Cyber Security Violence Detection Using ML AND DL

Authors

  • N. Sruthilaya
  • P. Thatchayini

Keywords:

Anomaly detection, Artificial intelligence, Cybersecurity, Deep learning, Intrusion detection system, Machine learning, Network security, Real-time monitoring

Abstract

The exponential growth in digital interactions and interconnectivity has rendered cyberspace increasingly vulnerable to sophisticated and evolving threats. Traditional security mechanisms, although foundational, often fall short in detecting and mitigating novel, zero-day, and complex intrusion patterns. This research addresses the limitations of existing Intrusion Detection Systems (IDS) by proposing an intelligent framework that leverages Machine Learning (ML) and Deep Learning (DL) methodologies for proactive cybersecurity violence detection. The system integrates state-of-the-art models such as Support Vector Machines (SVM), Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and hybrid architectures to classify and respond to network anomalies and malicious behaviors in real-time.

The study begins with a comprehensive literature review encompassing recent advances in violence detection technologies, highlighting their merits and constraints in processing structured and unstructured data from varied sources such as surveillance feeds, network logs, and dark web content. Datasets like NSL-KDD and CICIDS2017 were employed for empirical validation. Key challenges tackled include data imbalance, false-positive minimization, real-time response capabilities, and attack-type classification. The proposed solution further integrates domain knowledge-driven feature engineering to optimize detection accuracy and scalability.

Experimentation reveals that combining ML classifiers with deep architectures significantly enhances detection precision and recall, particularly in identifying stealthy or previously unseen attack vectors such as Denial-of-Service (DoS), Remote-to-User (R2L), and User-to-Root (U2R) intrusions. An intuitive user interface built on Django, powered by MySQL databases and visual analytics, ensures seamless usability and actionable insights for security analysts.

Ultimately, this work contributes a modular, adaptive, and extensible framework that addresses pressing cybersecurity challenges with intelligent automation. Future enhancements aim to incorporate continual learning and incremental model updates to accommodate the dynamic nature of cyber threats while addressing ethical considerations and privacy concerns inherent to automated surveillance systems.

References

S. Aftergood, “Cybersecurity: The cold war online,” Nature, vol. 547, no. 7661, pp. 30–31, Jul. 2017, doi: https://doi.org/10.1038/547030a.

A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, “Evaluating Computer Intrusion Detection Systems,” ACM Computing Surveys, vol. 48, no. 1, pp. 1–41, Sep. 2015, doi: https://doi.org/10.1145/2808691.

C. N. Modi and K. Acha, “Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review,” The Journal of Supercomputing, vol. 73, no. 3, pp. 1192–1234, Jul. 2016, doi: https://doi.org/10.1007/s11227-016-1805-9.

E. Viegas, A. O. Santin, A. Franca, R. Jasinski, V. A. Pedroni, and L. S. Oliveira, “Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems,” IEEE Transactions on Computers, vol. 66, no. 1, pp. 163–177, Jan. 2017, doi: https://doi.org/10.1109/tc.2016.2560839.

A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: Existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, Aug. 2007, doi: https://doi.org/10.1016/j.comnet.2007.02.001.

C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, Jan. 2013, doi: https://doi.org/10.1016/j.jnca.2012.05.003.

S. Revathi and A. Malathi, “A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection,” 2013. Available: https://www.ijert.org/research/a-detailed-analysis-on-nsl-kdd-dataset-using-various-machine-learning-techniques-for-intrusion-detection-IJERTV2IS120804.pdf

D. Sahoo, C. Liu, and S. C, “Malicious URL Detection using Machine Learning: A Survey,” arXiv.org, 2017. https://arxiv.org/abs/1701.07179

L. Buczak and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016, doi: https://doi.org/10.1109/comst.2015.2494502.

M. Soni, M. Ahirwa, and S. Agrawal, “A Survey on Intrusion Detection Techniques in MANET,” IEEE Xplore, Dec. 01, 2015. https://ieeexplore.ieee.org/abstract/document/7546253.

Published

2025-07-22

How to Cite

N. Sruthilaya, & P. Thatchayini. (2025). Cyber Security Violence Detection Using ML AND DL. Journal of Network Security Computer Networks, 11(2), 8–13. Retrieved from https://matjournals.net/engineering/index.php/JONSCN/article/view/2210

Issue

Section

Articles