Authors :
A. Pallavi; Jennifer Mary S.; Dr. Girish Kumar D.
Volume/Issue :
Volume 11 - 2026, Issue 4 - April
Google Scholar :
https://tinyurl.com/58eadw89
Scribd :
https://tinyurl.com/2uu7reyt
DOI :
https://doi.org/10.38124/ijisrt/26apr2461
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The increasing use of network-based systems has the increase in cyber threats—such as malware, denial-of-service
attacks, and unauthorized access—has made it clear that traditional security approaches often struggle to identify these
risks in real time. This project proposes an Intelligent Adaptive Cyber Threat Detection System that analyses Network
traffic optimization through adaptive data systems to automatically identify and classify malicious activities. Developed
using Python and the Flask framework, the system allows users to upload network data in CSV format through a web
dashboard, where it is processed and analysed to detect potential threats. The detected results are stored in a MySQL
database and visualized through an interactive dashboard that displays alerts, statistics, and detection accuracy. The system
offers a scalable, user-friendly, and efficient solution for real-time cyber threat monitoring and improved network security.
Keywords :
Cyber Security, an Intelligent Security System Designed for Real-Time Monitoring Incorporates Threat Detection, Network Traffic Evaluation, and Anomaly Identification, Using the Python Flask Framework for Development, CSV-Based Data Handling, a MySQL Database for Storage, and a Web-Based Dashboard for Visualization.
References :
- Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.
- Buczak, A. L., & Guven, E. (2016). A study focusing on data mining and machine learning techniques applied to cybersecurity, particularly for intrusion detection, published in IEEE Communications Surveys & Tutorials.
- Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernández, G., & Vázquez, E. (2009). Research on anomaly-based network intrusion detection, covering methods, system designs, and associated challenges, published in Computers & Security.
- Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A study presenting a deep learning-based method for detecting network intrusions, featured in IEEE Transactions on Emerging Topics in Computational Intelligence.
- Scarfone, K., & Mell, P. (2012). A survey discussing anomaly detection methods and their applications, published in ACM Computing Surveys.
- Chandola, V., Banerjee, A., & Kumar, V. (2009). An overview of anomaly detection techniques, including existing solutions and recent technological advancements, published in Computer Networks.
- Patcha, A., & Park, J. M. (2007). A detailed review of intrusion detection systems, published in Journal of Network and Computer Applications.
- Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications.
- Behl, A., & Behl, K. (2017). A book discussing cybersecurity and cyber warfare concepts, published by Oxford University Press
- Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey examining intrusion detection techniques in cloud computing environments, published in Journal of Network and Computer Applications.
The increasing use of network-based systems has the increase in cyber threats—such as malware, denial-of-service
attacks, and unauthorized access—has made it clear that traditional security approaches often struggle to identify these
risks in real time. This project proposes an Intelligent Adaptive Cyber Threat Detection System that analyses Network
traffic optimization through adaptive data systems to automatically identify and classify malicious activities. Developed
using Python and the Flask framework, the system allows users to upload network data in CSV format through a web
dashboard, where it is processed and analysed to detect potential threats. The detected results are stored in a MySQL
database and visualized through an interactive dashboard that displays alerts, statistics, and detection accuracy. The system
offers a scalable, user-friendly, and efficient solution for real-time cyber threat monitoring and improved network security.
Keywords :
Cyber Security, an Intelligent Security System Designed for Real-Time Monitoring Incorporates Threat Detection, Network Traffic Evaluation, and Anomaly Identification, Using the Python Flask Framework for Development, CSV-Based Data Handling, a MySQL Database for Storage, and a Web-Based Dashboard for Visualization.