AI-Driven Cybersecurity: Enhancing Threat Detection and Mitigation with Deep Learning

Authors

  • V. Saravanan Professor, Department of Electronics and Communication Engineering Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University,Chennai-602105,Tamilnadu,India.
  • Khushboo Tripathi Sharda School of Engineering and Technology, Sharda University, Greater Noida
  • K. N. S. K. Santhosh Assistant professor, Department of Computer Science and Engineering ,Aditya university, Surampalem.
  • Naveenkumar P. Assistant professor, Artificial intelligence and Data Science , S.A. Engineering College
  • P. Vidyasri Assistant professor, Department of Computer Science and Business Systems, Panimalar Engineering College, Varadharajapuram, Chennai-600123
  • Bharathi Ramesh Kumar

DOI:

https://doi.org/10.22399/ijcesen.1358

Keywords:

I-driven cybersecurity, deep learning, Convolutional Neural Networks, Long Short-Term Memory , Computational efficiency, Security performance metrics

Abstract

AI-driven cybersecurity has emerged as a transformative solution for combating increasingly sophisticated cyber threats. This research proposes an advanced deep learning-based cybersecurity framework aimed at enhancing threat detection and mitigation performance. Leveraging Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) architectures, the proposed model effectively identifies anomalies and classifies potential threats with high accuracy and minimal false positives. The framework was rigorously evaluated using real-time network traffic datasets, demonstrating a notable increase in detection accuracy by 18.5%, achieving a detection accuracy of 97.4%, compared to traditional machine learning methods (78.6%). Additionally, the response time to threats was significantly reduced by 25%, while computational overhead decreased by 30%, enhancing overall system responsiveness. Experimental results further show a 40% reduction in network downtime incidents due to faster identification and proactive mitigation of threats. The proposed AI-driven approach thus provides substantial improvements in security performance metrics, underscoring its potential for robust cybersecurity in dynamic and increasingly sophisticated threat landscapes

References

G. Sismanoglu, M. A. Onde, F. Kocer and O. K. Sahingoz, (2019). Deep Learning Based Forecasting in Stock Market with Big Data Analytics, Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), Istanbul, Turkey, 2019, pp. 1-4, doi: 10.1109/EBBT.2019.8741818. DOI: https://doi.org/10.1109/EBBT.2019.8741818

Zhou, Y., et al. (2020). Deep Learning-Based Stock Market Prediction: A Comprehensive Survey. Expert Systems with Applications.

Chen, L., et al. (2021). Time-Series Analysis of Stock Market Data Using LSTM Networks. Information Sciences.

Khoshnood, A., & Sadri, J. (2022). Improving GAN Stability for Financial Applications. Applied Soft Computing.

Babu, S., & Ramesh, S. (2023). Optimization Techniques for Machine Learning in Financial Predictions. Engineering Applications of Artificial Intelligence.

Wang, Q., et al. (2024). Bayesian Optimization for Enhancing SVM Performance in Predictive Analytics. Journal of Machine Learning Research.

Shen, J., Shafiq, M.O. Short-term stock market price trend prediction using a comprehensive deep learning system. J Big Data 7, 66 (2020). https://doi.org/10.1186/s40537-020-00333-6 DOI: https://doi.org/10.1186/s40537-020-00333-6

Nabipour, M., Nayyeri, P., Jabani, H., Mosavi, A., & Salwana, E. (2020). Deep Learning for Stock Market Prediction. Entropy, 22(8), 840. https://doi.org/10.3390/e22080840 DOI: https://doi.org/10.3390/e22080840

Appalaraju, M., Sivaraman, A.K., Vincent, R., Ilakiyaselvan, N., Rajesh, M., Maheshwari, U. (2022). Machine Learning-Based Categorization of Brain Tumor Using Image Processing. In: Raje, R.R., Hussain, F., Kannan, R.J. (eds) Artificial Intelligence and Technologies. Lecture Notes in Electrical Engineering, vol 806. Springer, Singapore. https://doi.org/10.1007/978-981-16-6448-9_24 DOI: https://doi.org/10.1007/978-981-16-6448-9_24

Maheshwari, R.U., B.Paulchamy, Pandey, B.K. et al. Enhancing Sensing and Imaging Capabilities Through Surface Plasmon Resonance for Deepfake Image Detection. Plasmonics (2024). https://doi.org/10.1007/s11468-024-02492 DOI: https://doi.org/10.1007/s11468-024-02492-1

Maheshwari, Uma, and Kalpanaka Silingam. (2020) Multimodal Image Fusion in Biometric Authentication. Fusion: Practice and Applications 1(2);7991. DOI: https://doi.org/10.54216/FPA.010203

S. S, S. S and U. M. R, (2022) Soft Computing based Brain Tumor Categorization with Machine Learning Techniques," 2022 International Conference on Advanced Computing Technologies and Applications (ICACTA), Coimbatore, India, pp. 1-9, doi: 10.1109/ICACTA54488.2022.9752880. DOI: https://doi.org/10.1109/ICACTA54488.2022.9752880

R. Uma Maheshwari, B. Paulchamy, Arun M, Vairaprakash Selvaraj, Dr. N. Naga Saranya and Dr . Sankar Ganesh S (2024), Deepfake Detection using Integrate-backward-integrate Logic Optimization Algorithm with CNN. IJEER 12(2), 696-710. DOI: 10.37391/IJEER.120248. DOI: https://doi.org/10.37391/ijeer.120248

Rajendran, U. M., & Paulchamy, J. (2021). Analysis and classification of gait characteristics. Iconic Research and Engineering Journals, 4(12).

Paulchamy, B., Chidambaram, S., Jaya, J., & Maheshwari, R. U. (2021). Diagnosis of Retinal Disease Using Retinal Blood Vessel Extraction. In International Conference on Mobile Computing and Sustainable Informatics: ICMCSI 2020 (pp. 343-359). Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-49795-8_34

Paulchamy, B., Uma Maheshwari, R., Sudarvizhi AP, D., Anandkumar AP, R., & Ravi, G. (2023). Optimized Feature Selection Techniques for Classifying Electrocorticography Signals. Brain‐ Computer Interface: Using Deep Learning Applications, 255-278. https://doi.org/10.1002/9781119857655.ch11 DOI: https://doi.org/10.1002/9781119857655.ch11

R.Uma Maheshwari (2021). Encryption and decryption using image processing techniques. International Journal of Engineering Applied Sciences and Technology, 5(12). DOI: https://doi.org/10.33564/IJEAST.2021.v05i12.037

Maheshwari, R. U., & Paulchamy, B. (2024). Securing online integrity: a hybrid approach to deepfake detection and removal using Explainable AI and Adversarial Robustness Training. Automatika, 65(4), 1517–1532. https://doi.org/10.1080/00051144.2024.2400640 DOI: https://doi.org/10.1080/00051144.2024.2400640

Uma, R.. , Jayasutha, D.. , Nair, Indu. , Senthilraja, R.. , Thanappan, Subash. , S., Ramya. (2024) Development of Digital Twin Technology in Hydraulics Based on Simulating and Enhancing System Performance. Journal of Cybersecurity and Information Management, 50-65. DOI: https://doi.org/10.54216/JCIM.130204 DOI: https://doi.org/10.54216/JCIM.130204

Maheshwari, R.U., Paulchamy, B. (2024). Innovative Graded-Index PCF–Based SPR Sensor for Advanced Deepfake Detection and Real-Time Media Integrity Analysis. Plasmonics https://doi.org/10.1007/s11468-024-02696-5. DOI: https://doi.org/10.1007/s11468-024-02696-5

Rajani Kumari Inapagolla, & K . Kalyan Babu. (2025). Audio Fingerprinting to Achieve Greater Accuracy and Maximum Speed with Multi-Model CNN-RNN-LSTM in Speaker Identification: Speed with Multi-Model CNN-RNN-LSTM in Speaker Identification. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.1138 DOI: https://doi.org/10.22399/ijcesen.1138

Ponugoti Kalpana, Shaik Abdul Nabi, Panjagari Kavitha, K. Naresh, Maddala Vijayalakshmi, & P. Vinayasree. (2024). A Hybrid Deep Learning Approach for Efficient Cross-Language Detection. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.808 DOI: https://doi.org/10.22399/ijcesen.808

P. Padma, & G. Siva Nageswara Rao. (2024). CBDC-Net: Recurrent Bidirectional LSTM Neural Networks Based Cyberbullying Detection with Synonym-Level N-Gram and TSR-SCSOFeatures. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.623 DOI: https://doi.org/10.22399/ijcesen.623

Achuthankutty, S., M, P., K, D., P, K., & R, prathipa. (2024). Deep Learning Empowered Water Quality Assessment: Leveraging IoT Sensor Data with LSTM Models and Interpretability Techniques. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.512 DOI: https://doi.org/10.22399/ijcesen.512

B.Vaidehi, & K. Arunesh. (2025). Deep Learning Fusion for Student Academic Prediction Using ARLMN Ensemble Model. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.734 DOI: https://doi.org/10.22399/ijcesen.734

Sunandha Rajagopal, & N. Thangarasu. (2024). The Impact of Clinical Parameters on LSTM-based Blood Glucose Estimate in Type 1 Diabetes. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.656 DOI: https://doi.org/10.22399/ijcesen.656

Olola, T. M., & Olatunde, T. I. (2025). Artificial Intelligence in Financial and Supply Chain Optimization: Predictive Analytics for Business Growth and Market Stability in The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.18 DOI: https://doi.org/10.22399/ijasrar.18

Ibeh, C. V., & Adegbola, A. (2025). AI and Machine Learning for Sustainable Energy: Predictive Modelling, Optimization and Socioeconomic Impact In The USA. International Journal of Applied Sciences and Radiation Research, 2(1). https://doi.org/10.22399/ijasrar.19 DOI: https://doi.org/10.22399/ijasrar.19

Downloads

Published

2025-03-23

How to Cite

V. Saravanan, Tripathi, K., K. N. S. K. Santhosh, Naveenkumar P., P. Vidyasri, & Bharathi Ramesh Kumar. (2025). AI-Driven Cybersecurity: Enhancing Threat Detection and Mitigation with Deep Learning. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1358

Issue

Section

Research Article