AN INTELLIGENT MACHINE LEARNING FRAMEWORK FOR REAL-TIME CYBER THREAT DETECTION IN NETWORK TRAFFIC
There has been a drastic increase in the cyber threats associated with using digital technologies across many areas of our daily lives. Many of us rely heavily on the Internet for things like communicating (chatting/emailing), storing data, etc., so as a result, everyone (big businesses and individuals alike) is subjected to increased risk. Many cybercriminals have become very sophisticated in their methods of invading networks. They have developed different types of malware that can bypass traditional security measures (i.e., firewalls and antivirus software). Therefore, many intrusion detection systems (IDS) do not provide adequate response capabilities against novel or evolving cyberattacks; rather, due to their limited detection methodology, most IDS only recognize established "attack signatures".
R, J. S. (2026). An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.053
R, Jeevaa. "An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.053.
R, Jeevaa. "An Intelligent Machine Learning Framework for Real-Time Cyber Threat Detection in Network Traffic." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.053.
[2] M. Cantone, C. Marrocco, and A. Bria, “Machine learning in network intrusion detection: A cross-dataset generalization study,” IEEE Access, vol. 12, pp. 3472–3485, 2024.
[3] M. Al Lail, et al., “A comparative study on machine learning-based network intrusion detection,” Future Internet, vol. 15, no. 7, pp. 243, 2023.
[4] P. Kumar and R. Singh, “Real-time network traffic analysis using ML models: A survey,” Journal of Network and Computer Applications, vol. 190, pp. 103–425, 2022.
[5] H. Hindy, D. Brosset, E. Bayne, A. Seeam, C. Tachtatzis, R. Atkinson, and X. Bellekens, “A taxonomy and survey of intrusion detection system design techniques, network threats, and datasets,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1–35, 2021.
[6] M. A. Ferrag, L. Maglaras, A. Ahmim, and H. Janicke, “RDTIDS: Rules and decision tree-based intrusion detection system for Internet-of-Things networks,” Future Internet, vol. 9, no. 3, pp. 1–16, 2017.
[7] G. Creech and J. Hu, “A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns,” IEEE Transactions on Computers, vol. 63, no. 4, pp. 807–819, 2014.
[8] R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2010, pp. 305–316.
[9] B. Leelavathi, “An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques,” Springer Nature Link, vol. pp 1054–1064, 2019