⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Intelligent Adaptive Cyber Threat Detection System Using Machine Learning


Authors : A. Pallavi; Jennifer Mary S.; Dr. Girish Kumar D.

Volume/Issue : Volume 11 - 2026, Issue 4 - April


Google Scholar : https://tinyurl.com/58eadw89

Scribd : https://tinyurl.com/2uu7reyt

DOI : https://doi.org/10.38124/ijisrt/26apr2461

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The increasing use of network-based systems has the increase in cyber threats—such as malware, denial-of-service attacks, and unauthorized access—has made it clear that traditional security approaches often struggle to identify these risks in real time. This project proposes an Intelligent Adaptive Cyber Threat Detection System that analyses Network traffic optimization through adaptive data systems to automatically identify and classify malicious activities. Developed using Python and the Flask framework, the system allows users to upload network data in CSV format through a web dashboard, where it is processed and analysed to detect potential threats. The detected results are stored in a MySQL database and visualized through an interactive dashboard that displays alerts, statistics, and detection accuracy. The system offers a scalable, user-friendly, and efficient solution for real-time cyber threat monitoring and improved network security.

Keywords : Cyber Security, an Intelligent Security System Designed for Real-Time Monitoring Incorporates Threat Detection, Network Traffic Evaluation, and Anomaly Identification, Using the Python Flask Framework for Development, CSV-Based Data Handling, a MySQL Database for Storage, and a Web-Based Dashboard for Visualization.

References :

  1. Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.
  2. Buczak, A. L., & Guven, E. (2016). A study focusing on data mining and machine learning techniques applied to cybersecurity, particularly for intrusion detection, published in IEEE Communications Surveys & Tutorials.
  3. Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernández, G., & Vázquez, E. (2009). Research on anomaly-based network intrusion detection, covering methods, system designs, and associated challenges, published in Computers & Security.
  4. Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A study presenting a deep learning-based method for detecting network intrusions, featured in IEEE Transactions on Emerging Topics in Computational Intelligence.
  5. Scarfone, K., & Mell, P. (2012). A survey discussing anomaly detection methods and their applications, published in ACM Computing Surveys.
  6. Chandola, V., Banerjee, A., & Kumar, V. (2009). An overview of anomaly detection techniques, including existing solutions and recent technological advancements, published in Computer Networks.
  7. Patcha, A., & Park, J. M. (2007). A detailed review of intrusion detection systems, published in Journal of Network and Computer Applications.
  8. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications.
  9. Behl, A., & Behl, K. (2017). A book discussing cybersecurity and cyber warfare concepts, published by Oxford University Press
  10. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey examining intrusion detection techniques in cloud computing environments, published in Journal of Network and Computer Applications.

The increasing use of network-based systems has the increase in cyber threats—such as malware, denial-of-service attacks, and unauthorized access—has made it clear that traditional security approaches often struggle to identify these risks in real time. This project proposes an Intelligent Adaptive Cyber Threat Detection System that analyses Network traffic optimization through adaptive data systems to automatically identify and classify malicious activities. Developed using Python and the Flask framework, the system allows users to upload network data in CSV format through a web dashboard, where it is processed and analysed to detect potential threats. The detected results are stored in a MySQL database and visualized through an interactive dashboard that displays alerts, statistics, and detection accuracy. The system offers a scalable, user-friendly, and efficient solution for real-time cyber threat monitoring and improved network security.

Keywords : Cyber Security, an Intelligent Security System Designed for Real-Time Monitoring Incorporates Threat Detection, Network Traffic Evaluation, and Anomaly Identification, Using the Python Flask Framework for Development, CSV-Based Data Handling, a MySQL Database for Storage, and a Web-Based Dashboard for Visualization.

Paper Submission Last Date
31 - May - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe