Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure
Main Article Content
Abstract
Protection of infrastructure is becoming increasingly demanding, and the sophistication and severity of cyber threats are increasing daily. Traditional threat detection techniques cannot match the ever-evolving nature of cyber threats, which increases the number of false positives and attack misses. AI-driven methods address these shortfalls via the use of advanced learning algorithms to detect and respond to newly discovered threats in real time. They are largely static rule-based or signature-based attacks, and they do not perform effectively against zero-day attacks and highly organized, advanced attacks. Given the critical need to protect digital infrastructures such as energy, transport, and communications from destruction, which threatens security and operational integrity, an adaptive means for real-time and accurate threat detection must evolve. This research aims to determine the optimum method for designing and testing an AI-based real-time threat detection system that is suitable for use in critical infrastructure environments. Compared with traditional methods, the proposed system uses an advanced machine learning technique to provide better detection accuracy, adaptiveness, and efficiency of results. It is designed to integrate all the critical features of data integration, anomaly detection, and feature extraction along with an automated response mechanism that allows the system to detect various types of threats and cyberattacks, including new and sophisticated ones, without much human intervention. Some of the key performance indicators, including accuracy, precision, recall, and F1 score, ensure that, indeed, the system is effective. The research findings illustrate that for clear readability, the AI-based detection system reported an accuracy value of 0.95, where precision is 0.93 and a recall value of 0.92 with the F1 score of 0.92, hence performing better than do conventional methods of threat detection. This suggests that it reports a high rate of false-positive rejection while returning proper alerts in the case of real-time operation. This was also enhanced by an automated response feature of the system that provided faster threat mitigations with shorter times for all types of responses, leading to even improved security. Finally, the paper has demonstrated how the AI-based approach is a viable and scalable solution towards mitigating current cybersecurity challenges in critical infrastructures and, at the same time, providing opportunities for further research into more robust, flexible, and autonomous defense systems.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] H. Sarker, "AI for Critical Infrastructure Protection and Resilience," in AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability , Cham: Springer Nature Switzerland, 2024, pp. 153–172.
[2] H. Sarker, "Introduction to AI-Driven Cybersecurity and Threat Intelligence," in AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability , Cham: Springer Nature Switzerland, 2024, pp. 3–19.
[3] H. Sarker, "AI-Enabled Cybersecurity for IoT and Smart City Applications," in AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability , Cham: Springer Nature Switzerland, 2024, pp. 121–136.
[4] R. Al-Amri, R. K. Murugesan, E. M. Alshari, and H. S. Alhadawi, "Toward a Full Exploitation of IoT in Smart Cities: A Review of IoT Anomaly Detection Techniques," 2022, pp. 193–214.
[5] S. Q. Salih and A. R. A. Alsewari, "A New Algorithm for Normal and Large-Scale Optimization Problems: Nomadic People Optimizer," Neural Computing and Applications , vol. 32, no. 14, pp. 10359–10386, 2020.
[6] T. Hai et al., "DependData: Data Collection Dependability Through Three-Layer Decision-Making in BSNs for Healthcare Monitoring," Information Fusion , vol. 62, pp. 32–46, Oct. 2020.
[7] U. Beyaztas, S. Q. Salih, K. W. Chau, N. Al-Ansari, and Z. M. Yaseen, "Construction of Functional Data Analysis Modelling Strategy for Global Solar Radiation Prediction: Application of Cross-Station Paradigm," Engineering Applications of Computational Fluid Mechanics , vol. 13, no. 1, pp. 1165–1181, 2019.
[8] Y. K. Salih, O. H. See, S. Yussof, A. Iqbal, and S. Q. Mohammad Salih, "A Proactive Fuzzy-Guided Link Labelling Algorithm Based on MIH Framework in Heterogeneous Wireless Networks," Wireless Personal Communications , vol. 75, no. 4, pp. 2495–2511, 2014.
[9] S. Bin Shibghatullah, "Mitigating Advanced Persistent Threats (APTs) through Machine Learning-Based Intrusion Detection Systems: A Comprehensive Analysis," SHIFRA , vol. 2023, pp. 1–10, 2023.
[10] S. Sinha, S. Gochhait, A. J. Obaid, A. S. Abdulbaqi, W. N. Alwan, M. I. Mahdi, and M. Muthmainnah, "Internet of Things (IoT) Enabled Healthcare System for Tackling the Challenges of Covid-19 – A Bibliometric Study," in AIP Conference Proceedings , vol. 2736, no. 1, AIP Publishing, 2023.
[11] I. Al Barazanchi and W. Hashim, "Enhancing IoT Device Security through Blockchain Technology: A Decentralized Approach," SHIFRA , vol. 2023, pp. 1–8, 2023.
[12] M. Burhanuddin, "Assessing the Vulnerability of Quantum Cryptography Systems to Emerging Cyber Threats," SHIFRA , vol. 2023, pp. 1–8, 2023.
[13] Aljohani, "Zero-Trust Architecture: Implementing and Evaluating Security Measures in Modern Enterprise Networks," SHIFRA , vol. 2023, pp. 1–13, 2023.
[14] W. Hashim and N. A.-H. K. Hussein, "Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures," SHIFRA , vol. 2024, pp. 9–17, 2024.
[15] S. Abdulbaqi, A. M. Salman, and S. B. Tambe, "Privacy-Preserving Data Mining Techniques in Big Data: Balancing Security and Usability," SHIFRA , vol. 2023, pp. 1–10, 2023.
[16] S. M. Sarsam, "Cybersecurity Challenges in Autonomous Vehicles: Threats, Vulnerabilities, and Mitigation Strategies," SHIFRA , vol. 2023, pp. 1–9, 2023.
[17] S. N. Tambe-Jagtap, "Human-Centric Cybersecurity: Understanding and Mitigating the Role of Human Error in Cyber Incidents," SHIFRA , vol. 2023, pp. 1–7, 2023.
[18] S. Abdulbaqi, N. A. Turki, A. J. Obaid, S. Dutta, and I. Y. Panessai, "Spoof Attacks Detection Based on Authentication of Multimodal Biometrics Face-ECG Signals," in Artificial Intelligence for Smart Healthcare , Cham: Springer International Publishing, 2023, pp. 507–526.
[19] S. N. Tambe-Jagtap, "A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions," SHIFRA , vol. 2023, pp. 1–10, 2023.
[20] H. R. Penubadi, P. Shah, R. Sekhar, M. N. Alrasheedy, Y. Niu, A. D. Radhi, and A. S. Abdulbaqi, "Sustainable Electronic Document Security: A Comprehensive Framework Integrating Encryption, Digital Signature, and Watermarking Algorithms," Heritage and Sustainable Development , vol. 5, no. 2, pp. 391–404, 2023.
[21] O. S. Albahri and A. H. AlAmoodi , Trans., “Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database ”, Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 158–169, Sep. 2023, doi: 10.58496/MJCSC/2023/018.
[22] H. Awang, N. S. Mansor, M. F. Zolkipli, S. T. S. Malami, K. Mohd Zaini, and T. D. Yau , Trans., “Cybersecurity Awareness among Special Needs Students: The Role of Parental Control”, Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 63–73, Jun. 2024, doi: 10.58496/MJCS/2024/007.
[23] A. Denis, “A Survey on Artificial Intelligence and Blockchain Applications in Cybersecurity for Smart Cities”, SHIFRA, vol. 2025, pp. 1–45, Jan. 2025, doi: 10.70470/SHIFRA/2025/001.
[24] M. A. Almaiah, R. . Bin Sulaiman, U. Islam, Y. Badr, and F. A. El-Qirem, “Federated Learning in Healthcare: A Bibliometric Analysis of Privacy, Security, and Adversarial Threats (2021-2024)”, SHIFRA, vol. 2025, pp. 46–61, Jan. 2025, doi: 10.70470/SHIFRA/2025/002.
[25] Z. T. Nayyef, M. M. Abdulrahman, and N. A. Kurdi, “Optimizing Energy Efficiency in Smart Grids Using Machine Learning Algorithms: A Case Study in Electrical Engineering”, SHIFRA, vol. 2024, pp. 46–54, Apr. 2024, doi: 10.70470/SHIFRA/2024/006.
[26] M. Al-Shareeda, A. Mohammed Ali, M. A. Hammoud, Z. H. M. Kazem, and M. A. Hussein, “Secure IoT-based real-time water level monitoring system using ESP32 for critical infrastructure,” Journal of Cyber Security and Risk Auditing, vol. 2025, no. 2, pp. 44–52, 2025.