Hybrid X-AI Approach for Detecting Cyber Terrorism and Terrorism Threats Using BERT Transformer
Keywords:
X-AI, hybrid approach, machine learning, anomaly detection, deep learning, cybersecurity, threat detection, ensemble methodsAbstract
In an era marked by the rapid evolution of technology, cyber terrorism poses a significant threat to global security and societal stability. This paper proposes an X-AI enabled hybrid approach to enhance the detection and prevention of cyber terrorism activities. By integrating advanced artificial intelligence techniques with traditional cybersecurity measures, this approach aims to create a robust system capable of identifying and mitigating cyber threats in real-time. The proposed model leverages machine learning algorithms, including deep learning and ensemble methods, to analyze vast datasets for patterns indicative of cyber terrorist behavior. Additionally, the hybrid approach incorporates anomaly detection techniques to identify unusual activities that may signal an impending cyber-attack. Our system is designed to adapt continuously, learning from new data and evolving threat landscapes, thus ensuring proactive defence mechanisms against emerging cyber threats. We validate our approach through extensive experimentation on benchmark datasets, demonstrating improved accuracy and reduced false-positive rates compared to existing detection systems. The findings underscore the potential of X-AI technologies in fortifying cybersecurity infrastructures against cyber terrorism. This research not only contributes to the academic discourse on cybersecurity but also provides practical implications for organizations seeking to enhance their threat detection capabilities.
Downloads
References
S. Bharati, P. J. S. Podder, and c. networks, "Machine and deep learning for iot security and privacy: applications, challenges, and future directions," vol. 2022, no. 1, p. 8951961, 2022.
M. Zolanvari, M. A. Teixeira, L. Gupta, K. M. Khan, and R. J. I. i. o. t. j. Jain, "Machine learning-based network vulnerability analysis of industrial Internet of Things," vol. 6, no. 4, pp. 6822-6834, 2019.
T. M. Chen and S. J. C. Abu-Nimeh, "Lessons from stuxnet," vol. 44, no. 4, pp. 91-93, 2011.
S. Latif, Z. Idrees, Z. Zou, and J. Ahmad, "DRaNN: A deep random neural network model for intrusion detection in industrial IoT," in 2020 international conference on UK-China emerging technologies (UCET), 2020, pp. 1-4: IEEE.
A. Halimaa and K. Sundarakantham, "Machine learning based intrusion detection system," in 2019 3rd International conference on trends in electronics and informatics (ICOEI), 2019, pp. 916-920: IEEE.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.