-
CiteScore
-
Impact Factor
Volume 1, Issue 1, IECE Transactions on Neural Computing
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
IECE Transactions on Neural Computing, Volume 1, Issue 1, 2025: 55-64

Open Access | Research Article | 31 March 2025
Neural Network-Enhanced Machine Learning Applications in Cybersecurity for Real-Time Detection of Anomalous Activities and Prevention of Unauthorized Access in Large-Scale Networks
1 Department of Computer Science, Middlesex University, London, N14 4YZ, United Kingdom
2 Faculty of Science and Technology, Thammasat University Rangsit Center, Pathumthani 12120, Thailand
* Corresponding Author: Faryal Batool, [email protected]
Received: 12 March 2025, Accepted: 22 March 2025, Published: 31 March 2025  
Abstract
Neural network-enhanced machine learning is revolutionizing cybersecurity by enabling real-time detection of anomalous activities and proactive prevention of unauthorized access in large-scale networks. Traditional security measures often prove ineffectual in the face of the fast-developing threats, as they depend on unchanging rules and signature detections, which can be bypassed by the advanced cyber adversaries. In contrast, neural networks apply deep learning techniques to several data sets including user behavior, network traffic, and system activity, which helps them to spot small irregularities that may mean a potential threat. By feed-forwarding new information on the high-quality training sets, the AI-based models got the better of the specific task and entrenched themselves in the industry, thus allowing them to speed detection, reduce false positives, and automate threat-responsiveness for the proper solution of problems .In addition, neural networks also comprise the crucial aspects of the utilization of adaptive access control, the deepening of identity verification processes, as well as eliminating the risk of insider threats and zero-day vulnerabilities. However, neural networks in cybersecurity can also pose challenges, such as adversarial attacks, interpretability issues of the model, and concerns regarding data privacy. Solving these problems using adversarial training, explainable AI (XAI), and ethical AI governance is required to ensure that the potential of neural networks can be used to the greatest extent in the context of cybersecurity. With the changing paradigm from reactive to proactive security measures, organizations are capitalizing on the robust and intelligent resource that neural networks are in combating increasing cyber threats and restoring the security of extensive digital infrastructures.

Graphical Abstract
Neural Network-Enhanced Machine Learning Applications in Cybersecurity for Real-Time Detection of Anomalous Activities and Prevention of Unauthorized Access in Large-Scale Networks

Keywords
neural networks
cybersecurity
anomaly detection
machine learning
unauthorized access prevention

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Boddy, A., Hurst, W., Mackay, M., & El Rhalibi, A. (2019, March). A hybrid density-based outlier detection model for privacy in electronic patient record system. In 2019 5th International Conference on Information Management (ICIM) (pp. 92-96). IEEE.
    [CrossRef]   [Google Scholar]
  2. Chethan, M. S., Rajeswari, R., & Selvam, M. (2023, October). Cyber Attack Detection System in University Private Cloud Using Machine Learning. In 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS) (pp. 1080-1085). IEEE.
    [CrossRef]   [Google Scholar]
  3. Zakiya Manzoor Khan, et al. (2023). Network Intrusion Detection Using Autoencode Neural Network. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 1678–1688.
    [CrossRef]   [Google Scholar]
  4. Kayode-Ajala, O. (2021). Anomaly detection in network intrusion detection systems using machine learning and dimensionality reduction. Sage Science Review of Applied Machine Learning, 4(1), 12-26.
    [Google Scholar]
  5. Arjunan, T. (2024). Fraud Detection in NoSQL Database Systems using Advanced Machine Learning. International Journal of Innovative Science and Research Technology, 9(3), 248-253.
    [Google Scholar]
  6. Düzgün, B., Çayır, A., Ünal, U., & Dağ, H. (2024). Network intrusion detection system by learning jointly from tabular and text‐based features. Expert Systems, 41(4), e13518.
    [CrossRef]   [Google Scholar]
  7. Balani, Z., & Mustafa, N. I. (2024). Enhancing cybersecurity against emerging threats in the future of cyber warfare. International Journal of Intelligent Systems and Applications in Engineering, 12(2s), 204-209.
    [Google Scholar]
  8. Alsariera, Y. A., Awwad, W. F., Algarni, A. D., Elmannai, H., Gamarra, M., & Escorcia-Gutierrez, J. (2024). Enhanced Dwarf Mongoose optimization algorithm with deep learning-based attack detection for drones. Alexandria Engineering Journal, 93, 59-66.
    [CrossRef]   [Google Scholar]
  9. Hussain, A. (2018). Use of Firewall and Ids To Detect and Prevent Network Attacks. International Journal of Technical Research & Science, 3, 289-292.
    [Google Scholar]
  10. Tariq, N., Alsirhani, A., Humayun, M., Alserhani, F., & Shaheen, M. (2024). A fog-edge-enabled intrusion detection system for smart grids. Journal of Cloud Computing, 13(1), 43.
    [CrossRef]   [Google Scholar]
  11. Gawande, U., Hajari, K., & Golhar, Y. (2024). Novel person detection and suspicious activity recognition using enhanced YOLOv5 and motion feature map. Artificial Intelligence Review, 57(2), 16.
    [CrossRef]   [Google Scholar]
  12. Aljabri, M., Alahmadi, A. A., Mohammad, R. M. A., Alhaidari, F., Aboulnour, M., Alomari, D. M., & Mirza, S. (2023). Machine learning-based detection for unauthorized access to IoT devices. Journal of Sensor and Actuator Networks, 12(2), 27.
    [CrossRef]   [Google Scholar]
  13. Pallewar, M., Pawar, V. R., & Gaikwad, A. N. (2024). Human Anomalous Activity detection with CNN-LSTM approach. Journal of Integrated Science and Technology, 12(1), 704-704.
    [Google Scholar]
  14. Rashid, M., Kamruzzaman, J., Imam, T., Wibowo, S., & Gordon, S. (2022). A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence, 52(9), 9768-9781.
    [CrossRef]   [Google Scholar]
  15. Li, R., Yin, L., Zhang, Y., Qian, K., & Luo, X. (2023, January). FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory Networks. In 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 329-335). IEEE.
    [CrossRef]   [Google Scholar]
  16. Mignone, P., Corizzo, R., & Ceci, M. (2024). Distributed and explainable GHSOM for anomaly detection in sensor networks. Machine Learning, 113(7), 4445-4486.
    [CrossRef]   [Google Scholar]
  17. Aziz, Z., & Bestak, R. (2024). Insight into anomaly detection and prediction and mobile network security enhancement leveraging k-means clustering on call detail records. Sensors, 24(6), 1716.
    [CrossRef]   [Google Scholar]
  18. Singh, S., Kumar, S., Sharma, A., & Aarti, S. (2024). Anomaly Detection in Heterogeneous Using Graph Convolutional Networks. International Journal For Multidisciplinary Research. 6(1).
    [CrossRef]   [Google Scholar]
  19. Hnamte, V., & Hussain, J. (2023). Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach. Telematics and Informatics Reports, 11, 100077.
    [CrossRef]   [Google Scholar]
  20. Khan, T. A., Khan, M. S., Abbas, S., Janjua, J. I., Muhammad, S. S., & Asif, M. (2021, April). Topology-aware load balancing in datacenter networks. In 2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob) (pp. 220-225). IEEE.
    [CrossRef]   [Google Scholar]
  21. Shoaib, M., Shah, B., Hussain, T., Yang, B., Ullah, A., Khan, J., & Ali, F. (2024). A deep learning-assisted visual attention mechanism for anomaly detection in videos. Multimedia Tools and Applications, 83(29), 73363-73390.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Batool, F., & Hassnain, S. I. (2025). Neural Network-Enhanced Machine Learning Applications in Cybersecurity for Real-Time Detection of Anomalous Activities and Prevention of Unauthorized Access in Large-Scale Networks. IECE Transactions on Neural Computing, 1(1), 55–64. https://doi.org/10.62762/TNC.2025.920886

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 92
PDF Downloads: 28

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Emerging and Computer Engineers. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
IECE Transactions on Neural Computing

IECE Transactions on Neural Computing

ISSN: request pending (Online) | ISSN: request pending (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2025 Institute of Emerging and Computer Engineers Inc.