ARCHIVES
Original Article
AI Based behavior Analysis for Cyber Security Enhancing Cyber Resilience through AI-Driven Behavioral Analysis: A Proactive Framework for Anomaly Detection
S. Jayakrishnan1
A. Jesudasan2
Dr. A. S. Arunachalam3
1 2 Research Scholar, Department of computer science, Vels Institute of Science Technology and Advanced Studies (VISTAS), Chennai, Tamilnadu, India. 3 Research Supervisor, Department of Computer Science & IT Vels Institute of Science Technology and Advanced Studies (VISTAS). Chennai, Tamilnadu, India.
Published Online: May-August 2026
Pages: 120-122
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502012References
1. System Design: CrowdStrike (2023). "AI-Powered Behavioral Analysis in Cybersecurity." CrowdStrike Resource.
2. Threat Detection: Sarker, I. H. (2024). "Advancing cybersecurity: a comprehensive review of AI-driven detection techniques."
SpringerLink.
3. Transparency: ScienceDirect (2024). "Explainable AI for cybersecurity automation, intelligence and trustworthiness." ScienceDirect.
4. Complexity: Springer (2024). "Advancing cybersecurity: a comprehensive review of AI- driven detection techniques." Source.
5. Privacy: IEEE Xplore (2023). "Federated Learning for Cyber Security: Concepts, Challenges, and Future Directions."
6. Accuracy: Sarker, I. H. (2024). "Examining the Impact of User Behavior Analysis on Threat Detection." Source.
7. Adversarial Risks: ScienceDirect (2024). "Explainable AI for cybersecurity automation, intelligence and trustworthiness." Source.
https://www.ijcrt.org/papers/IJCRT2410110.pdf, https://link.springer.com/article/10.1186/s40537-024-00957-y
2. Threat Detection: Sarker, I. H. (2024). "Advancing cybersecurity: a comprehensive review of AI-driven detection techniques."
SpringerLink.
3. Transparency: ScienceDirect (2024). "Explainable AI for cybersecurity automation, intelligence and trustworthiness." ScienceDirect.
4. Complexity: Springer (2024). "Advancing cybersecurity: a comprehensive review of AI- driven detection techniques." Source.
5. Privacy: IEEE Xplore (2023). "Federated Learning for Cyber Security: Concepts, Challenges, and Future Directions."
6. Accuracy: Sarker, I. H. (2024). "Examining the Impact of User Behavior Analysis on Threat Detection." Source.
7. Adversarial Risks: ScienceDirect (2024). "Explainable AI for cybersecurity automation, intelligence and trustworthiness." Source.
https://www.ijcrt.org/papers/IJCRT2410110.pdf, https://link.springer.com/article/10.1186/s40537-024-00957-y
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026