Cyber Threat Detection Using an Integrated AI System
Abstract
This work presents the design and implementation of Cyber Threat Detection Using an Integrated AI System, an artificial intelligence–based framework developed for proactive cyber threat detection and analysis. The proposed platform combines network intrusion detection and phishing risk assessment into a unified architecture to address modern multi-vector cyberattacks. Benchmark datasets such as CICIDS-2017 for network traffic and URL-based datasets including PhishTank and UCI Repository will be utilized for model training and evaluation. The system employs an Unsupervised Deep Learning Autoencoder to learn normal network behavior and detect zero-day intrusions through reconstruction error analysis. In parallel, a Random Forest classifier analyzes lexical URL features such as domain entropy, special character frequency, URL length, and HTTPS validity to identify phishing websites in real time. The architecture follows a modular microservices design integrated with a FastAPI backend and an interactive dashboard interface. Additionally, Generative AI–based alert summarization provides human-readable threat explanations to reduce analyst fatigue and improve response efficiency. The expected outcome is enhanced detection of zero-day attacks and phishing threats, reduced false positives, improved situational awareness, and a scalable, intelligent cybersecurity solution capable of adapting to evolving digital threats while supporting faster and more informed security decision-making.
References
A. Tour ́e et al., “A framework for detecting zero-day exploits in network flows,”Computer Networks, Elsevier, 2024, scienceDirect.
J. L. O. Nagallo et al., “Comparative study of random forest (ml) and snort (signature) ids: Detection performance and operational overhead in public cloud,”Cognizance Journal of Multidisciplinary Studies, 2025
Devidas S Thosar, Rajashree R Shinde, Prashant J Gadakh, Pratibha V Kashid, Secure kNN Query Processing in Entrusted Cloud Environments , Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, Issue I , Vol 2 (2016).
R. Purohit et al., “Time-frequency analysis and autoencoder approach for network traffic anomaly detection,” MethodsX, Elsevier, 2025, scienceDirect.
Devidas S. Thosar*, Dr. Nisarg Gandhewar. (2022). An advanced image authentication using passimage algorithm to resist shoulder surfing attack. Computer Integrated Manufacturing Systems, 28(10).
D. S. Thosar and M. Singh, "A Review on Advanced Graphical Authentication to Resist Shoulder Surfing Attack," 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), Bhopal, India, 2018, pp. 1-3, doi: 10.1109/ICACAT.2018.8933699.
S. Asiri et al., “Phishingrtds: A real-time detection system for phishing attacks using a deep learning model,” Computers & Security, Elsevier, 2024, scienceDirect.
Pagare, Snehal, Devidas S. Thosar and Kishor Shegde. “Agriculture Food Supply Chain Management using Blockchain Technology.” (2021) in International Research Journal of Engineering and Technology (IRJET), e-ISSN: 2395-0056, p-ISSN: 2395-0072, Volume: 08 Issue: 03 | Mar 2021.
Devidas S. Thosar.Sunil T. Rajguru "Robust Sclera Segmentation Algorithm For Eye gaze detection and sclera recognition by using ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp176-179.
Sonavane, D. S. Thosar, B. R. Wankar, K. Jadhav, P. A. More and A. Kulkarni, "DermDetectNet: Identifying Skin Diseases with Advanced Computer Learning," 2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI), Wardha, India, 2024, pp. 1-6, doi: 10.1109/IDICAIEI61867.2024.10842938.
Refbacks
- There are currently no refbacks.