IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

AN INTELLIGENT MACHINE LEARNING FRAMEWORK FOR REAL-TIME CYBER THREAT DETECTION IN NETWORK TRAFFIC

AUTHORS:
Jeevaa S R
Mentor
Dr. B. Leelavathi
Affiliation
Department Of Computer Technology Dr. N.G.P. Arts and Science College, Coimbatore
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

There has been a drastic increase in the cyber threats associated with using digital technologies across many areas of our daily lives. Many of us rely heavily on the Internet for things like communicating (chatting/emailing), storing data, etc., so as a result, everyone (big businesses and individuals alike) is subjected to increased risk. Many cybercriminals have become very sophisticated in their methods of invading networks. They have developed different types of malware that can bypass traditional security measures (i.e., firewalls and antivirus software). Therefore, many intrusion detection systems (IDS) do not provide adequate response capabilities against novel or evolving cyberattacks; rather, due to their limited detection methodology, most IDS only recognize established "attack signatures".

Keywords
Article Metrics
Article Views
33
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

R, J. S. (2026). An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.053

R, Jeevaa. "An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.053.

R, Jeevaa. "An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.053.

References
[1] A. Farhan, et al., “Network-based intrusion detection using deep learning integrating DNN and Extra Tree Classifier,” Scientific Reports, vol. 15, 08770, pp. 1–12, 2025.

[2] M. Cantone, C. Marrocco, and A. Bria, “Machine learning in network intrusion detection: A cross-dataset generalization study,” IEEE Access, vol. 12, pp. 3472–3485, 2024.

[3] M. Al Lail, et al., “A comparative study on machine learning-based network intrusion detection,” Future Internet, vol. 15, no. 7, pp. 243, 2023.

[4] P. Kumar and R. Singh, “Real-time network traffic analysis using ML models: A survey,” Journal of Network and Computer Applications, vol. 190, pp. 103–425, 2022.

[5] H. Hindy, D. Brosset, E. Bayne, A. Seeam, C. Tachtatzis, R. Atkinson, and X. Bellekens, “A taxonomy and survey of intrusion detection system design techniques, network threats, and datasets,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1–35, 2021.

[6] M. A. Ferrag, L. Maglaras, A. Ahmim, and H. Janicke, “RDTIDS: Rules and decision tree-based intrusion detection system for Internet-of-Things networks,” Future Internet, vol. 9, no. 3, pp. 1–16, 2017.

[7] G. Creech and J. Hu, “A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns,” IEEE Transactions on Computers, vol. 63, no. 4, pp. 807–819, 2014.

[8] R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2010, pp. 305–316.

[9] B. Leelavathi, “An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques,” Springer Nature Link, vol. pp 1054–1064, 2019
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Data Leakage Detection and Prevention System
string(12) "HARI HARAN S" S, H. H.
(2026)
DOI: 10.55041/ijsmt.v2i3.311
Archival Silence and Forensic Memory: Contesting Truth in Anil’s Ghost within Postcolonial Sri Lanka
string(22) "Murthy Shrihitha Reddy" Reddy, M. S.
(2026)
DOI: 10.55041/ijsmt.v2i3.283
Isolation of Trichoderma from Soil Sample for Production of Fungicide
string(16) "Reshma Shikalgar" Shikalgar, R.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.441
Scroll to Top