IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Case Study on Cyber Attack Detection Using Machine Learning: IDS for Detecting Cyber Attacks Using Machine Learning

A Case Study on Cyber Attack Detection Using Machine Learning: IDS for Detecting Cyber Attacks Using Machine Learning
View Sample PDF
Author(s): S. Indra Priyadharshini (Vellore Institute of Technology, Chennai, India), T. V. Padmavathy (Vellore Institute of Technology, Chennai, India)and D. Shiny Irene (SRM Institute of Science and Technology, India)
Copyright: 2025
Pages: 18
Source title: Cryptography, Biometrics, and Anonymity in Cybersecurity Management
Source Author(s)/Editor(s): Mohammed Amin Almaiah (Department of Computer Science, The University of Jordan, Jordan)and Said Salloum (School of Science, Engineering, and Environment, University of Salford, UK)
DOI: 10.4018/979-8-3693-8014-7.ch007

Purchase


Abstract

This chapter focusses on leveraging machine learning (ML) for cyber-attack prevention, addressing a range of threats and assaults. Machine learning is a crucial component of modern cybersecurity, offering a flexible approach to defend information systems against the constantly evolving tactics of malicious actors. By training both supervised and unsupervised ML algorithms on diverse datasets, we tackle issues such as hostile assaults and class imbalance. A key aspect of our work is prioritizing the interpretability of ML models to effectively manage and reduce false positives and false negatives. Additionally, we explore the challenges of integrating ML findings with existing cybersecurity frameworks, aiming for seamless collaboration between traditional security measures and ML-driven solutions. Our goal is to provide valuable insights on utilizing ML to prevent cyberattacks, highlighting its benefits, limitations, and future potential. Ultimately, we aim to enhance cybersecurity defenses in dynamic threat landscapes by clarifying the role of ML in cybersecurity.

Related Content

Qais Al-Na'amneh, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Mahmoud Aljawarneh, Braa Qadoumi, Shahid Munir Shah. © 2025. 28 pages.
K. G. Anilkumar, D. Muhammad Noorul Mubarak. © 2025. 12 pages.
Tuqa Al-Makkawi, Ayoub Alsarhan, Qais Al-Na'amneh, Mohammad Aljaidi, Mohammed Amin Almaiah, Mahmoud AlJamal, Rabee Alqura'n, Mahmoud Aljawarneh. © 2025. 20 pages.
Qais Al-Na'amneh, Walid Dhifallah, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Braa Qadoumi, Ayoub Alsarhan. © 2025. 16 pages.
Brijesh Yadav, Vishal Jain. © 2025. 36 pages.
Malak Al-Majali, Mohammad Aljaidi, Qais Al-Naamneh, Ghassan Samara, Ayoub Alsarhan, Braa Qadoumi. © 2025. 14 pages.
S. Indra Priyadharshini, T. V. Padmavathy, D. Shiny Irene. © 2025. 18 pages.
Body Bottom