Have a personal or library account? Click to login
Real-Time threat identification and categorization in network traffic using deep learning behavioral analysis Cover

Real-Time threat identification and categorization in network traffic using deep learning behavioral analysis

Open Access
|May 2025

Figures & Tables

Figure 1:

DL and ML for anomalous network traffic analysis. DL, deep learning; ML, machine learning.
DL and ML for anomalous network traffic analysis. DL, deep learning; ML, machine learning.

Figure 2:

Layered architecture for real-time threat detection with ML and DL. DL, deep learning; ML, machine learning.
Layered architecture for real-time threat detection with ML and DL. DL, deep learning; ML, machine learning.

Figure 3:

Real-time threat detection and categorization performance in network. AUC, area under the ROC curve.
Real-time threat detection and categorization performance in network. AUC, area under the ROC curve.

Figure 4:

Performance breakdown by threat category.
Performance breakdown by threat category.

Figure 5:

Stages of real-time threat identification and categorization.
Stages of real-time threat identification and categorization.

Meta-analysis

Author(s)YearKey findingsMethod usedAdvantageDisadvantage
Mestry and Rathi2022Real-time malicious network detection in IoTCNN-LSTM, CICFlowMeterHigh detection accuracyNeeds feature extraction tools
Ismard2022Malicious network traffic detectionDLEnhances security, reduces economic lossNo categorization or behavioral analysis
Islam et al.2022Framework for secure traffic classification1D-CNN, Flow-time-based featuresHigh accuracy in encrypted traffic
Thirimanne et al.et al.2022Real-time IDS using DNNDNN, NSL-KDD datasetEffective feature extractionModerate accuracy
Gürfidan et al.2023ML/DL-based real-time anomaly detectionBlockchain + ML/DLEnhances detection speed, securityRequires computational resources
Rohith Vallabhaneni Srinivas A Vaddadi2023CNN-RNN-based cyberattack detectionCNN, RNNCaptures spatial and temporal dependenciesHigh computational cost
Hattak et al.2023IoT intrusion detection using visualized network dataDLConverts raw data into imagesLacks real-time analysis
Dabi Dabouabi Dalo Alionsi2023AI-driven real-time threat detection in IT networksML, DLEffective for complex networksRequires continuous updating
Liu et al2023Malicious traffic detection with FlowGANFlowGAN, DLEnhances small sample detectionNo threat categorization
Mei et al.2023DL-based anomaly detectionLetNet, LSTMRobust, high-speed detectionRequires large datasets
Sharma et al.2023Autoencoder-based anomaly detectionAutoencoderLearns complex patternsNo real-time classification
Alguliyev and Shikhaliyev2024Hybrid CNN-LSTM for network threat classificationCNN, LSTMHigh classification accuracyRequires large labeled datasets
Arjunan2024DL for anomaly detection in big data networksCNN, LSTM, Transfer LearningHandles large data volumesRequires continuous training
Cadet et al.2024AI-powered surveillance threat detectionDL modelsApplies to video feeds and sensorsNo direct network traffic analysis
Faradias Izza Azzahra Faisal, et al.2024DL for OTT traffic classificationCNN, LSTM, Bi-LSTMEffective QoS managementNo threat categorization
Zhao et al.2024CNN-Focal-based IDS for real-time traffic detectionCNN-FocalAddresses IDS limitationsNeeds SoftMax tuning
Language: English
Submitted on: Jan 5, 2025
Published on: May 16, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2025 Sai Kiranmai Dornala, P. Senthilkumar, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.