AI-Augmented Big Data Analytics for Real-Time Cyber Attack Detection and Proactive Threat Mitigation
DOI:
https://doi.org/10.22399/ijcesen.3564Keywords:
Cyber security, Big Data Analytics, , Machine Learning, Anomaly Detection, Threat detection, Malware Detection, Real time monitoring, Predictive Analytics, AI-powered attacksAbstract
Big data analytics, as used in defense, is the capacity to gather vast amounts of digital data for analysis, visualization, and decision-making that might aid in anticipating and preventing cyberattacks. When combined with security technologies, it improves it position in terms of cyber defense. They enable companies to identify behavioral patterns that point to network dangers. With its potent capabilities to tackle the increasing scope, variety, and complexity of cyberthreats, big data analytics has become a disruptive force in contemporary cybersecurity. Traditional data processing methods fall short in managing the massive volumes, varieties, and velocities (3Vs) characteristic of big data. This paper explores the foundational principles of big data analytics, including its core dimensions and key application areas such as healthcare, transportation, finance, education, and social media. The study further investigates the classification of cyberattacks malware, phishing, ransomware, and advanced persistent threats (APTs) and their evolving complexity due to AI-powered automation, IoT proliferation, and multi-vector intrusion techniques. It is highlighted how crucial big data is to supporting real-time threat detection, predictive modelling, and automated incident response. Techniques such as behavioral analysis, threat intelligence integration, and anomaly detection are examined for their effectiveness in identifying sophisticated attacks like polymorphic malware and zero-day exploits. Ultimately, this paper highlights how big data analytics enhances cybersecurity capabilities by delivering predictive, prescriptive, diagnostic, and cyber-specific insights that empower proactive threat mitigation and ensure digital resilience.
References
[1] Sachi, S., & Kumar, M. (2023, November). A review on big data analytics on cyber security. Tuijin Jishu/Journal of Propulsion Technology, 44(4), 4128–4133. https://doi.org/10.52783/tjjpt.v44.i4.1632
[2] Shukla, S. T. K. M., Patel, N., & Patel, V. (2024). AI based cyber security data analytic device. (Makale veya konferans yayımlanma bilgileri eksik olduğundan tam referans verilemiyor.)
[3] Prasanthi, K., Rani, P. K. S., & Krishna, P. P. V. (2024). BACADA – Big data architecture for cyber security attack detection applications. Asian Finance, Banking and Business Studies, 6(6), 7702–7714. https://doi.org/10.33472/AFJBS.6.6.2024.7702-7714
[4] Rao, D. D., Waoo, A. A., Singh, M. P., Pareek, P. K., Kamal, S., & Pandit, S. V. (2024). Strategizing IoT network layer security through advanced intrusion detection systems and AI driven threat analysis. Journal of Intelligent Systems and Internet of Things, 24(2), 195–207. https://doi.org/10.54216/JISIoT.120215
[5] Arora, S., Khare, P., & Gupta, S. (2024, July). AI driven DDoS mitigation at the edge: Leveraging machine learning for real time threat detection and response. In 2024 International Conference on Data Science and Network Security (ICDSNS) (pp. 1–7). IEEE. https://doi.org/10.1109/ICDSNS62112.2024.10690930
[6] Majumder, R. Q. (2025, April). A review of anomaly identification in finance frauds using machine learning systems. International Journal of Advanced Research in Science, Communication and Technology, 101–110. https://doi.org/10.48175/IJARSCT-25619
[7] Neeli, S. S. S. (2022, November). Critical cybersecurity strategies for database protection against cyber attacks. Journal of Artificial Intelligence, Machine Learning and Data Science, 1(1), 2102–2106. https://doi.org/10.51219/JAIMLD/sethu-sesha-synam-neeli/461
[8] Abbas, M., & Zafer, A. (2024). Big data analytics for cybersecurity: Enhancing cloud infrastructure protection with machine learning techniques. ResearchGate. https://doi.org/10.13140/RG.2.2.20093.99040
[9] Duggasani, A. R. (2025, May). Scalable and optimized load balancing in cloud systems: Intelligent nature inspired evolutionary approach. International Journal of Innovative Science, Research and Technology, 10(5), 2153–2160. https://doi.org/10.38124/ijisrt/25may1290
[10] Garg, S. (2019). Predictive analytics and auto remediation using artificial intelligence and machine learning in cloud computing operations. International Journal of Innovative Research in Engineering and Multidisciplinary Physical Sciences, 7(2), 1–5. https://doi.org/10.5281/zenodo.15362327
[11] Patel, N. (2024). Secure Access Service Edge (SASE): Evaluating the impact of converged network security architectures in cloud computing. Journal of Emerging Technologies and Innovative Research, 11(3), e703–e714.
[12] Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd National Conference on Information Assurance (NCIA) (pp. 129–134). IEEE. https://doi.org/10.1109/NCIA.2013.6725337
[13] Yang, L., Li, J., Elisa, N., Prickett, T., & Chao, F. (2019, December). Towards big data governance in cybersecurity. Data Enabled Discovery and Applications, 3(1), 1–12. https://doi.org/10.1007/s41688-019-0034-9
[14] Rassam, M. A., Maarof, M. A., & Zainal, A. (2017). Big data analytics adoption for cyber security: A review of current solutions, requirements, challenges and trends. Journal of Information Assurance and Security, 11, 124–145.
[15] Duary, S., Choudhury, P., Mishra, S., Sharma, V., Rao, D. D., & Aderemi, A. P. (2024, February). Cybersecurity threats detection in intelligent networks using predictive analytics approaches. In 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM) (pp. 1–5). IEEE. https://doi.org/10.1109/ICIPTM59628.2024.10563348
[16] Shah, S. B. (2025). Machine learning for cyber threat detection and prevention in critical infrastructure. Department of Operations, Business Analytics & Information Systems, 2(2), 1–7. https://doi.org/10.5281/zenodo.14955016
[17] Polinati, A. K. (2025). AI based big data management device. UK Intellectual Property Office.
[18] Prajapati, N. (2025). The role of machine learning in big data analytics: Tools, techniques, and applications. ESP Journal of Engineering and Technology Advances, 5(2), 16–22. https://doi.org/10.56472/25832646/JETA V5I2P103
[19] Majumder, R. Q. (2025, April). Machine learning for predictive analytics: Trends and future directions. International Journal of Innovative Science, Research and Technology, 10(4), 3557–3564. https://doi.org/10.38124/ijisrt/25apr1899
[20] Malali, N. (2022). Using machine learning to optimize life insurance claim triage processes via anomaly detection in Databricks: Prioritizing high risk claims for human review. International Journal of Engineering Technology Research and Management, 6(6). https://doi.org/10.5281/zenodo.15176507
[21] Happa, J., Glencross, M., & Steed, A. (2019, April). Cyber security threats and challenges in collaborative mixed reality. Frontiers in ICT, 6. https://doi.org/10.3389/fict.2019.00005
[22] Polinati, A. K. (2025). AI powered anomaly detection in cybersecurity: Leveraging deep learning for intrusion prevention. International Journal of Communication Networks and Information Security, 17(3), 301–323.
[23] Ezra, L. A. (2023). Big data analytics in cyber threat intelligence: A comprehensive literature survey on methodologies, challenges, and future directions. International Journal of Computational Engineering Research and Trends, 10(2). https://doi.org/10.22362/ijcert/2023/v10/i2/v10i205
[24] Aslan, O., & Samet, R. (2020). A comprehensive review on malware detection approaches. IEEE Access, 8, 6249–6271. https://doi.org/10.1109/ACCESS.2019.2963724
[25] Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017, December). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications, 28(12), 3629–3654. https://doi.org/10.1007/s00521-016-2275-y
[26] Singamsetty, S. (2019). Fuzzy optimized lightweight cyber attack detection for secure edge based IoT. Journal of Critical Reviews, 6(7), 1028–1033. https://doi.org/10.53555/jcr.v6:i7.13156
[27] Beaman, C., Barkworth, A., Akande, T. D., Hakak, S., & Khan, M. K. (2021, December). Ransomware: Recent advances, analysis, challenges and future research directions. Computers & Security, 111. https://doi.org/10.1016/j.cose.2021.102490
[28] Prajapati, V. (2025). Cloud based database management: Architecture, security, challenges and solutions. Journal of Global Research in Electronics and Communication, 1(1), 7–13.
[29] Fadli, Z., Yong, S., Kee, L., & Ching, G. (2022). Cyber attack awareness and prevention in network security. International Journal of Informatics and Communication Technology, 11, 105. https://doi.org/10.11591/ijict.v11i2.pp105-115
[30] Nurmuslimah, S., Saidatin, N., & Bagus, P. (2023). The future of HR cybersecurity: AI enabled anomaly detection in Workday security. International Journal of Recent Technology and Scientific Management, 8(6).
[31] Sola, R. P., Malali, N., & Madugula, P. (2025). Cloud database security: Integrating deep learning and machine learning for threat detection and prevention. Notion Press.
[32] Singh, S., & Kumar, D. (2024). Data fortress: Innovations in big data analytics for proactive cybersecurity defense and asset protection. International Journal of Research and Publication Review, 5(6), 1026–1031. https://doi.org/10.55248/gengpi.5.0624.1425
[33] Prajapati, N. (2025). Federated learning for privacy preserving cybersecurity: A review on secure threat detection. International Journal of Advanced Research in Science, Communication and Technology, 5(4), 520–528. https://doi.org/10.48175/IJARSCT-25168
[34] Chatterjee, P. (2022). Machine learning algorithms in fraud detection and prevention. Eastern European Journal of Engineering and Technology, 1(1), 15–27.
[35] Thangaraju, V. (2025). Enhancing web application performance and security using AI driven anomaly detection and optimization techniques. International Research Journal of Innovative Engineering and Technology, 9(3), 205–212. https://doi.org/10.47001/IRJIET/2025.903027
[36] Alani, M. M. (2021, June). Big data in cybersecurity: A survey of applications and future trends. Journal of Reliability and Intelligent Environments, 7(2), 85–114. https://doi.org/10.1007/s40860-020-00120-3
[37] Prajapati, V. (2025). Enhancing threat intelligence and cyber defense through big data analytics: A review study. Journal of Global Research in Mathematical Archives, 12(4), 1–6.
[38] Chityala, U. R., Shnain, A. H., Govindaraj, M., Johri, P., Kuppuraj, T., & Devi, N. L. (2025, [Month]). Big data for enhancing cybersecurity in enterprise environments: Proactive threat detection and prevention. In 2025 International Conference on Automation and Computation (AUTOCOM) (pp. 1396–1401). https://doi.org/10.1109/AUTOCOM64127.2025.10957069
[39] Helser, S., & Hwang, M. (2025). AI and big data: Synergies and cybersecurity challenges in key sectors. IEEE Transactions on Technology and Society, 6(1), 54–63. https://doi.org/10.1109/TTS.2024.3465935
[40] Alawadhi, R., Aalmohamed, H., Alhashemi, S., & Alkhazaleh, H. A. (2024). Application of big data in cybersecurity. In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS) (pp. 1–6). https://doi.org/10.1109/ICSPIS63676.2024.10812589
[41] Sudan, P. (2023). A model for big data analytics using Internet of Things and cybersecurity. In 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) (pp. 27–31). https://doi.org/10.1109/PEEIC59336.2023.10450652
[42] Jilani, S., Kishore, N. N., Chand, N. N., Varma, R. D., Raja, G., & Rao, P. V. (2023, January). Big data security: Detect and prevent the data from attacks with digital forensic tools. In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 783–787). IEEE. https://doi.org/10.1109/ICSSIT55814.2023.10060947
[43] Nisha, S. S., Patil, H., Bag, A., Singh, A., Kumar, Y., & Kumar, J. S. (2022). Critical information framework against cyber attacks using artificial intelligence and big data analytics. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). https://doi.org/10.1109/ICACITE53722.2022.9823779
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.