Hybrid X-AI Approach for Detecting Cyber Terrorism and Terrorism Threats Using BERT Transformer

Authors

  • P. Keerthi Student, Department of MCA, KMM Institute of Post Graduate Studies, Tirupati, Andhra Pradesh, India Author
  • S. Munikumar Assistant Professor, Department of MCA, KMM Institute of Post Graduate Studies, Tirupati, Andhra Pradesh, India Author

Keywords:

X-AI, hybrid approach, machine learning, anomaly detection, deep learning, cybersecurity, threat detection, ensemble methods

Abstract

In an era marked by the rapid evolution of technology, cyber terrorism poses a significant threat to global security and societal stability. This paper proposes an X-AI enabled hybrid approach to enhance the detection and prevention of cyber terrorism activities. By integrating advanced artificial intelligence techniques with traditional cybersecurity measures, this approach aims to create a robust system capable of identifying and mitigating cyber threats in real-time. The proposed model leverages machine learning algorithms, including deep learning and ensemble methods, to analyze vast datasets for patterns indicative of cyber terrorist behavior. Additionally, the hybrid approach incorporates anomaly detection techniques to identify unusual activities that may signal an impending cyber-attack. Our system is designed to adapt continuously, learning from new data and evolving threat landscapes, thus ensuring proactive defence mechanisms against emerging cyber threats. We validate our approach through extensive experimentation on benchmark datasets, demonstrating improved accuracy and reduced false-positive rates compared to existing detection systems. The findings underscore the potential of X-AI technologies in fortifying cybersecurity infrastructures against cyber terrorism. This research not only contributes to the academic discourse on cybersecurity but also provides practical implications for organizations seeking to enhance their threat detection capabilities.

Downloads

Download data is not yet available.

References

S. Bharati, P. J. S. Podder, and c. networks, "Machine and deep learning for iot security and privacy: applications, challenges, and future directions," vol. 2022, no. 1, p. 8951961, 2022.

M. Zolanvari, M. A. Teixeira, L. Gupta, K. M. Khan, and R. J. I. i. o. t. j. Jain, "Machine learning-based network vulnerability analysis of industrial Internet of Things," vol. 6, no. 4, pp. 6822-6834, 2019.

T. M. Chen and S. J. C. Abu-Nimeh, "Lessons from stuxnet," vol. 44, no. 4, pp. 91-93, 2011.

S. Latif, Z. Idrees, Z. Zou, and J. Ahmad, "DRaNN: A deep random neural network model for intrusion detection in industrial IoT," in 2020 international conference on UK-China emerging technologies (UCET), 2020, pp. 1-4: IEEE.

A. Halimaa and K. Sundarakantham, "Machine learning based intrusion detection system," in 2019 3rd International conference on trends in electronics and informatics (ICOEI), 2019, pp. 916-920: IEEE.

Downloads

Published

30-05-2025

Issue

Section

Research Articles

How to Cite

[1]
P. Keerthi and S. Munikumar, “Hybrid X-AI Approach for Detecting Cyber Terrorism and Terrorism Threats Using BERT Transformer”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 551–558, May 2025, Accessed: Jun. 03, 2025. [Online]. Available: https://ijsrset.com/index.php/home/article/view/IJSRSET251279

Similar Articles

1-10 of 337

You may also start an advanced similarity search for this article.