About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II

Research Article

From Threat Hunting to Prevention: The Role of Python in Cybersecurity Defense

Download24 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.28-4-2025.2358054,
        author={A.  Vinitha and Kiran Kumari  Patil and K.  Reena and D.  Yobu and D.  Vikram and S. P.  Santhoshkumar},
        title={From Threat Hunting to Prevention: The Role of Python in Cybersecurity Defense},
        proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II},
        publisher={EAI},
        proceedings_a={ICITSM PART II},
        year={2025},
        month={10},
        keywords={cybersecurity denial-of-service threat detection packet analysis network analysis hashing},
        doi={10.4108/eai.28-4-2025.2358054}
    }
    
  • A. Vinitha
    Kiran Kumari Patil
    K. Reena
    D. Yobu
    D. Vikram
    S. P. Santhoshkumar
    Year: 2025
    From Threat Hunting to Prevention: The Role of Python in Cybersecurity Defense
    ICITSM PART II
    EAI
    DOI: 10.4108/eai.28-4-2025.2358054
A. Vinitha1, Kiran Kumari Patil2, K. Reena3, D. Yobu4, D. Vikram5, S. P. Santhoshkumar6,*
  • 1: Karpagam Academy of Higher Education, India
  • 2: CMR university, India
  • 3: Knowledge Institute of Technology, India
  • 4: J.J College of Engineering and Technology, India
  • 5: Rathinam Technical Campus, India
  • 6: Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India
*Contact email: spsanthoshkumar16@gmail.com

Abstract

Python is increasingly being used to check and mitigate threats in the fastmoving niche of cyber security. This article explores the use of Python to identify and support remediation of common cyberthreats such as malware, phishing, unauthorized access via open ports, password use weakness, and network anomalies. We use these algorithms and consider execution time, detection accuracy, code robustness and possible vulnerabilities, to evaluate the ability of a Python-based algorithm to detect these threats. Despite the speed that Python is developed and deployed, we found through our research that threat detection efficacy varies by the attack vector. This article summarises a comprehensive comparison of the detection implementations, and the benefits and limitations are discussed to emphasise the necessity of adaptive changing in security in cyber warfare.

Keywords
cybersecurity, denial-of-service, threat detection, packet analysis, network analysis, hashing
Published
2025-10-14
Publisher
EAI
http://dx.doi.org/10.4108/eai.28-4-2025.2358054
Copyright © 2025–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL