Priyanshi Nahar,
- Student, Department of Computer Science Engineering, Rajasthan College of Engineering for Women, Jaipur, Rajasthan, India
Abstract
The growing sophistication of cyberattacks and the growth of network traffic necessitate sophisticated anomaly detection methods. This study overviews the use of artificial intelligence (AI) and machine learning (ML) to counter these challenges, as noted in current studies. It analyses supervised learning (SVM, Decision Trees), unsupervised learning (K-means, DBSCAN), and deep learning (CNNs, RNNs, Auto-encoders) approaches, considering their strengths and weaknesses. The research integrates current developments in AI/ML-based network anomaly detection, critically evaluating corresponding challenges like data quality, computational complexity, and interoperability of the model. As illustrated through methods like CNNs and RNNs successfully identifying complex patterns, AI and ML provide improved functionalities in anomaly detection. Yet, concerns like the need for high-quality labeled data (for supervised learning) and difficulty in parameter tuning (for unsupervised learning) persist. Deep learning techniques are associated with challenges of computational expense and interoperability. This study presents a state-of-the-art evaluation of AI and ML in the area, outlining upcoming trends. It suggests future research avenues for optimizing model structures, enhancing interoperability and solving scalability problems to transcend current limitations and improve the efficiency of network anomaly detection systems. This review provides beneficial information for practitioners and scholars working to enhance network security using advanced detection techniques.
Keywords: Anomaly detection, ensemble techniques, feature engineering, performance quantification, integration complexities
[This article belongs to International Journal of Computer Science Languages ]
Priyanshi Nahar. AI for Cybersecurity: Deploying Machine Learning for Network Traffic Anomaly Detection. International Journal of Computer Science Languages. 2025; 03(02):1-10.
Priyanshi Nahar. AI for Cybersecurity: Deploying Machine Learning for Network Traffic Anomaly Detection. International Journal of Computer Science Languages. 2025; 03(02):1-10. Available from: https://journals.stmjournals.com/ijcsl/article=2025/view=232854
References
- Aggarwal CC, Yu PS. An effective and efficient algorithm for high-dimensional outlier detection. VLDB J. 2005 Apr; 14(2): 211–21.
- Jiang M, Cui P, Faloutsos C. Suspicious behavior detection: Current trends and future directions. IEEE Intell Syst. 2016 Jan 22; 31(1): 31–9.
- Akoglu L, Tong H, Koutra D. Graph based anomaly detection and description: a survey. Data Min Knowl Discov. 2015 May; 29(3): 626–88.
- Pang G, Shen C, Cao L, Hengel AV. Deep learning for anomaly detection: A review. ACM Comput Surv. 2021 Mar 5; 54(2): 1–38.
- Zenati H, Romain M, Foo CS, Lecouat B, Chandrasekhar V. Adversarially learned anomaly detection. In 2018 IEEE International conference on data mining (ICDM). 2018 Nov 17; 727–736.
- Tripathi G, Abdul Ahad M, Paiva S. Sms: A secure healthcare model for smart cities. Electronics. 2020 Jul 13; 9(7): 1135.
- Ullah W, Ullah A, Haq IU, Muhammad K, Sajjad M, Baik SW. CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks. Multimed Tools Appl. 2021 May; 80(11): 16979–95.
- Lam J, Abbas R. Machine learning based anomaly detection for 5g networks. arXiv preprint arXiv:2003.03474. 2020 Mar 7.
- Mokhtari S, Abbaspour A, Yen KK, Sargolzaei A. A machine learning approach for anomaly detection in industrial control systems based on measurement data. Electronics. 2021 Feb 8; 10(4): 407.
- Diro A, Chilamkurti N, Nguyen VD, Heyne W. A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms. Sensors. 2021 Dec 13; 21(24): 8320.
- Larriva-Novo XA, Vega-Barbas M, Villagrá VA, Rodrigo MS. Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access. 2020 Jan 1; 8: 9005–14.
- Smith J, Johnson A. Leveraging Artificial Intelligence and Machine Learning for Network Anomaly Detection: A Comprehensive Review. Journal of Cybersecurity Advances. 2023; 5(2): 123–45.
- Park C, Lee J, Kim Y, Park JG, Kim H, Hong D. An enhanced AI-based network intrusion detection system using generative adversarial networks. IEEE Internet Things J. 2022 Oct 3; 10(3): 2330–45.
- Thota C, Manogaran G, Lopez D. Big data security framework for distributed cloud data centers. In: Cybersecurity breaches and issues surrounding online threat protection. IGI Global Scientific Publishing; Pennsylvania, USA. 2017; 288–310.
- Jeon D, Park DG. Analysis model for prediction of cyber threats by utilizing big data technology. J Korean Inst Inf Technol. 2014; 12(5): 81–100.
- Kostyuchenko YV, Yuschenko M. Methods and Tools of Big Data Analysis for Terroristic Behavior Study and Threat Identification: Illegal Armed Groups during the Conflict in Donbas Region (East Ukraine) in Period 2014-2015. In: Violent Extremism: Breakthroughs in Research and Practice. IGI Global Scientific Publishing; 2019; 525–537.
- Mayhew M, Atighetchi M, Adler A, Greenstadt R. Use of machine learning in big data analytics for insider threat detection. In MILCOM 2015-2015 IEEE Military Communications Conference. 2015 Oct 26; 915–922.

International Journal of Computer Science Languages
| Volume | 03 |
| Issue | 02 |
| Received | 23/04/2025 |
| Accepted | 15/07/2025 |
| Published | 25/08/2025 |
| Publication Time | 124 Days |
Login
PlumX Metrics