Smart Detection of High Traffic Network Vulnerable Attacks using Artificial Intelligence


Authors : Anusha Yella

Volume/Issue : Volume 10 - 2025, Issue 6 - June


Google Scholar : https://tinyurl.com/mr3evah4

DOI : https://doi.org/10.38124/ijisrt/25jun698

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : With greater dependence on technology and the availability of internet connectivity, attacks over the network have increased, so it is essential to be able to mitigate these threats. It is a time-consuming process that involves constant monitoring and immediate responses for possible incidents. With intelligent and proactive network security on the table, artificial intelligence (AI) is beginning to rise as a probable answer. AI systems can process such a huge pack of data in seconds, detecting strange shapes - or alerts encourage the need for any action usually to be taken. It helps ensure the vulnerabilities, when detected, can be mitigated in time, preventing further damage to networks out of these anomalies. Because AI can learn from data and adapt or evolve its model based on new ant patterns, it is very good at spotting emerging threats using machine learning algorithms. It can also help differentiate between actual attacks and false alarms, reducing the time and resources needed for manual verification. This smart way to handle network security increases threat detection efficiency and accuracy while at the same time decreasing response times, which serves to reduce attack impact alongside damage.

Keywords : Dependence, Availability, Intelligence, Differentiate, Accuracy.

References :

  1. Siva Shankar, S., Hung, B. T., Chakrabarti, P., Chakrabarti, T., & Parasa, G. (2024). A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system. Education and Information Technologies, 29(4), 3859-3883.
  2. Ji, I. H., Lee, J. H., Kang, M. J., Park, W. J., Jeon, S. H., & Seo, J. T. (2024). Artificial intelligence-based anomaly detection technology over encrypted traffic: a systematic literature review. Sensors, 24(3), 898.
  3. Muneer, S., Farooq, U., Athar, A., Ahsan Raza, M., Ghazal, T. M., & Sakib, S. (2024). A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis. Journal of Engineering, 2024(1), 3909173.
  4. Ozkan-Ozay, M., Akin, E., Aslan, Ö., Kosunalp, S., Iliev, T., Stoyanov, I., & Beloev, I. (2024). A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions. IEEE Access.
  5. Almehdhar, M., Albaseer, A., Khan, M. A., Abdallah, M., Menouar, H., Al-Kuwari, S., & Al-Fuqaha, A. (2024). Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks. IEEE Open Journal of Vehicular Technology.
  6. Karacayılmaz, G., & Artuner, H. (2024). A novel approach detection for IIoT attacks via artificial intelligence. Cluster Computing, 1-19.
  7. Duary, S., Choudhury, P., Mishra, S., Sharma, V., Rao, D. D., & Aderemi, A. P. (2024, February). Cybersecurity Threats Detection in Intelligent Networks using Predictive Analytics Approaches. In 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM) (pp. 1-5). IEEE.
  8. Zhang, H. (2024, April). Research on Vulnerability Detection System of Instant Communication Network Based on Artificial Intelligence. In 2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT) (pp. 340-346). IEEE.
  9. Fei, W. (2024). Research on optimization algorithms for artificial intelligence network security management based on All IP Internet of Things fusion technology. Computers and Electrical Engineering, 115, 109105.
  10. Pala, S. K. Study to Develop AI Models for Early Detection of Network Vulnerabilities. International Journal of Enhanced Research in Science, Technology & Engineering ISSN, 2319-7463.
  11. Lan, D., Xu, P., Nong, J., Song, J., & Zhao, J. (2024). Application of Artificial Intelligence Technology in Vulnerability Analysis of Intelligent Ship Network. International Journal of Computational Intelligence Systems, 17(1), 147.
  12. Al-Rubaye, R. H. K., & TÜRKBEN, A. K. (2024). Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks. Babylonian Journal of Networking, 2024, 45-56.
  13. Khalil, A., Farman, H., Nasralla, M. M., Jan, B., & Ahmad, J. (2024). Artificial Intelligence-based intrusion detection system for V2V communication in vehicular adhoc networks. Ain Shams Engineering Journal, 15(4), 102616.
  14. V. L. B. Sunkara, “A smart threat detection model for complex routing networks using AI-based recurrent neural networks,” Int. J. Comput. Eng. Technol. (IJCET), vol. 16, no. 1, pp. 3243–3259, 2025. [Online]. Available: https://doi.org/10.34218/IJCET_16_01_226
  15. Michelena, Á., Aveleira‐Mata, J., Jove, E., Bayón‐Gutiérrez, M., Novais, P., Romero, O. F., ... & Aláiz‐Moretón, H. (2024). A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert Systems, 41(2), e13263.
  16. Shahin, M., Maghanaki, M., Hosseinzadeh, A., & Chen, F. F. (2024). Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems. Advanced Engineering Informatics, 62, 102685.
  17. A. Musunuri, “An AI-Based Neural Network Framework for Detecting Anomalies in E-Commerce Platforms,” International Journal of Multidisciplinary Research in Science, Engineering and Technology, vol. 6, no. 5, pp. 992-999, May 2023.
  18. S. D. Kalagarla, "AI-driven case management in eLicensing/ePermitting: Implementation, impact, and innovation," Int. J. Comput. Eng. Technol., vol. 16, no. 1, pp. 2362–2379, Jan.–Feb. 2025. [Online]. Available: https://doi.org/10.34218/IJCET_16_01_169.
  19. P. K. Sharma, "Transforming business efficiency through generative artificial intelligence-driven automation," Int. J. Innov. Res. Comput. Commun. Eng., vol. 11, no. 4, pp. xx–xx, 2023. [Online]. Available: https://doi.org/10.15680/IJIRCCE.2023.1104002.
  20. V. R. K. Dabbir, "Optimizing Supply Chain Management Using Deepgenerative Models," Int. Res. J. Modernization Eng. Technol. Sci., vol. 07, no. 2, pp. 1775–1782, 2023. [Online]. Available: https://doi.org/10.56726/IRJMETS67435.

With greater dependence on technology and the availability of internet connectivity, attacks over the network have increased, so it is essential to be able to mitigate these threats. It is a time-consuming process that involves constant monitoring and immediate responses for possible incidents. With intelligent and proactive network security on the table, artificial intelligence (AI) is beginning to rise as a probable answer. AI systems can process such a huge pack of data in seconds, detecting strange shapes - or alerts encourage the need for any action usually to be taken. It helps ensure the vulnerabilities, when detected, can be mitigated in time, preventing further damage to networks out of these anomalies. Because AI can learn from data and adapt or evolve its model based on new ant patterns, it is very good at spotting emerging threats using machine learning algorithms. It can also help differentiate between actual attacks and false alarms, reducing the time and resources needed for manual verification. This smart way to handle network security increases threat detection efficiency and accuracy while at the same time decreasing response times, which serves to reduce attack impact alongside damage.

Keywords : Dependence, Availability, Intelligence, Differentiate, Accuracy.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe