
Research Article
AI-Driven Predictive Analytics for Proactive Network Threat Detection
@INPROCEEDINGS{10.4108/eai.28-4-2025.2358097, author={T Manikumar and Thippireddy Surya Prathap Reddy and Velupula Vikram and Yanna Rathan Kumar and Y. Santhan Maharshi Reddy}, title={AI-Driven Predictive Analytics for Proactive Network Threat Detection}, proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II}, publisher={EAI}, proceedings_a={ICITSM PART II}, year={2025}, month={10}, keywords={ai-based cybersecurity network threat detection healthcare security machine learning intrusion detection predictive modeling cyberattack classification anomaly detection}, doi={10.4108/eai.28-4-2025.2358097} }
- T Manikumar
Thippireddy Surya Prathap Reddy
Velupula Vikram
Yanna Rathan Kumar
Y. Santhan Maharshi Reddy
Year: 2025
AI-Driven Predictive Analytics for Proactive Network Threat Detection
ICITSM PART II
EAI
DOI: 10.4108/eai.28-4-2025.2358097
Abstract
The medical industry now entirely depends upon cyber infrastructure and therefore is also one of the targets for malicious threats. Legacy defenses like firewalls, access control, and intrusion detection systems lack the responsiveness of dealing with continuously changing threats. As a consequence, all forms of security-related vulnerabilities lie with data, resource management, as well as regulations. Hence, this paper intends to recommend a predictive network threat detection approach utilizing AI models that can cater to real-time protection for health setups. The system combines several machine learning algorithms such as K-Nearest Neighbors (KNN), Decision Trees, Random Forest, Naïve Bayes, Logistic Regression, AdaBoost, and XGBoost to identify and classify cyber threats with high precision. The approach takes a number of important steps: data gathering, where network traffic information is harvested from real-time observation and publicly accessible datasets; feature extraction, where appropriate properties like packet size, protocol category, and session length are yielded to improve the accuracy of classification; and training and testing the model, wherein machine learning strategies are used in order to discern normal and undesirable network traffic.Every algorithm lends itself differently towards the detection step.