Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.8.07Keywords:
Cybersecurity, machine learning, deep learningDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The exponential growth of digital infrastructures and the increasing sophistication of cyber-attacks necessitate the development of intelligent, adaptive, and real-time defense mechanisms. Traditional signature-based intrusion detection systems often fail to detect zero-day exploits and evolving attack patterns, making anomaly detection a critical component of modern cybersecurity. This research proposes an Adaptive Machine Learning Framework capable of detecting anomalies in real time by integrating streaming data analysis, dynamic feature selection, and continuous model optimization. The framework leverages a hybrid learning paradigm that combines supervised and unsupervised techniques—specifically, ensemble-based classification for known threats and clustering-based outlier detection for unknown patterns. A key innovation lies in the adaptive retraining module, which incrementally updates the model parameters in response to evolving network behaviors and attack signatures without requiring full retraining, thereby reducing computational overhead. The system architecture incorporates data preprocessing, feature engineering, adaptive model selection, and decision fusion layers to ensure high detection accuracy and minimal false positives. Real-world network traffic datasets, such as UNSW-NB15 and CIC-IDS2017, were used to validate the framework’s effectiveness. Experimental results demonstrate an average detection accuracy exceeding 98% with a significant improvement in detection latency compared to baseline methods. This approach shows strong potential for deployment in live cybersecurity environments, offering robust defense against both known and unknown threats. The proposed framework can be extended to support multi-modal data sources, enabling its integration into large-scale security information and event management (SIEM) systems for proactive threat mitigation.Abstract
How to Cite
Downloads
Similar Articles
- Roopshree Banchode, Sai Pranathi Bhallamudi, S. P. Kanchana, Evaluation of the Quality of Commonly Used Edible Oils and The Effects of Frying , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Gourav Kalra, Arun Kumar Gupta, Multi-response Optimization of Machining Parameters in Inconel 718 End Milling Process Through RSM-MOGA , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Ravindra K. Kushwaha, Sonia Patel, Sarfaraz Ahmad, Indian education through a G20 lens-Ensuring continuity of sustainable development , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Surender Singh, Deep Lal, Rachna Thakur, Suchitra Devi, Socio-economic Compulsions on Climate Change and Energy Security of India , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Nandini S, Nagabushanam M, Nandeesh G S, Sundaresha M P, Pramodkumar S, Segmentation of Brain Tumor from Magnetic Resonance Imaging using Handcrafted Features with BOA-based Transformer , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Tarandeep Kaur, Sangeeta Taneja, Kashmiri Embroidery: Sustaining Cultural Heritage in a Globalized World , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Maheshbhai R. Jakhotra, Sanjay Gupta, A Study on the Design and Effectiveness of a Spoken English Program for Gujarati Medium Secondary School Students (Aged 14–15) , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Jerinrechal, I. Antonitte Vinoline, A Deterministic Inventory Model with Automation-Enabled Processes for Defective Item Management , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Shantanu Kanade, Anuradha Kanade, Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Rashmika Vaghela, Dileep Labana, Kirit Modi, Efficient I3D-VGG19-based architecture for human activity recognition , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 13 14 15 16 17 18 19 20 21 > >>
You may also start an advanced similarity search for this article.

