AI-Driven Cybersecurity Threat Detection: Building Resilient ‎Defense Systems Using Predictive Analytics

  • Authors

    • Biswajit Chandra Das Associate degree in Computer Science, Los Angeles City College
    • M Saif Sartaz Electrical Engineering and Computer Science, Florida Atlantic University
    • Syed Ali Reza Department of Data Analytics, University of the Potomac (UOTP), Washington, USA
    • Arat Hossain Information Technology Management, St Francis College.
    • Md Nasiruddin Department of Management Science and Quantitative Methods, Gannon University, Erie, PA, USA
    • Kanchon Kumar Bishnu MS in Computer Science, California State University, Los Angeles
    • Kazi Sharmin Sultana MBA in Business Analytics, Gannon University, Erie, PA
    • Sadia Sharmeen Shatyi Master of Architecture, Louisiana State University
    • MD Azam Khan School of Business, International American University, Los Angeles, California, USA.
    • Joynal Abed Master of Architecture, Miami University, Oxford, Ohio.
    https://doi.org/10.14419/hysdg957

    Received date: July 23, 2025

    Accepted date: July 29, 2025

    Published date: August 2, 2025

  • Anomaly Detection; Autoencoder; Cybersecurity; Predictive Modeling; LSTM; Threat Detection; UEBA; XGBoost
  • Abstract

    This study examines how Artificial Intelligence can aid in identifying and mitigating cyber threats in the U.S. across four key areas: intru-‎sion detection, malware classification, phishing detection, and insider threat analysis. Each of these problems has its quirks, meaning there ‎needs to be different approaches to each, so we matched the models to the shape of the problem. For intrusion detection, catching things like ‎unauthorized access, we tested unsupervised anomaly detection methods. Isolation forests and deep autoencoders both gave us useful sig-‎nals by picking up odd patterns in network traffic. When it came to malware detection, we leaned on ensemble models like Random Forest ‎and XGBoost, trained on features pulled from files and traffic logs. Phishing was more straightforward. We fed standard classifiers (logistic ‎regression, Random Forest, XGBoost) a mix of email and web-based features. These models handled the task surprisingly well; phishing ‎turned out to be the easiest problem to crack, at least with the data we had. There was a different story. We utilized an LSTM autoencoder to ‎identify behavioral anomalies in user activity logs. It caught every suspicious behavior but flagged a lot of harmless ones too. That kind of ‎model makes sense when the cost of missing a threat is high and you’re willing to sift through some noise. What we saw across the board is ‎that performance wasn’t about stacking the most complex model. What mattered was how well the model’s structure matched the way the ‎data behaved. When signals were strong and obvious, simple models worked fine. But for messier, more subtle threats, we needed some-‎thing more adaptive, sequence models and anomaly detectors, though they brought their trade-offs. The takeaway here is clear: in cybersecu-‎rity, context drives the solution. There’s no universal model that works for everything. The smart move is to build systems that fit the prob-‎lem, and more importantly, evolve with it. Threats don’t sit still, and neither should our defenses‎.

  • References

    1. Ahmed, I., Mahmood, A. N., & Hu, J. (2021). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 136, 1–23.
    2. Almomani, A., Al-Ameen, M. N., & Florea, A. M. (2023). A survey of signature‐based intrusion detection systems: limitations and future directions. ACM Computing Surveys, 56(3), 1–38.
    3. Berman, F., Juels, A., & Westhoff, D. (2019). Insider threat detection in enterprise systems via behavior analytics. IEEE Security & Privacy, 17(2), 68–75.
    4. Billah, M., Shatyi, S. S., Sadnan, G. A., Hasnain, K. N., Abed, J., Begum, M., & Sultana, K. S. (2024). Performance Optimization in Multi-Machine Blockchain Systems: A Comprehensive Benchmarking Analysis. Journal of Business and Management Studies, 6(6), 357–375. https://doi.org/10.32996/jbms.2024.6.6.18.
    5. Buiya, M. R., Laskar, A. N., Islam, M. R., Sawalmeh, S. K. S., Roy, M. S. R. C., Roy, R. E. R. S., & Sumsuzoha, M. (2024). Detecting IoT Cyberattacks: Advanced Machine Learning Models for Enhanced Security in Network Traffic. Journal of Computer Science and Technology Stud-ies, 6(4), 142–152. https://doi.org/10.32996/jcsts.2024.6.4.16.
    6. Chio, C., & Freeman, D. (2018). Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly Media.
    7. Fariha, N., Khan, M. N. M., Hossain, M. I., Reza, S. A., Bortty, J. C., Sultana, K. S., ... & Begum, M. (2025). Advanced fraud detection using ma-chine learning models: enhancing financial transaction security. arXiv preprint arXiv:2506.10842. https://doi.org/10.14419/c73kcb17.
    8. Hossain, S., Miah, M. N. I., Rana, M. S., Hossain, M. S., Bhowmik, P. K., & Rahman, M. K. (2025). Analyzing trends and determinants of leading causes of death in the USA: A data-driven approach. Journal of Big Data, 11(1), 1–24.
    9. Islam, M. R., Nasiruddin, M., Karmakar, M., Akter, R., Khan, M. T., Sayeed, A. A., & Amin, A. (2024). Leveraging Advanced Machine Learning Algorithms for Enhanced Cyberattack Detection on US Business Networks. Journal of Business and Management Studies, 6(5), 213–224. https://doi.org/10.32996/jbms.2024.6.5.23.
    10. Jakir, T., et al. (2023). Machine Learning-Powered Financial Fraud Detection: Building Robust Predictive Models for Transactional Security. Jour-nal of Economics, Finance and Accounting Studies, 5(5), 161–180. https://doi.org/10.32996/jefas.2023.5.5.16.
    11. Khan, M. A. U. H., Islam, M. D., Ahmed, I., Rabbi, M. M. K., Anonna, F. R., Zeeshan, M. D., ... & Sadnan, G. M. (2025). Secure Energy Transac-tions Using Blockchain Leveraging AI for Fraud Detection and Energy Market Stability. arXiv preprint arXiv:2506.19870. https://doi.org/10.63332/joph.v5i6.2198.
    12. Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MilCIS.2015.7348942.
    13. Rahman, A., Debnath, P., Ahmed, A., Dalim, H. M., Karmakar, M., Sumon, M. F. I., & Khan, M. A. (2024). Machine learning and network analy-sis for financial crime detection: Mapping and identifying illicit transaction patterns in global black money transactions. Gulf Journal of Advance Business Research, 2(6), 250–272. https://doi.org/10.51594/gjabr.v2i6.49.
    14. Rahman, M. S., Hossain, M. S., Rahman, M. K., Islam, M. R., Sumon, M. F. I., Siam, M. A., & Debnath, P. (2025). Enhancing Supply Chain Transparency with Blockchain: A Data-Driven Analysis of Distributed Ledger Applications. Journal of Business and Management Studies, 7(3), 59–77. https://doi.org/10.32996/jbms.2025.7.3.7.
    15. Ray, R. K., Sumsuzoha, M., Faisal, M. H., Chowdhury, S. S., Rahman, Z., Hossain, E., ... & Rahman, M. S. (2025). Harnessing Machine Learning and AI to Analyze the Impact of Digital Finance on Urban Economic Resilience in the USA. Journal of Ecohumanism, 4(2), 1417–1442. https://doi.org/10.62754/joe.v4i2.6515.
    16. Stiawan, D., Idris, M. Y. I., Heryanto, B., Budiarto, R., & Ab Razak, M. F. (2023). Cyber Threat Landscape and Challenges for Insider Threat De-tection: A Systematic Review. IEEE Access, 11, 87324–87341.
    17. Sultana, K. S., Begum, M., Abed, J., Siam, M. A., Sadnan, G. A., Shatyi, S. S., & Billah, M. (2025). Blockchain-Based Green Edge Computing: Optimizing Energy Efficiency with Decentralized AI Frameworks. Journal of Computer Science and Technology Studies, 7(1), 386–408. https://doi.org/10.32996/jcsts.2025.7.1.29.
    18. Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cy-bersecurity data streams. Proceedings of the AAAI Workshops, 17(WS-17-01), 103–110.
  • Downloads

  • How to Cite

    Das, B. C., Sartaz, M. S., Reza, S. A., Hossain, A., Nasiruddin, M., Bishnu, K. K., Sultana, K. S., Shatyi, S. . S., Khan, M. A., & Abed, J. (2025). AI-Driven Cybersecurity Threat Detection: Building Resilient ‎Defense Systems Using Predictive Analytics. International Journal of Basic and Applied Sciences, 14(4), 33-45. https://doi.org/10.14419/hysdg957