Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
Adaptive, multi-step assaults that usually get past conventional, signature-based defenses make modern cybersecurity a shifting target. This study introduces a hybrid cybersecurity framework that combines proactive endpoint deception, anomaly analysis, and machine learning-based detection to overcome the shortcomings of static security models. The architecture uses two layers: an Isolation Forest model detects latent behavioral anomalies, and a Random Forest classifier detects known attack patterns. The architecture uses honeytokens strategic digital tripwires positioned throughout the network to aggressively expose illegal exploration. A secure, multi-node backend with segregated APIs is used to expose all detection signals, which are combined into a consolidated risk score. With an inference delay of <10ms, experimental results on a dataset of 15,000 behavioral samples show near perfect accuracy.
"ML-Based Cyber Attack Detection with Endpoint Deception and Secure Node-Scoped Intelligence Architecture", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2456-3315, Vol.11, Issue 3, page no.b381-b388, March-2026, Available :http://www.ijrti.org/papers/IJRTI2603144.pdf
Downloads:
00068
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator