IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

CYBERSLEUTH AI: INTELLIGENT NETWORK FORENSICS ANALYZER

AUTHORS:
R.Rajashekar
L. Snithik
K. Sourabh
D. Prashanth
Mentor
Affiliation
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

: Cyber Sleuth AI is an AI-driven network forensics and cyber threat detection system designed to enhance the efficiency and accuracy of cybersecurity operations. The system integrates real-time network traffic monitoring, anomaly detection, and automated digital evidence collection within a unified platform to address modern cyber threats. By utilizing both supervised and unsupervised machine learning techniques, it identifies malicious activities and abnormal behavior patterns while reducing false positives and investigation time. The architecture includes multiple layers such as data collection, AI- based analysis, pattern recognition, and alert management, enabling comprehensive threat detection and forensic investigation. Deep learning models are applied for traffic classification and behavioral analysis, while automated chain-of-custody mechanisms ensure the integrity of digital evidence. Additionally, an interactive dashboard provides real- time visualization of network activity, alerts, and threat insights. Overall, the system offers a scalable, cost- effective, and reliable solution for modern cybersecurity and digital forensic applications.

Keywords
Article Metrics
Article Views
31
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

R.Rajashekar, , Snithik, L., Sourabh, K. & Prashanth, D. (2026). Cybersleuth AI: Intelligent Network Forensics Analyzer. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.400

R.Rajashekar, , et al.. "Cybersleuth AI: Intelligent Network Forensics Analyzer." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.400.

R.Rajashekar, ,L. Snithik,K. Sourabh, and D. Prashanth. "Cybersleuth AI: Intelligent Network Forensics Analyzer." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.400.

References
1.Chen, R. H. Chiang, and V. C. Storey, “Business intelligence and analytics: From big data to big impact,” MIS Quarterly, vol. 36, no. 4, pp. 1165–1188, 2012.

2.Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” Communications of the ACM, vol. 51, no. 1, pp. 107–113, 2008.

3.Gupta and J. F. George, “Toward the development of a big data analytics capability,” Information & Management, vol. 53, no. 8, pp. 1049–1064, 2016.

4.Boyd and K. Crawford, “Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon,” Information, Communication & Society, vol. 15, no. 5, pp. 662–679, 2012.

5.Dobre and F. Xhafa, “Intelligent services for big data science,” Future Generation Computer Systems, vol. 37, pp. 267–281, 2014.

6.Liu and S. Thompson, “Automated evidence collection in digital forensics,” Digital Investigation, vol. 40, pp. 301–315, 2022.

7.Chen et al., “Machine learning approaches for network security analysis,” Journal of Cybersecurity, vol. 15, no. 2,.156–170, 2023.

8.Williams and K. Brown, “Advanced network traffic analysis using deep learning,” International Journal of Network Security, vol. 24, no. 3, pp. 445–460, 2022.

9.Zhang et al., “LogCraft: An end-to-end unsupervised log anomaly detection framework,” IEEE Transactions on Services Computing, vol. 17, no. 2, pp. 678–691, 2024.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Challenges Faced by Local Retail Sellers Due to Online Selling Methods
string(15) "Raghunath Patil" Patil, R.
(2026)
DOI: 10.55041/ijsmt.v2i3.285
Quantum Computing: Principles, Evolution, Applications, and Future Prospects
string(14) "Shabarimuthu P" P, S.
(2026)
DOI: 10.55041/ijsmt.v2i3.307
Design of Eco-Friendly Pavement Using Waste Materials
string(16) "Neeraj P. Tiwari" Tiwari, N. P.et al.
(2026)
DOI: 10.55041/ijsmt.v2i2.005
Scroll to Top