and automated threat response, making it a robust framework for next-generation digital defense.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe