Temporal Intelligence in AI-Enhanced Cyber Forensics using Time-Based Analysis for Proactive Threat Detection

Main Article Content

Dharmesh Dhabliya, Satish N. Gujar, Ritika Dhabliya, Gurunath T. Chavan, Aarti Kalnawat, Shailesh P. Bendale

Abstract

To detect and address threats proactively, this study investigates the incorporation of temporal intelligence into AI-enhanced cyber forensics. Temporal intelligence makes timelines, recognizes patterns, and projects future risks by utilizing historical data. The method provides adaptive algorithms for ongoing monitoring, optimizes incident response, and preserves forensic evidence with precise timestamps. Temporal analysis, anomaly identification, incident response optimization, continuous monitoring, and behavioral analysis are highlighted in-depth throughout the flowchart phases. using the methodology's integration of machine learning and temporal intelligence, developing cyber risks can be proactively identified and mitigated using a strong cyber forensics framework. Machine learning, natural language processing, deep learning, and other AI-enhanced cyber forensics tools show varied applications and capacities across critical parameters. Time-Based Analysis shows to be quite successful, especially when it comes to temporal data processing and dynamic threat detection. The study's conclusion emphasizes the flexibility of Time-Based Analysis and Machine Learning, underscoring the continuous need for research and development to improve these methods and handle new cyberthreats in the dynamic field of cybersecurity.

Article Details

Section
Articles
Author Biography

Dharmesh Dhabliya, Satish N. Gujar, Ritika Dhabliya, Gurunath T. Chavan, Aarti Kalnawat, Shailesh P. Bendale

1Dharmesh Dhabliya

2Dr. Satish N. Gujar

3Ritika Dhabliya

4Dr. Gurunath T. Chavan

5Dr. Aarti Kalnawat

6Dr. Shailesh P. Bendale

1Professor, Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India Email: dharmesh.dhabliya@viit.ac.in

2Professor, Dept. Of Computer Engineering, Navashyandri Education Soc. Group of Institute faculty of Engineering, Pune, India. Email: satishgujar@gmail.com

3Director, Yashika Journal Publications Pvt. Limited, Wardha, Maharashtra, India Email: ritikadhabalia@gmail.com

4Associate Professor, Department of Information Technology, Vishwakarma Institute of Information Technology, Pune, Maharashtra, India. Email: gt.chavan@gmail.com

5Assistant Professor, Symbiosis Law School, Nagpur Campus, Symbiosis International (Deemed University), Pune, India. Email: aartikalnawat@slsnagpur.edu.in

6Head and Assistant Professor, Department of Computer Engineering, NBN Sinhgad School of Engineering, Pune, Maharashtra, India. Email: bendale.shailesh@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Cremer F., Sheehan B., Fortmann M., Kia A.N., Mullins M., Murphy F., Materne S. Cyber risk and cybersecurity: A systematic review of data availability Geneva Pap. Risk Insur. - Issues Pract., 47 (2022), pp. 698-736

Guembe B., Azeta A., Misra S., Osamor V.C., Fernandez-Sanz L., Pospelova V. The emerging threat of ai-driven cyber attacks: A review Appl. Artif. Intell., 36 (1) (2022), p. 36

Tetaly, P. Kulkarni, Artificial intelligence in cyber security – A threat or a solution, in: AIP Conference Proceedings, Vol. 2519, 2022.

Xu S., Qian Y., Hu R.Q. Data-driven network intelligence for anomaly detection IEEE Netw., 33 (3) (2019), pp. 88-95

Potnurwar, A. V. ., Bongirwar, V. K. ., Ajani, S. ., Shelke, N. ., Dhone, M. ., & Parati, N. . (2023). Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 23–35.

Limkar, Suresh, Ashok, Wankhede Vishal, Singh, Sanjeev, Singh, Amrik, Wagh, Sharmila K. & Ajani, Samir N.(2023) A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1597–1611

Ernst Huenges, & Mohamed K. Hassan. (2022). Architecture Framework of High Throughput for the Soft Decision Decoding. Acta Energetica, (02), 15–20. Retrieved from https://www.actaenergetica.org/index.php/journal/article/view/464

B. P., A. ., Sumathi, R. ., & H. S., S. . (2023). Analyzing Travel Time Reliability of a Bus Route in a Limited Data Set Scenario: A Case Study. International Journal of Intelligent Systems and Applications in Engineering, 11(2), 30–39. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2592

Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559.

Keshk M., Sitnikova E., Moustafa N., Hu J., Khalil I. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems IEEE Trans. Sustain. Comput., 6 (1) (2021), pp. 66-79

Abdullahi M., Baashar Y., Alhussian H., Alwadain A., Aziz N., Capretz L.F., Abdulkadir S.J.

Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review Electronics, 11 (2) (2022), p. 198

Gheyas I.A., Abdallah A.E. Detection and prediction of insider threats to cyber security: A systematic literature review and meta-analysis Big Data Anal., 1 (6) (2016)

Ten C.-W., Hong J., Liu C.-C. Anomaly detection for cybersecurity of the substations

IEEE Trans. Smart Grid, 2 (4) (2011), pp. 865-873

Yang J., Zhou C., Yang S., Xu H. Anomaly detection based on zone partition for security protection of industrial cyber-physical systems IEEE Trans. Ind. Electron., 65 (5) (2018), pp. 4257-4267

Shi D., Guo Z., Johansson K.H., Shi L. Causality countermeasures for anomaly detection in cyber-physical systems IEEE Trans. Automat. Control, 63 (2) (2018), pp. 386-401

Kotsias J., Ahmad A., Scheepers R. Adopting and integrating cyber-threat intelligence in a commercial organization Eur. J. Inf. Syst. (2022), pp. 1-17

Dey A.K., Gupta G.P., Sahu S.P. A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks Decis. Anal. J., 7 (2023), Article 100206

Khan N.F., Ikram N., Saleem S., Zafar S. Cyber-security and risky behaviors in a developing country context: A pakistani perspective Secur. J. (2022), pp. 1-33

Sufi F.K., Alsulami M. Automated multidimensional analysis of global events with entity detection, sentiment analysis and anomaly detection IEEE Access, 9 (2021), pp. 152449-152460

Ajani, S.N., Amdani, S.Y. (2021). Agent-Based Path Prediction Strategy (ABPP) for Navigation Over Dynamic Environment. In: Muthukumar, P., Sarkar, D.K., De, D., De, C.K. (eds) Innovations in Sustainable Energy and Technology. Advances in Sustainability Science and Technology. Springer.

Sufi F.K. AI-GlobalEvents: A software for analyzing, identifying and explaining global events with artificial intelligence Softw. Impacts, 11 (2022), Article 100218

Sufi F.K., Alsulami M., Gutub A. Automating global threat-maps generation via advancements of news sensors and AI Arab. J. Sci. Eng. (2022), pp. 1-18

Sufi F.K. Identifying the drivers of negative news with sentiment, entity and regression analysis Int. J. Inf. Manag. Data Insights, 2 (1) (2022), Article 100074

Pise, D. P. . (2021). Bot Net Detection for Social Media Using Segmentation with Classification Using Deep Learning Architecture. Research Journal of Computer Systems and Engineering, 2(1), 11:15. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/13