Threat Foresight: Web Threat Detection and Forecasting Trends and Insights

Authors

  • Krutika Dwarka Naidu Department of Artificial Intelligence and Data Science, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India Author
  • Dr. Syed Irfan Ali Department of Artificial Intelligence and Data Science, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India Author
  • Sujal Shyam Hasoriya Department of Artificial Intelligence and Data Science, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India Author
  • Sujal Ganvir Department of Artificial Intelligence and Data Science, Anjuman College of Engineering & Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Maharashtra, India Author

DOI:

https://doi.org/10.32628/IJSRST25122209

Keywords:

Web Threat Forecasting, AI-driven cybersecurity, Generative AI for Threat Analysis, Cyber Threat Intelligence, Deep Learning for Cyber Threat Detection, Time Series Analysis in Cybersecurity, Anomaly Detection in Web Security, Machine, Learning-Based Threat Mitigation, Real-Time Cyber Threat Monitoring, Benchmarking AI vs. Traditional Security Approaches

Abstract

The increasing sophistication and frequency of web threats necessitate advanced analytics and forecasting techniques to mitigate potential cyber risks. Traditional security measures, while effective to some extent, often struggle to adapt to evolving cyber threats. The advent of Artificial Intelligence (AI) and Generative AI (GenAI) has introduced novel methodologies for detecting, analyzing, and predicting web-based threats. This review paper explores the landscape of web threat analytics, evaluates traditional and modern forecasting techniques, and examines the role of AI and GenAI in enhancing cybersecurity. Furthermore, it highlights the challenges, limitations, and future directions in web threat analytics to guide future research and development.

Downloads

Download data is not yet available.

References

Abd Al Hussein Qasim, M., & Abbas Flayh, N. (n.d.). Phishing website detection using machine learning: A review. Wasit Journal for Pure Sciences (Issue 2).

Ahammad, S. H., Kale, S. D., Upadhye, G. D., Pande, S. D., Babu, E. V., Dhumane, A. V., & Bahadur, M. D. K. J. (2022). Phishing URL detection using machine learning methods. Advances in Engineering Software, 173. https://doi.org/10.1016/j.advengsoft.2022.103288

Alevizos, L., & Dekker, M. (n.d.). Towards an AI-enhanced cyber threat intelligence processing pipeline.

Ghalechyan, H., Israyelyan, E., Arakelyan, A., Hovhannisyan, G., & Davtyan, A. (2024). Phishing URL detection with neural networks: An empirical study. Scientific Reports, 14(1), 25134. https://doi.org/10.1038/s41598-024-74725-6

Goel, N., & Sethi, N. (2022). Cyber threat intelligence: A survey on progressive techniques and challenges. ResearchGate. https://www.researchgate.net/publication/361276941

Hamza, A. A., & Al-Janabi, R. J. S. (2024). Detecting brute force attacks using machine learning. BIO Web of Conferences, 97. https://doi.org/10.1051/bioconf/20249700045

Ibrahim, N. J. (n.d.). Improving the efficiency of brute-force attack detection using decision trees: An analysis study. Journal of Engineering, Mechanics and Modern Architecture, 2(11), 2023. https://www.researchgate.net/publication/375834787

Louw, M. T., & Venkatakrishnan, V. N. (n.d.). Blueprint: Robust prevention of cross-site scripting attacks for existing browsers. www.xssed.com

Sadasivam, G. K., Hota, C., & Anand, B. (2018). Honeynet data analysis and distributed SSH brute-force attacks. In Towards extensible and adaptable methods in computing (pp. 107–118). Springer Singapore. https://doi.org/10.1007/978-981-13-2348-5_9

Seker, E. (n.d.). Cyber threat intelligence: Understanding fundamentals cyber threat intelligence (CTI). https://www.researchgate.net/publication/335692544

Shelatkar, T., Tondale, S., Yadav, S., & Ahir, S. (2020). Web traffic time series forecasting using ARIMA and LSTM RNN. ITM Web of Conferences, 32, 03017. https://doi.org/10.1051/itmconf/20203203017

Shuvo, M. A. R., Zubair, M., Purnota, A. T., Hossain, S., & Hossain, M. I. (2021). Traffic forecasting using time-series analysis. Proceedings of the 6th International Conference on Inventive Computation Technologies (ICICT 2021), 269–274. https://doi.org/10.1109/ICICT50816.2021.9358682

Swathi, K. (2022). Brute force attack on real-world passwords. International Journal of Research Publication and Reviews, 3(11). www.ijrpr.com

Downloads

Published

04-03-2025

Issue

Section

Research Articles

How to Cite

Threat Foresight: Web Threat Detection and Forecasting Trends and Insights. (2025). International Journal of Scientific Research in Science and Technology, 12(2), 129-133. https://doi.org/10.32628/IJSRST25122209

Similar Articles

1-10 of 460

You may also start an advanced similarity search for this article.