Intelligent Machine Learning Approaches for Data-Driven Cybersecurity and Advanced Protection
Keywords:
Machine Learning, Cybersecurity, Intrusion Detection, Anomaly Detection, RanAbstract
his paper examines the usage of cutting-edge machine learning (ML) techniques for enhancing data-centric cybersecurity, with a focus on detection, classification, and anomaly identification in different attack scenarios. In three case studies—IoT intrusion detection via convolutional neural networks (CNNs), ransomware detection with random forest classifiers, and unsupervised anomaly detection via the CAMLPAD framework—the work demonstrates how domain-specific ML models can address specialized threat environments. The CNN-based IoT intrusion model achieved 99.2% accuracy, 98.8% precision, and 99.0% F1-score across the UNSW-NB15 dataset, significantly better than the traditional statistical baselines. The random forest ransomware detection system achieved 98.5% accuracy, 97.9% recall, and area under the ROC curve (AUC) 0.995, showing robustness in distinguishing malicious and legitimate encryption activity. CAMLPAD identified 94.7% of anomalies with less than a 3% false positive rate and successfully identified zero-day attacks in real time without any labelled training data. . Comparative analysis reveals that supervised methods excel in well-characterised environments, while unsupervised models are indispensable for novel threat discovery. The study also addresses model explainability, adversarial robustness, and mitigation of human error, recommending an adaptive, multi-layered, and interpretable ML-driven cybersecurity architecture that combines continuous retraining, adversarial hardening, and human oversight to sustain high-performance cyber defence.
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- Michael Oladipo Akinsanya, Oluwafemi Clement Adeusi, Kazeem Bamidele Ajanaku, A Detailed Review of Contemporary Cyber/Network Security Approaches and Emerging Challenges , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Michael Oladipo Akinsanya, Aminath Bolaji Bello, Oluwafemi Clement Adeusi, A Comprehensive Review of Edge Computing Approaches for Secure and Efficient Data Processing in IoT Networks , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
Similar Articles
- John Dedah, Olumuyiwa Oyekunle Akintola, Abubakar Habib Idris, Hannatu Akanang, Warji Muhammad Ibrahim, Muhammad Mukhtar, Yasser Sabo Takko, Jamila Ibrahim shelarau, Buhari Labaran, gada Emmanuel Obotu, Dahiru Muhammed, Hafsat Abubakar Garba, Optimised Extraction and Comprehensive Chromatographic-Spectral Analysis of Anthocyanins from Hibiscus sabdariffa Calyces , Communication In Physical Sciences: Vol. 13 No. 2 (2026): VOLUME 13 ISSUE 2
- Franca Amaka Nwafor, Augustine Friday Osondu Ador, Stress Concentration at a Sharp Corner of an Elastic Strip under Anti-Plane Strain , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
- Bright Adinchezo Adimoha , James Nwawuike Nnadi, Bright Okore Osu, Franca Amaka Nwafor, A Mixed Boundary Value Problem for a Finite Isotropic Wedge Under Antiplane Deformation , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
You may also start an advanced similarity search for this article.



