AI-Driven Anomaly Detection in Network Security: A Comparative Study of Machine Learning Algorithms

Main Article Content

Author

Abstract

As cyber threats continue to grow in sophistication and frequency, traditional network security measures often struggle to detect novel and evolving attacks. Anomaly detection, driven by Artificial Intelligence (AI) and Machine Learning (ML), has emerged as a powerful technique for identifying abnormal patterns in network traffic that may indicate security breaches. a comparative study of various machine learning algorithms used in anomaly detection for network security. Specifically, we examine supervised, unsupervised, and deep learning models, including decision trees, k-means clustering, support vector machines (SVM), and neural networks, evaluating their effectiveness in detecting anomalies and mitigating cyber threats. Through simulations and real-world data analysis, the study highlights the strengths and limitations of each algorithm in terms of detection accuracy, false positives, computational complexity, and adaptability to different network environments. We also discuss the challenges of deploying AI-driven anomaly detection systems in practice, including data quality, model scalability, and the risk of adversarial attacks. This comparative study aims to provide insights into the most effective ML algorithms for enhancing network security, offering recommendations for future research and practical implementations in AI-driven cybersecurity solutions.

Article Details

How to Cite
Author. (2024). AI-Driven Anomaly Detection in Network Security: A Comparative Study of Machine Learning Algorithms. Journal of Quantum Science and Technology, 1(3), 94–98. https://doi.org/10.36676/jqst.v1.i3.31
Section
Original Research Articles

References

Purohit, M. S. (2012). Resource management in the desert ecosystem of Nagaur district_ An ecological study of land agriculture water and human resources (Doctoral dissertation, Maharaja Ganga Singh University).

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.