CYBERSLEUTH AI: INTELLIGENT NETWORK FORENSICS ANALYZER
: Cyber Sleuth AI is an AI-driven network forensics and cyber threat detection system designed to enhance the efficiency and accuracy of cybersecurity operations. The system integrates real-time network traffic monitoring, anomaly detection, and automated digital evidence collection within a unified platform to address modern cyber threats. By utilizing both supervised and unsupervised machine learning techniques, it identifies malicious activities and abnormal behavior patterns while reducing false positives and investigation time. The architecture includes multiple layers such as data collection, AI- based analysis, pattern recognition, and alert management, enabling comprehensive threat detection and forensic investigation. Deep learning models are applied for traffic classification and behavioral analysis, while automated chain-of-custody mechanisms ensure the integrity of digital evidence. Additionally, an interactive dashboard provides real- time visualization of network activity, alerts, and threat insights. Overall, the system offers a scalable, cost- effective, and reliable solution for modern cybersecurity and digital forensic applications.
R.Rajashekar, , Snithik, L., Sourabh, K. & Prashanth, D. (2026). Cybersleuth AI: Intelligent Network Forensics Analyzer. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.400
R.Rajashekar, , et al.. "Cybersleuth AI: Intelligent Network Forensics Analyzer." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.400.
R.Rajashekar, ,L. Snithik,K. Sourabh, and D. Prashanth. "Cybersleuth AI: Intelligent Network Forensics Analyzer." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.400.
2.Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008.
3.Gupta and J. F. George, “Toward the development of a big data analytics capability,” Information & Management, vol. 53, no. 8, pp. 1049–1064, 2016.
4.Boyd and K. Crawford, “Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon,” Information, Communication & Society, vol. 15, no. 5, pp. 662–679, 2012.
5.Dobre and F. Xhafa, “Intelligent services for big data science,” Future Generation Computer Systems, vol. 37, pp. 267–281, 2014.
6.Liu and S. Thompson, “Automated evidence collection in digital forensics,” Digital Investigation, vol. 40, pp. 301–315, 2022.
7.Chen et al., “Machine learning approaches for network security analysis,” Journal of Cybersecurity, vol. 15, no. 2,.156–170, 2023.
8.Williams and K. Brown, “Advanced network traffic analysis using deep learning,” International Journal of Network Security, vol. 24, no. 3, pp. 445–460, 2022.
9.Zhang et al., “LogCraft: An end-to-end unsupervised log anomaly detection framework,” IEEE Transactions on Services Computing, vol. 17, no. 2, pp. 678–691, 2024.