AIML IN CYBERSECURITY: DETECT INTRUSIONS AND INSIDER THREATS

  • Unique Paper ID: 171977
  • PageNo: 1960-1964
  • Abstract:
  • Any company can suffer greatly from insider threat attacks; identifying them early on with possible behavioral actions can help that organization avoid bad outcomes. By putting in place two levels of defense—one at the network’s entrance and another at the network’s core—our proposed approach tackles this problem. Insider threat detection finds any possible insiders in the network, while intrusion detection filters out known attacks. When used in an organizational setting, the insider threat detection model can distinguish between abnormal behaviors that are classified as insider threats and those that deviate from the norm. This is because the model is trained on the Long-Short- Term Memory (LSTM) model, which was able to learn normal user behavior patterns.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{171977,
        author = {Bharath P and Jeevan S. M and K. M Dhanush and Karthik K. N and Sonia Peal K. P},
        title = {AIML IN CYBERSECURITY: DETECT INTRUSIONS AND INSIDER THREATS},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {11},
        number = {8},
        pages = {1960-1964},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=171977},
        abstract = {Any company can suffer greatly from insider threat attacks; identifying them early on with possible behavioral actions can help that organization avoid bad outcomes. By putting in place two levels of defense—one at the network’s entrance and another at the network’s core—our proposed approach tackles this problem. Insider threat detection finds any possible insiders in the network, while intrusion detection filters out known attacks. When used in an organizational setting, the insider threat detection model can distinguish between abnormal behaviors that are classified as insider threats and those that deviate from the norm. This is because the model is trained on the Long-Short- Term Memory (LSTM) model, which was able to learn normal user behavior patterns.},
        keywords = {LSTM, Insider Threats, Autoencoder},
        month = {January},
        }

Cite This Article

P, B., & M, J. S., & Dhanush, K. M., & N, K. K., & P, S. P. K. (2025). AIML IN CYBERSECURITY: DETECT INTRUSIONS AND INSIDER THREATS. International Journal of Innovative Research in Technology (IJIRT), 11(8), 1960–1964.

Related Articles