AI-Augmented Big Data Analytics for Real-Time Cyber Attack Detection and Proactive Threat Mitigation
DOI:
https://doi.org/10.22399/ijcesen.3564Keywords:
Cyber security, Big Data Analytics, , Machine Learning, Anomaly Detection, Threat detection, Malware Detection, Real time monitoring, Predictive Analytics, AI-powered attacksAbstract
Big data analytics, as used in defense, is the capacity to gather vast amounts of digital data for analysis, visualization, and decision-making that might aid in anticipating and preventing cyberattacks. When combined with security technologies, it improves it position in terms of cyber defense. They enable companies to identify behavioral patterns that point to network dangers. With its potent capabilities to tackle the increasing scope, variety, and complexity of cyberthreats, big data analytics has become a disruptive force in contemporary cybersecurity. Traditional data processing methods fall short in managing the massive volumes, varieties, and velocities (3Vs) characteristic of big data. This paper explores the foundational principles of big data analytics, including its core dimensions and key application areas such as healthcare, transportation, finance, education, and social media. The study further investigates the classification of cyberattacks malware, phishing, ransomware, and advanced persistent threats (APTs) and their evolving complexity due to AI-powered automation, IoT proliferation, and multi-vector intrusion techniques. It is highlighted how crucial big data is to supporting real-time threat detection, predictive modelling, and automated incident response. Techniques such as behavioral analysis, threat intelligence integration, and anomaly detection are examined for their effectiveness in identifying sophisticated attacks like polymorphic malware and zero-day exploits. Ultimately, this paper highlights how big data analytics enhances cybersecurity capabilities by delivering predictive, prescriptive, diagnostic, and cyber-specific insights that empower proactive threat mitigation and ensure digital resilience.
References
[1] Sachi, S., & Kumar, M. (2023, November). A review on big data analytics on cyber security. Tuijin Jishu/Journal of Propulsion Technology, 44(4), 4128–4133. https://doi.org/10.52783/tjjpt.v44.i4.1632 DOI: https://doi.org/10.52783/tjjpt.v44.i4.1632
[2] Shukla, S. T. K. M., Patel, N., & Patel, V. (2024). AI based cyber security data analytic device. (Makale veya konferans yayımlanma bilgileri eksik olduğundan tam referans verilemiyor.)
[3] Prasanthi, K., Rani, P. K. S., & Krishna, P. P. V. (2024). BACADA – Big data architecture for cyber security attack detection applications. Asian Finance, Banking and Business Studies, 6(6), 7702–7714. https://doi.org/10.33472/AFJBS.6.6.2024.7702-7714
[4] Rao, D. D., Waoo, A. A., Singh, M. P., Pareek, P. K., Kamal, S., & Pandit, S. V. (2024). Strategizing IoT network layer security through advanced intrusion detection systems and AI driven threat analysis. Journal of Intelligent Systems and Internet of Things, 24(2), 195–207. https://doi.org/10.54216/JISIoT.120215 DOI: https://doi.org/10.54216/JISIoT.120215
[5] Arora, S., Khare, P., & Gupta, S. (2024, July). AI driven DDoS mitigation at the edge: Leveraging machine learning for real time threat detection and response. In 2024 International Conference on Data Science and Network Security (ICDSNS) (pp. 1–7). IEEE. https://doi.org/10.1109/ICDSNS62112.2024.10690930 DOI: https://doi.org/10.1109/ICDSNS62112.2024.10690930
[6] Majumder, R. Q. (2025, April). A review of anomaly identification in finance frauds using machine learning systems. International Journal of Advanced Research in Science, Communication and Technology, 101–110. https://doi.org/10.48175/IJARSCT-25619 DOI: https://doi.org/10.48175/IJARSCT-25619
[7] Neeli, S. S. S. (2022, November). Critical cybersecurity strategies for database protection against cyber attacks. Journal of Artificial Intelligence, Machine Learning and Data Science, 1(1), 2102–2106. https://doi.org/10.51219/JAIMLD/sethu-sesha-synam-neeli/461 DOI: https://doi.org/10.51219/JAIMLD/sethu-sesha-synam-neeli/461
[8] Abbas, M., & Zafer, A. (2024). Big data analytics for cybersecurity: Enhancing cloud infrastructure protection with machine learning techniques. ResearchGate. https://doi.org/10.13140/RG.2.2.20093.99040
[9] Duggasani, A. R. (2025, May). Scalable and optimized load balancing in cloud systems: Intelligent nature inspired evolutionary approach. International Journal of Innovative Science, Research and Technology, 10(5), 2153–2160. https://doi.org/10.38124/ijisrt/25may1290 DOI: https://doi.org/10.38124/ijisrt/25may1290
[10] Garg, S. (2019). Predictive analytics and auto remediation using artificial intelligence and machine learning in cloud computing operations. International Journal of Innovative Research in Engineering and Multidisciplinary Physical Sciences, 7(2), 1–5. https://doi.org/10.5281/zenodo.15362327
[11] Patel, N. (2024). Secure Access Service Edge (SASE): Evaluating the impact of converged network security architectures in cloud computing. Journal of Emerging Technologies and Innovative Research, 11(3), e703–e714.
[12] Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd National Conference on Information Assurance (NCIA) (pp. 129–134). IEEE. https://doi.org/10.1109/NCIA.2013.6725337 DOI: https://doi.org/10.1109/NCIA.2013.6725337
[13] Yang, L., Li, J., Elisa, N., Prickett, T., & Chao, F. (2019, December). Towards big data governance in cybersecurity. Data Enabled Discovery and Applications, 3(1), 1–12. https://doi.org/10.1007/s41688-019-0034-9 DOI: https://doi.org/10.1007/s41688-019-0034-9
[14] Rassam, M. A., Maarof, M. A., & Zainal, A. (2017). Big data analytics adoption for cyber security: A review of current solutions, requirements, challenges and trends. Journal of Information Assurance and Security, 11, 124–145.
[15] Duary, S., Choudhury, P., Mishra, S., Sharma, V., Rao, D. D., & Aderemi, A. P. (2024, February). Cybersecurity threats detection in intelligent networks using predictive analytics approaches. In 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM) (pp. 1–5). IEEE. https://doi.org/10.1109/ICIPTM59628.2024.10563348 DOI: https://doi.org/10.1109/ICIPTM59628.2024.10563348
[16] Shah, S. B. (2025). Machine learning for cyber threat detection and prevention in critical infrastructure. Department of Operations, Business Analytics & Information Systems, 2(2), 1–7. https://doi.org/10.5281/zenodo.14955016
[17] Polinati, A. K. (2025). AI based big data management device. UK Intellectual Property Office.
[18] Prajapati, N. (2025). The role of machine learning in big data analytics: Tools, techniques, and applications. ESP Journal of Engineering and Technology Advances, 5(2), 16–22. https://doi.org/10.56472/25832646/JETA V5I2P103
[19] Majumder, R. Q. (2025, April). Machine learning for predictive analytics: Trends and future directions. International Journal of Innovative Science, Research and Technology, 10(4), 3557–3564. https://doi.org/10.38124/ijisrt/25apr1899 DOI: https://doi.org/10.38124/ijisrt/25apr1899
[20] Malali, N. (2022). Using machine learning to optimize life insurance claim triage processes via anomaly detection in Databricks: Prioritizing high risk claims for human review. International Journal of Engineering Technology Research and Management, 6(6). https://doi.org/10.5281/zenodo.15176507
[21] Happa, J., Glencross, M., & Steed, A. (2019, April). Cyber security threats and challenges in collaborative mixed reality. Frontiers in ICT, 6. https://doi.org/10.3389/fict.2019.00005 DOI: https://doi.org/10.3389/fict.2019.00005
[22] Polinati, A. K. (2025). AI powered anomaly detection in cybersecurity: Leveraging deep learning for intrusion prevention. International Journal of Communication Networks and Information Security, 17(3), 301–323.
[23] Ezra, L. A. (2023). Big data analytics in cyber threat intelligence: A comprehensive literature survey on methodologies, challenges, and future directions. International Journal of Computational Engineering Research and Trends, 10(2). https://doi.org/10.22362/ijcert/2023/v10/i2/v10i205
[24] Aslan, O., & Samet, R. (2020). A comprehensive review on malware detection approaches. IEEE Access, 8, 6249–6271. https://doi.org/10.1109/ACCESS.2019.2963724 DOI: https://doi.org/10.1109/ACCESS.2019.2963724
[25] Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017, December). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications, 28(12), 3629–3654. https://doi.org/10.1007/s00521-016-2275-y DOI: https://doi.org/10.1007/s00521-016-2275-y
[26] Singamsetty, S. (2019). Fuzzy optimized lightweight cyber attack detection for secure edge based IoT. Journal of Critical Reviews, 6(7), 1028–1033. https://doi.org/10.53555/jcr.v6:i7.13156
[27] Beaman, C., Barkworth, A., Akande, T. D., Hakak, S., & Khan, M. K. (2021, December). Ransomware: Recent advances, analysis, challenges and future research directions. Computers & Security, 111. https://doi.org/10.1016/j.cose.2021.102490 DOI: https://doi.org/10.1016/j.cose.2021.102490
[28] Prajapati, V. (2025). Cloud based database management: Architecture, security, challenges and solutions. Journal of Global Research in Electronics and Communication, 1(1), 7–13.
[29] Fadli, Z., Yong, S., Kee, L., & Ching, G. (2022). Cyber attack awareness and prevention in network security. International Journal of Informatics and Communication Technology, 11, 105. https://doi.org/10.11591/ijict.v11i2.pp105-115 DOI: https://doi.org/10.11591/ijict.v11i2.pp105-115
[30] Nurmuslimah, S., Saidatin, N., & Bagus, P. (2023). The future of HR cybersecurity: AI enabled anomaly detection in Workday security. International Journal of Recent Technology and Scientific Management, 8(6).
[31] Sola, R. P., Malali, N., & Madugula, P. (2025). Cloud database security: Integrating deep learning and machine learning for threat detection and prevention. Notion Press.
[32] Singh, S., & Kumar, D. (2024). Data fortress: Innovations in big data analytics for proactive cybersecurity defense and asset protection. International Journal of Research and Publication Review, 5(6), 1026–1031. https://doi.org/10.55248/gengpi.5.0624.1425 DOI: https://doi.org/10.55248/gengpi.5.0624.1425
[33] Prajapati, N. (2025). Federated learning for privacy preserving cybersecurity: A review on secure threat detection. International Journal of Advanced Research in Science, Communication and Technology, 5(4), 520–528. https://doi.org/10.48175/IJARSCT-25168 DOI: https://doi.org/10.48175/IJARSCT-25168
[34] Chatterjee, P. (2022). Machine learning algorithms in fraud detection and prevention. Eastern European Journal of Engineering and Technology, 1(1), 15–27.
[35] Thangaraju, V. (2025). Enhancing web application performance and security using AI driven anomaly detection and optimization techniques. International Research Journal of Innovative Engineering and Technology, 9(3), 205–212. https://doi.org/10.47001/IRJIET/2025.903027 DOI: https://doi.org/10.47001/IRJIET/2025.903027
[36] Alani, M. M. (2021, June). Big data in cybersecurity: A survey of applications and future trends. Journal of Reliability and Intelligent Environments, 7(2), 85–114. https://doi.org/10.1007/s40860-020-00120-3 DOI: https://doi.org/10.1007/s40860-020-00120-3
[37] Prajapati, V. (2025). Enhancing threat intelligence and cyber defense through big data analytics: A review study. Journal of Global Research in Mathematical Archives, 12(4), 1–6.
[38] Chityala, U. R., Shnain, A. H., Govindaraj, M., Johri, P., Kuppuraj, T., & Devi, N. L. (2025, [Month]). Big data for enhancing cybersecurity in enterprise environments: Proactive threat detection and prevention. In 2025 International Conference on Automation and Computation (AUTOCOM) (pp. 1396–1401). https://doi.org/10.1109/AUTOCOM64127.2025.10957069 DOI: https://doi.org/10.1109/AUTOCOM64127.2025.10957069
[39] Helser, S., & Hwang, M. (2025). AI and big data: Synergies and cybersecurity challenges in key sectors. IEEE Transactions on Technology and Society, 6(1), 54–63. https://doi.org/10.1109/TTS.2024.3465935 DOI: https://doi.org/10.1109/TTS.2024.3465935
[40] Alawadhi, R., Aalmohamed, H., Alhashemi, S., & Alkhazaleh, H. A. (2024). Application of big data in cybersecurity. In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS) (pp. 1–6). https://doi.org/10.1109/ICSPIS63676.2024.10812589 DOI: https://doi.org/10.1109/ICSPIS63676.2024.10812589
[41] Sudan, P. (2023). A model for big data analytics using Internet of Things and cybersecurity. In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) (pp. 27–31). https://doi.org/10.1109/PEEIC59336.2023.10450652 DOI: https://doi.org/10.1109/PEEIC59336.2023.10450652
[42] Jilani, S., Kishore, N. N., Chand, N. N., Varma, R. D., Raja, G., & Rao, P. V. (2023, January). Big data security: Detect and prevent the data from attacks with digital forensic tools. In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 783–787). IEEE. https://doi.org/10.1109/ICSSIT55814.2023.10060947 DOI: https://doi.org/10.1109/ICSSIT55814.2023.10060947
[43] Nisha, S. S., Patil, H., Bag, A., Singh, A., Kumar, Y., & Kumar, J. S. (2022). Critical information framework against cyber attacks using artificial intelligence and big data analytics. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). https://doi.org/10.1109/ICACITE53722.2022.9823779 DOI: https://doi.org/10.1109/ICACITE53722.2022.9823779
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.