Project Proposal
Project Proposal
Presented by:
BRIAN CHEGE MWANGI : C026-01-0957/2022
PROJECT PROPOSAL SUBMITTED TO DEDAN KIMATHI
UNIVERSITY OF TECHNOLOGY IN PARTIAL
FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF
BACHELOR OF SCIENCE DEGREE IN COMPUTER SCIENCE
I, Brian Chege, hereby declare that this project is my original work. The content presented in
this proposal is the result of my own research and development. I have fully acknowledged
and cited all sources and references used throughout this project. No part of this project has
been copied or plagiarized from any other source, and any contributions from other
individuals or resources have been properly credited.
Name: ………………………………………………………………………………..
Name: ………………………………………………………………………………..
Name: ………………………………………………………………………………..
This proposal has been submitted for examination with my approval as University Supervisor.
Name: ………………………………………………………………………………..
The system is built with both performance and scalability in mind, ensuring it can handle high
volumes of network data in real-time without compromising accuracy. By incorporating
machine learning models that continuously improve over time, NetGuard adapts to new types
of threats as they emerge, offering organizations a proactive defense rather than just a reactive
one. The project also focuses on ease of integration with existing network infrastructures,
allowing businesses to quickly deploy and benefit from enhanced security without significant
disruption to their operations. The ability to respond automatically to potential threats while
keeping system administrators informed ensures that critical resources are better protected,
making it a valuable tool for organizations looking to strengthen their cybersecurity posture.
TABLE OF CONTENTS
DECLARATION .......................................................................................................................................2
ABSTRACT .............................................................................................................................................. 3
TABLE OF CONTENTS .......................................................................................................................... 4
ABBREVIATIONS ...................................................................................................................................5
1.CHAPTER ONE: INTRODUCTION .................................................................................................... 6
1.1BACKGROUND ..........................................................................................................................6
1.2 PROBLEM STATEMENT ......................................................................................................... 7
1.3 OBJECTIVES ..............................................................................................................................8
1.3.1 General Objectives ........................................................................................................... 8
1.3.2 Specific Objectives ........................................................................................................... 8
1.4 RESEARCH QUESTIONS ......................................................................................................... 8
1.5 JUSTIFICATIONS ......................................................................................................................9
1.6 SCOPE .........................................................................................................................................9
1.7 LIMITATIONS ........................................................................................................................... 9
2. CHAPTER 2: LITERATURE REVIEW .............................................................................................10
2.1 INTRODUCTION .....................................................................................................................10
2.2 THEORETICAL FRAMEWORK / CONCEPTS ..................................................................... 10
2.3CASE STUDY ............................................................................................................................11
2.3.1Overview ......................................................................................................................... 11
2.3.2 Incident Analysis ............................................................................................................ 11
2.3.3Analysis of Security Measures Used ...............................................................................12
2.3.4 Impact of Cyber Attacks .................................................................................................12
2.3.5 Relevance to AI-Driven Cybersecurity .......................................................................... 12
2.3.6 Limitations of the Case Study ........................................................................................ 13
2.4 TECHNOLOGICAL LANDSCAPE / TOOLS .........................................................................13
Technologies and Tools in AI-Based Cybersecurity: ..............................................................13
Machine Learning Models in Cybersecurity: .......................................................................... 13
2.5 IDENTIFIED GAPS IN EXISTING RESEARCH ................................................................... 14
Limitations of Current AI-Based Cybersecurity Systems: ......................................................14
Research Contributions: .......................................................................................................... 14
2.6 SUMMARY .............................................................................................................................. 14
3. CHAPTER THREE: METHODOLOGY ............................................................................................16
3.1 INTRODUCTION .....................................................................................................................16
3.2 Research Design ........................................................................................................................ 16
3.2.1 System Development ......................................................................................................17
3.2.2 Testing Environment ...................................................................................................... 17
3.2.3 Evaluation Criteria ..........................................................................................................17
3.3 Data Collection Methods ...........................................................................................................17
3.3.1 Cybersecurity Datasets ................................................................................................... 18
3.3.2 Simulated Attack Scenarios ............................................................................................18
3.3.3 Real-Time Data Collection .............................................................................................18
3.4 System Design and Architecture ............................................................................................... 18
3.4.1 Overview of the System Architecture ............................................................................ 19
3.4.2 Machine Learning Algorithm Selection ......................................................................... 19
3.4.3 Real-Time Threat Detection and Response ....................................................................19
3.5 Evaluation and Testing .............................................................................................................. 20
3.5.1 Evaluation Metrics ..........................................................................................................20
3.5.2 Testing Procedures ......................................................................................................... 20
3.5.3 Tools and Frameworks ................................................................................................... 20
3.5.4 Continuous Improvement ............................................................................................... 21
4. REFERENCES .................................................................................................................................... 21
ABBREVIATIONS
AI - Artificial Intelligence
ML - Machine Learning
DDoS - Distributed Denial of Service
SQL - Structured Query Language
IP - Internet Protocol
API - Application Programming Interface
TCP/IP - Transmission Control Protocol/Internet Protocol
HTTP - HyperText Transfer Protocol
HTTPS - HyperText Transfer Protocol Secure
SSL - Secure Sockets Layer
TLS - Transport Layer Security
DBMS - Database Management System
UI - User Interface
IDS - Intrusion Detection System
IPS - Intrusion Prevention System
IoT - Internet of Things
RAT - Remote Access Trojan
XSS - Cross-Site Scripting
CSRF - Cross-Site Request Forgery
JWT - JSON Web Token
AI-ML - Artificial Intelligence and Machine Learning
EDR - Endpoint Detection and Response
SIEM - Security Information and Event Management
API - Application Programming Interface
TFA - Two-Factor Authentication
MFA - Multi-Factor Authentication
1.CHAPTER ONE: INTRODUCTION
1.1BACKGROUND
In today’s interconnected digital world, the rapid growth of internet traffic and increasingly
sophisticated cyber threats pose significant challenges to maintaining network security.
Cyberattacks have become more complex, frequent, and destructive, targeting both large
organizations and small enterprises. Traditional security measures, such as firewalls and
signature-based intrusion detection systems (IDS), have struggled to keep pace with the
evolving tactics used by cybercriminals. These conventional methods are often reactive and
can fail to detect new or previously unseen threats in real-time.
One of the most common forms of cyberattacks today are Distributed Denial of Service
(DDoS) attacks, malware infections, and SQL injection attacks. These attacks can cripple
organizations, causing significant financial loss, data breaches, and reputational damage. As
organizations become more reliant on digital platforms, the consequences of such attacks
continue to grow. The increasing number of connected devices through the Internet of Things
(IoT) and the widespread adoption of cloud computing further complicate the security
landscape, providing more opportunities for attackers to exploit vulnerabilities.
The need for advanced, real-time cybersecurity solutions that can detect, prevent, and mitigate
these threats is more critical than ever. While AI and machine learning (ML) have shown
promising potential in various industries, their application in cybersecurity is still in its early
stages. Traditional cybersecurity tools are often static, unable to adapt to new attack vectors.
AI-powered threat detection systems, however, offer a dynamic approach by continuously
learning from network traffic, identifying patterns, and detecting anomalies that may indicate
a security breach. These systems have the potential to not only identify known threats but also
predict and respond to unknown, emerging attacks, making them invaluable in the fight
against cybercrime.
This project, NetGuard - AI-Driven Cybersecurity Threat Detection System, seeks to address
these challenges by leveraging artificial intelligence to create a proactive, adaptive, and
scalable cybersecurity solution that can detect and respond to a wide range of threats in real-
time.
1.2 PROBLEM STATEMENT
For example, KCB Group, one of East Africa’s largest banks, and eCitizen, the Kenyan
government's digital platform, have both fallen victim to DDoS attacks in recent years. These
attacks led to service interruptions, impacting customer trust and causing significant
disruptions to their operations. Despite implementing traditional security measures, such as
firewalls and intrusion detection systems, both organizations were unable to effectively
prevent or mitigate these attacks in real-time. Such incidents underscore the critical need for
more adaptive, proactive security solutions that can detect and respond to threats as they
emerge.As cybercriminals adopt increasingly complex tactics, existing systems are becoming
increasingly ineffective in detecting new and evolving threats.
There is an urgent need for more intelligent, AI-driven cybersecurity solutions that go beyond
traditional methods. These systems must be able to monitor and analyze network behavior in
real-time, learning to identify anomalies and predict potential threats before they escalate.
NetGuard aims to address this problem by using machine learning algorithms to monitor
network traffic, detect emerging threats, and provide proactive protection. By analyzing
patterns and behaviors within the network, the system can anticipate and prevent attacks,
offering a more dynamic, effective, and scalable solution to safeguard critical infrastructures.
1.3 OBJECTIVES
The primary aim of this project is to investigate and explore the potential of AI-driven cybersecurity
threat detection systems that can proactively identify, detect, and mitigate emerging cyber threats. This
research will focus on understanding how machine learning algorithms can be utilized to improve the
real-time security of networks and critical infrastructures by providing advanced protection against
evolving cyberattacks.
i. How can machine learning algorithms be utilized to detect cybersecurity threats in real-time
within network traffic?
ii. What are the most effective anomaly detection techniques for reducing false positives in
threat detection systems?
iii. How can predictive analytics be used to forecast and prevent potential cybersecurity threats
before they occur?
iv. What challenges exist when integrating an AI-driven cybersecurity system with existing
traditional security frameworks like firewalls and IDS?
v. How can an AI-driven cybersecurity system ensure scalability and adaptability to
accommodate varying sizes of network infrastructures?
vi. What impact does continuous learning have on improving the detection of new and evolving
threats?
vii. What are the key performance metrics for evaluating the effectiveness and accuracy of an AI-
driven cybersecurity detection system?
1.5 JUSTIFICATIONS
The need for a more advanced cybersecurity solution is driven by the increasing
sophistication of cyber threats, which traditional security systems struggle to mitigate. As
cybercriminals develop more advanced techniques, traditional security measures relying on
predefined rules and signatures become inadequate in protecting sensitive data and systems.
This limitation leaves organizations vulnerable to various attacks such as DDoS, malware,
and SQL injections, which can lead to significant operational disruptions and data breaches.
An AI-driven threat detection system offers real-time monitoring, predictive capabilities, and
adaptability, enabling it to learn from network behavior and identify emerging threats before
they escalate. This approach not only improves threat detection accuracy but also enhances
the efficiency and scalability of security measures, making it essential for organizations to
adopt AI-based solutions to safeguard their infrastructures effectively.
1.6 SCOPE
This study tries to develop, as well as evaluate an AI-powered cybersecurity threat detection system
that effortlessly achieves the high accuracy level compared with existing edge security measures
efficiently and scalably. Using machine learning algorithms, the system will track network activity and
identify irregularities dynamically so that we can access both threat detection as well as response
capabilities. More broadly, it is a research in cybersecurity for the detection of common attack vectors
such as Distributed Denial of Service (DDoS), malware and SQL injection with enterprise networks. A
system that is going to be built indefinite scale need to test with the different environment so they can
observe an ability for scaling as per your network traffic and complexity
1.7 LIMITATIONS
The main objective of this study is to implement and test an AI-based cybersecurity system by
designing various machine learning algorithms on a network that can be controlled. Some are based on
real-world scenarios but not all factors of the real world or every type of cyber threat, particularly
advanced persistent threats (APTs). The research is confined to threat detection and does not create
any particular remediation tools. Besides, the quality and quantity of available training datasets for both
methods are important performance indicators.
2. CHAPTER 2: LITERATURE REVIEW
2.1 INTRODUCTION
In today's digital age, the growing sophistication of cyber threats has made traditional security
systems increasingly inadequate. Cybercriminals are constantly evolving their tactics, leaving
organizations struggling to detect and respond to attacks effectively. As a result, researchers
and cybersecurity professionals have turned to artificial intelligence (AI) and machine
learning (ML) as promising solutions for enhancing threat detection and response capabilities.
This chapter explores the existing body of knowledge surrounding AI-driven cybersecurity,
focusing on machine learning algorithms, anomaly detection methods, and real-time threat
analysis. By reviewing relevant studies, tools, and frameworks, this section seeks to provide
context for the proposed system and identify gaps in current approaches that this research
aims to address. Ultimately, the insights gained will guide the development of a more
proactive and adaptive cybersecurity solution.
This section discusses the theoretical principles and concepts that inform the study of AI-
based cybersecurity systems, specifically focusing on the integration of artificial intelligence
and machine learning into cybersecurity applications.
AI and ML algorithms are used to detect threats by analyzing large datasets in real time,
identifying irregularities or behaviors indicative of an attack. This differs from traditional
signature-based detection systems, which rely on known attack patterns.
2.3CASE STUDY
2.3.1Overview
In July 2023, Kenya’s digital infrastructure experienced a series of cyberattacks attributed to the
hacktivist group Anonymous Sudan, which identified itself as retaliating against Kenya for alleged
political motives. The attacks primarily involved Distributed Denial of Service (DDoS) strategies,
overwhelming targeted systems with massive amounts of traffic to render them inaccessible.One
of the most notable targets was the eCitizen platform, a vital government portal that supports over
5,000 digital services ranging from tax payments and business registrations to accessing civil
records. The platform experienced significant downtime, leaving users unable to complete crucial
tasks, such as applying for passports and business permits. This outage disrupted essential
operations and affected millions of citizens who rely on eCitizen for daily transactions.
Other sectors also suffered the effects of the attack. For instance, key financial institutions,
including banks and payment systems, faced interruptions that caused delays in processing
transactions. These disruptions extended to private entities, particularly in the e-commerce sector,
where platforms reported outages or slowdowns. Anonymous Sudan, via its communication
channels, claimed responsibility for these coordinated attacks, presenting them as a demonstration
of Kenya’s vulnerability. Their messages suggested a calculated effort to exploit weak points in
the country’s cybersecurity framework while making a broader political statement.
Kenya Power and Lighting Company (KPLC): The cyberattack disrupted KPLC's services,
hindering customers' ability to purchase electricity tokens and manage their accounts
online.This interruption affected households and businesses relying on consistent power
supply.
Kenya Railways Corporation: Services were partially crippled, affecting train schedules
and ticketing systems.Commuters faced delays and cancellations, underscoring the attack's
impact on public transportation.
National Transport and Safety Authority (NTSA): The attack impeded services such as
driver testing and licensing, causing delays for individuals seeking these essential services.
eCitizen Platform: Hosting over 5,000 government services, the eCitizen platform became
inaccessible, disrupting processes like passport applications, business registrations, and
driving license applications.This outage affected citizens' access to critical government
services.
Digital Banking and Mobile Money Services: Financial transactions through platforms like
M-Pesa were partially paralyzed, freezing regular transactions and affecting the economy's
daily operations.
The targeted institutions primarily relied on traditional cybersecurity measures, including firewalls,
antivirus software, and intrusion detection systems.These defenses, based on predefined rules and
signatures, proved inadequate against the sophisticated and coordinated nature of the attacks.The
inability to detect and respond to these threats in real-time allowed the attackers to exploit
vulnerabilities effectively.
Operational Disruption: The attacks led to significant downtime across multiple sectors,
affecting service delivery and daily operations.
Economic Consequences: The paralysis of digital banking and mobile money services
hindered financial transactions, impacting businesses and individuals reliant on these
platforms.
Public Trust Erosion: The inability to access essential services eroded public confidence in
the security and reliability of the nation's digital infrastructure.
Proactive Threat Detection: AI systems can identify anomalies and potential threats
before they cause significant harm.
Real-Time Response: Machine learning algorithms enable immediate analysis and
response to emerging threats, minimizing potential damage.
Adaptability: AI systems continuously learn from new data, allowing them to adapt to
evolving attack vectors and methodologies.
While this case study provides valuable insights into the cybersecurity challenges faced by
Kenyan institutions, it focuses on specific incidents within a particular timeframe.The findings
may not be universally applicable to all sectors or regions. Additionally, the rapidly evolving
nature of cyber threats necessitates ongoing research and adaptation of cybersecurity strategies.
This section discusses the technologies, tools, and platforms commonly used in AI-based
cybersecurity systems. It highlights existing cybersecurity solutions and how machine
learning and AI models are implemented in real-world applications.
Decision Trees: Used to classify and predict network behavior based on certain
criteria.
Random Forests: An ensemble method that improves decision-making accuracy by
combining multiple decision trees.
Neural Networks: Deep learning models that can detect patterns in large datasets,
useful for recognizing sophisticated attack techniques.
While significant progress has been made in AI-driven cybersecurity, several gaps remain in
the current research and application landscape. Identifying these gaps allows for a clearer
focus for future innovations and contributions.
Research Contributions:
This research will contribute to addressing these gaps by focusing on creating a scalable, real-
time threat detection system using AI and ML. By leveraging large datasets and incorporating
both supervised and unsupervised learning models, the proposed system will be able to adapt
to emerging threats, providing a more robust and explainable cybersecurity solution.
2.6 SUMMARY
This chapter discussed the role of AI and ML in enhancing cybersecurity, addressing the
limitations of traditional systems in handling sophisticated threats. A case study on Kenya's
2023 cyberattacks by Anonymous Sudan highlighted vulnerabilities in digital infrastructure,
with critical services like eCitizen and financial platforms disrupted. AI-based tools such as
IDS, AI-powered firewalls, and ML models offer potential solutions but face challenges like
lack of explainability, data quality issues, and difficulty in detecting advanced threats. The
chapter concludes that AI can improve cybersecurity, but more research is needed to address
existing gaps.
3. CHAPTER THREE: METHODOLOGY
3.1 INTRODUCTION
This chapter outlines the methodology adopted to design, develop, and evaluate the AI-based
cybersecurity solution proposed in this research. The primary goal of this study is to enhance
threat detection capabilities within digital infrastructures by leveraging artificial intelligence
and machine learning techniques. The methodology focuses on the systematic approach for
data collection, model development, and system evaluation, ensuring that the research
objectives are met effectively.
The chosen research approach is experimental, where an AI-driven system will be developed
and tested under controlled conditions. This allows for a detailed examination of the system’s
performance in detecting and responding to real-time cybersecurity threats. The development
process is aimed at addressing the limitations of traditional cybersecurity mechanisms,
particularly their inability to proactively detect and mitigate advanced, evolving threats. By
combining machine learning algorithms, anomaly detection methods, and real-time data
analysis, this research seeks to provide an adaptive and robust cybersecurity solution.
The methodology includes the following steps: data collection and preparation, AI model
development, system design and implementation, testing and evaluation, and performance
analysis. The chapter also highlights the tools and technologies employed throughout the
study, as well as ethical considerations related to data privacy and security. Ultimately, this
research aims to contribute to the advancement of AI-driven cybersecurity systems that offer
proactive and adaptive protection against modern cyber threats.
The research design for this study is primarily experimental and quantitative, focusing on the
development and testing of an AI-driven cybersecurity solution. The research aims to create a
prototype system using machine learning and anomaly detection algorithms, which will then
be evaluated in a controlled environment.
3.2.1 System Development
The AI-based cybersecurity system is designed to detect and respond to cyber threats in real time.
The system will be built around machine learning models trained on a dataset containing historical
and simulated cybersecurity incidents. These models will utilize supervised learning for known
attack patterns and unsupervised learning for identifying novel threats.
The prototype system will be tested in a lab-based controlled environment. A simulated network
environment will be created to replicate real-world digital infrastructures, incorporating a variety
of attack scenarios, including DDoS attacks, malware infections, and phishing attempts. This will
allow for an in-depth analysis of how the AI system responds to different types of cyber threats.
The evaluation of the AI-based cybersecurity system will be based on several key performance
indicators (KPIs), including:
Detection Accuracy: The system’s ability to correctly identify threats (true positives)
while minimizing false positives (incorrectly identified threats).
Response Time: The time taken for the system to respond to a detected threat and
activate countermeasures.
Scalability: The system's capacity to handle increasing amounts of network traffic and
evolving attack methods.
Adaptability: The ability of the AI system to learn from new data and adjust to emerging
threats.
These criteria are essential to assessing the effectiveness and potential real-world application of
the proposed system.
Data collection is a critical component of this research, as it will provide the foundation for
training and evaluating the AI-driven cybersecurity system. The data will be sourced from a
variety of public and simulated cybersecurity datasets, as well as real-time attack simulations, to
ensure a comprehensive and diverse representation of cyber threats.
3.3.1 Cybersecurity Datasets
Public datasets related to cybersecurity incidents, such as intrusion detection system (IDS) logs
and network traffic data, will be used to train and validate the machine learning models. These
datasets will provide historical data on known cyberattacks, including both benign and malicious
activities.
KDD Cup 1999: A widely used dataset for intrusion detection research, containing
labeled examples of normal and malicious network traffic.
CICIDS: A collection of datasets generated from simulated network traffic and real-
world cyberattack scenarios, offering a rich source of diverse attack types.
NSL-KDD: A refined version of the KDD Cup 1999 dataset with fewer redundant
records and better coverage of network-based attacks.
In addition to using public datasets, the study will also generate simulated attack scenarios to test
the adaptability of the AI system. Various cyberattack types will be simulated, including:
These simulations will be carried out in a controlled lab environment to test how well the AI
system detects, classifies, and responds to novel or previously unseen threats.
Once the system has been developed and tested in the simulated environment, real-time data will
be collected from network traffic generated during live tests. This data will be used to assess the
AI model's real-time detection capabilities, as well as its ability to adapt to new attack patterns and
network behaviors.
The system design and architecture section provides a detailed overview of the structure and
components of the AI-driven cybersecurity solution being developed. This includes the integration
of machine learning algorithms, data preprocessing, and the architecture required for real-time
threat detection and response.
The proposed AI-driven cybersecurity system follows a modular architecture that enables the
seamless integration of various components to perform real-time threat detection. The key
components include:
1. Data Collection Module: Collects and processes data from network traffic, logs, and
simulated attack scenarios.
2. Data Preprocessing and Feature Extraction: This module cleans the data and extracts
relevant features necessary for the machine learning algorithms to make predictions.
Techniques like normalization, categorization, and feature selection will be used.
3. Machine Learning Module: Implements machine learning models such as decision trees,
random forests, and neural networks to classify network behaviors and detect anomalies.
This module is responsible for real-time detection and alerting.
4. Response Module: After identifying a threat, the system generates real-time alerts and
initiates predefined actions such as blocking suspicious IP addresses, isolating affected
network segments, or notifying system administrators.
5. User Interface (UI): Provides a dashboard for cybersecurity personnel to monitor threats,
view system performance, and interact with the system.
To ensure the system is robust and capable of handling different types of attacks, the following
machine learning algorithms will be used:
Decision Trees: Used for classification tasks, such as determining whether network
traffic is benign or malicious based on various features.
Random Forests: An ensemble method that will help improve the accuracy of
predictions by aggregating results from multiple decision trees.
Neural Networks: Deep learning models that are ideal for detecting complex patterns in
large datasets, particularly useful for identifying sophisticated attack types.
The system will be designed to process data in real time, making it capable of detecting and
responding to threats as they occur. The architecture will incorporate:
Real-Time Monitoring: Continuous surveillance of network activity, looking for
anomalies or deviations from normal behavior.
Automated Response Actions: Once a potential threat is detected, the system will
automatically initiate actions, such as isolating affected systems, blocking malicious IP
addresses, or triggering alerts to network administrators.
Scalability: The architecture will be designed to scale, handling larger datasets and more
complex network environments as the system grows.
The evaluation and testing phase is crucial to ensure the effectiveness and reliability of the
proposed system. This section outlines the approach for evaluating the AI-driven cybersecurity
system, including performance metrics, testing procedures, and tools used for validation.
To assess the effectiveness of the system, several key performance metrics will be considered:
Accuracy: Measures how well the system correctly identifies threats compared to actual
incidents.
Precision: The proportion of true positive alerts generated by the system, minimizing
false positives.
Recall: The system's ability to detect actual threats, ensuring that minimal attacks go
undetected.
F1-Score: A balanced measure that combines precision and recall to evaluate overall
system performance.
Real-time Response Time: The time taken by the system to detect and respond to a
threat after it occurs, highlighting the system's efficiency.
Unit Testing: Each component of the system (such as the machine learning models,
detection algorithms, and data processing pipelines) will be tested independently to
ensure functionality.
Integration Testing: This phase tests the interaction between different components of the
system, ensuring that they work seamlessly together.
System Testing: A complete end-to-end test of the system will be conducted, focusing on
performance, scalability, and security. This phase will ensure that the system works
effectively under simulated real-world attack scenarios.
Real-World Simulations: The system will be subjected to simulated cyberattacks based
on known attack patterns to test its responsiveness and ability to detect emerging threats.
Various tools and frameworks will be employed during the evaluation and testing phase to ensure
accurate and comprehensive results:
Scikit-learn: For model evaluation, providing essential metrics like accuracy, precision,
recall, and F1-score.
Kali Linux: To simulate cyberattacks and assess the system's ability to handle real-world
threats.
TensorFlow/Keras: For evaluating the performance of machine learning models,
especially in terms of computational efficiency and real-time processing.
Jupyter Notebooks: For testing and visualizing model performance during the
development and evaluation stages.
Based on the evaluation results, adjustments will be made to improve the system's performance.
This includes fine-tuning machine learning models, adjusting detection thresholds, and refining
the system's ability to respond to new types of threats.
4. REFERENCES
[2] A. R. Brown and B. Johnson, "Machine Learning for Threat Detection in Cybersecurity,"
Proceedings of the International Conference on Cybersecurity, pp. 23-34, 2022.
[3] "Artificial Intelligence and Cyber Threats," Cybersecurity Today, [Online]. Available:
https://www.cybersecuritytoday.com/ai-threats. [Accessed: Jan. 3, 2025].
[5] "Kenya's Digital Infrastructure Under Threat: A Look at Anonymous Sudan's Thwarted
Cyberattack Attempt and Its Implications for Kenya's Digital Systems," CIPIT, [Online].
Available: https://cipit.org/kenyas-digital-infrastructure-under-threat-a-look-at-anonymous-
sudans-thwarted-cyberattack-attempt-and-its-implications-for-kenyas-digital-systems/. [Accessed:
Jan. 4, 2025].
[7] T. J. Patel, "Advancements in Machine Learning Algorithms for Cyber Threat Detection,"
Journal of Cyber Defense, vol. 12, no. 3, pp. 200-215, 2022.
[8] "The Role of AI in Modern Cybersecurity," TechCrunch, [Online]. Available:
https://www.techcrunch.com/ai-cybersecurity-role. [Accessed: Jan. 3, 2025].
[9] K. L. Williams and M. D. Clark, "Leveraging AI for Real-Time Threat Mitigation in Digital
Systems," Proceedings of the IEEE International Conference on Artificial Intelligence and
Security, pp. 50-59, 2021.