AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics
-
https://doi.org/10.14419/hysdg957
Received date: July 23, 2025
Accepted date: July 29, 2025
Published date: August 2, 2025
-
Anomaly Detection; Autoencoder; Cybersecurity; Predictive Modeling; LSTM; Threat Detection; UEBA; XGBoost -
Abstract
This study examines how Artificial Intelligence can aid in identifying and mitigating cyber threats in the U.S. across four key areas: intru-sion detection, malware classification, phishing detection, and insider threat analysis. Each of these problems has its quirks, meaning there needs to be different approaches to each, so we matched the models to the shape of the problem. For intrusion detection, catching things like unauthorized access, we tested unsupervised anomaly detection methods. Isolation forests and deep autoencoders both gave us useful sig-nals by picking up odd patterns in network traffic. When it came to malware detection, we leaned on ensemble models like Random Forest and XGBoost, trained on features pulled from files and traffic logs. Phishing was more straightforward. We fed standard classifiers (logistic regression, Random Forest, XGBoost) a mix of email and web-based features. These models handled the task surprisingly well; phishing turned out to be the easiest problem to crack, at least with the data we had. There was a different story. We utilized an LSTM autoencoder to identify behavioral anomalies in user activity logs. It caught every suspicious behavior but flagged a lot of harmless ones too. That kind of model makes sense when the cost of missing a threat is high and you’re willing to sift through some noise. What we saw across the board is that performance wasn’t about stacking the most complex model. What mattered was how well the model’s structure matched the way the data behaved. When signals were strong and obvious, simple models worked fine. But for messier, more subtle threats, we needed some-thing more adaptive, sequence models and anomaly detectors, though they brought their trade-offs. The takeaway here is clear: in cybersecu-rity, context drives the solution. There’s no universal model that works for everything. The smart move is to build systems that fit the prob-lem, and more importantly, evolve with it. Threats don’t sit still, and neither should our defenses.
-
References
- Ahmed, I., Mahmood, A. N., & Hu, J. (2021). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 136, 1–23.
- Almomani, A., Al-Ameen, M. N., & Florea, A. M. (2023). A survey of signature‐based intrusion detection systems: limitations and future directions. ACM Computing Surveys, 56(3), 1–38.
- Berman, F., Juels, A., & Westhoff, D. (2019). Insider threat detection in enterprise systems via behavior analytics. IEEE Security & Privacy, 17(2), 68–75.
- Billah, M., Shatyi, S. S., Sadnan, G. A., Hasnain, K. N., Abed, J., Begum, M., & Sultana, K. S. (2024). Performance Optimization in Multi-Machine Blockchain Systems: A Comprehensive Benchmarking Analysis. Journal of Business and Management Studies, 6(6), 357–375. https://doi.org/10.32996/jbms.2024.6.6.18.
- Buiya, M. R., Laskar, A. N., Islam, M. R., Sawalmeh, S. K. S., Roy, M. S. R. C., Roy, R. E. R. S., & Sumsuzoha, M. (2024). Detecting IoT Cyberattacks: Advanced Machine Learning Models for Enhanced Security in Network Traffic. Journal of Computer Science and Technology Stud-ies, 6(4), 142–152. https://doi.org/10.32996/jcsts.2024.6.4.16.
- Chio, C., & Freeman, D. (2018). Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly Media.
- Fariha, N., Khan, M. N. M., Hossain, M. I., Reza, S. A., Bortty, J. C., Sultana, K. S., ... & Begum, M. (2025). Advanced fraud detection using ma-chine learning models: enhancing financial transaction security. arXiv preprint arXiv:2506.10842. https://doi.org/10.14419/c73kcb17.
- Hossain, S., Miah, M. N. I., Rana, M. S., Hossain, M. S., Bhowmik, P. K., & Rahman, M. K. (2025). Analyzing trends and determinants of leading causes of death in the USA: A data-driven approach. Journal of Big Data, 11(1), 1–24.
- Islam, M. R., Nasiruddin, M., Karmakar, M., Akter, R., Khan, M. T., Sayeed, A. A., & Amin, A. (2024). Leveraging Advanced Machine Learning Algorithms for Enhanced Cyberattack Detection on US Business Networks. Journal of Business and Management Studies, 6(5), 213–224. https://doi.org/10.32996/jbms.2024.6.5.23.
- Jakir, T., et al. (2023). Machine Learning-Powered Financial Fraud Detection: Building Robust Predictive Models for Transactional Security. Jour-nal of Economics, Finance and Accounting Studies, 5(5), 161–180. https://doi.org/10.32996/jefas.2023.5.5.16.
- Khan, M. A. U. H., Islam, M. D., Ahmed, I., Rabbi, M. M. K., Anonna, F. R., Zeeshan, M. D., ... & Sadnan, G. M. (2025). Secure Energy Transac-tions Using Blockchain Leveraging AI for Fraud Detection and Energy Market Stability. arXiv preprint arXiv:2506.19870. https://doi.org/10.63332/joph.v5i6.2198.
- Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). 2015 Military Communications and Information Systems Conference (MilCIS), 1–6. https://doi.org/10.1109/MilCIS.2015.7348942.
- Rahman, A., Debnath, P., Ahmed, A., Dalim, H. M., Karmakar, M., Sumon, M. F. I., & Khan, M. A. (2024). Machine learning and network analy-sis for financial crime detection: Mapping and identifying illicit transaction patterns in global black money transactions. Gulf Journal of Advance Business Research, 2(6), 250–272. https://doi.org/10.51594/gjabr.v2i6.49.
- Rahman, M. S., Hossain, M. S., Rahman, M. K., Islam, M. R., Sumon, M. F. I., Siam, M. A., & Debnath, P. (2025). Enhancing Supply Chain Transparency with Blockchain: A Data-Driven Analysis of Distributed Ledger Applications. Journal of Business and Management Studies, 7(3), 59–77. https://doi.org/10.32996/jbms.2025.7.3.7.
- Ray, R. K., Sumsuzoha, M., Faisal, M. H., Chowdhury, S. S., Rahman, Z., Hossain, E., ... & Rahman, M. S. (2025). Harnessing Machine Learning and AI to Analyze the Impact of Digital Finance on Urban Economic Resilience in the USA. Journal of Ecohumanism, 4(2), 1417–1442. https://doi.org/10.62754/joe.v4i2.6515.
- Stiawan, D., Idris, M. Y. I., Heryanto, B., Budiarto, R., & Ab Razak, M. F. (2023). Cyber Threat Landscape and Challenges for Insider Threat De-tection: A Systematic Review. IEEE Access, 11, 87324–87341.
- Sultana, K. S., Begum, M., Abed, J., Siam, M. A., Sadnan, G. A., Shatyi, S. S., & Billah, M. (2025). Blockchain-Based Green Edge Computing: Optimizing Energy Efficiency with Decentralized AI Frameworks. Journal of Computer Science and Technology Studies, 7(1), 386–408. https://doi.org/10.32996/jcsts.2025.7.1.29.
- Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cy-bersecurity data streams. Proceedings of the AAAI Workshops, 17(WS-17-01), 103–110.
-
Downloads
-
How to Cite
Das, B. C., Sartaz, M. S., Reza, S. A., Hossain, A., Nasiruddin, M., Bishnu, K. K., Sultana, K. S., Shatyi, S. . S., Khan, M. A., & Abed, J. (2025). AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics. International Journal of Basic and Applied Sciences, 14(4), 33-45. https://doi.org/10.14419/hysdg957
