Published on: April 2026
AI-BASED WEB SECURITY SYSTEM FOR DETECTING CYBER ATTACKS
Sumit Ghosh Roy
Article Status
Available Documents
Abstract
The rapid expansion of web technologies has increased the risk of cyber attacks targeting web applications. Traditional rule based security mechanisms struggle to identify evolving threats such as SQL injection, cross site scripting, and distributed denial of service attacks. Artificial Intelligence (AI) and Machine Learning (ML) offer the ability to learn patterns from network traffic and identify malicious activity. This paper proposes an AI based web security system designed to monitor web traffic, analyze behavior, and detect cyber attacks in real time. The system integrates data preprocessing, feature extraction, and a deep learning classification model to distinguish between normal and malicious traffic. Experiments performed using a benchmark intrusion detection dataset demonstrate that AI driven detection methods significantly improve accuracy and adaptability compared to traditional approaches. The results indicate that intelligent security frameworks can enhance web application protection and reduce response time against cyber threats.
How to Cite this Paper
Roy, S. G. (2026). AI-Based Web Security System for Detecting Cyber Attacks. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.396
Roy, Sumit. "AI-Based Web Security System for Detecting Cyber Attacks." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.396.
Roy, Sumit. "AI-Based Web Security System for Detecting Cyber Attacks." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.396.
References
[1] T. Sowmya, "Artificial Intelligence Based Intrusion Detection Systems," Journal of Cyber Security Research.[2] M. Mijuskovic, "Deep Learning Approaches for Network Intrusion Detection," International Journal of Information Security.
[3] S. Bhuyan, "Machine Learning in Cybersecurity: A Survey," IEEE Access.
[4] CICIDS2017 Dataset – Canadian Institute for Cybersecurity.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 17 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

