Intelligent Machine Learning Approaches for Data-Driven Cybersecurity and Advanced Protection
Keywords:
Machine Learning, Cybersecurity, Intrusion Detection, Anomaly Detection, RanAbstract
his paper examines the usage of cutting-edge machine learning (ML) techniques for enhancing data-centric cybersecurity, with a focus on detection, classification, and anomaly identification in different attack scenarios. In three case studies—IoT intrusion detection via convolutional neural networks (CNNs), ransomware detection with random forest classifiers, and unsupervised anomaly detection via the CAMLPAD framework—the work demonstrates how domain-specific ML models can address specialized threat environments. The CNN-based IoT intrusion model achieved 99.2% accuracy, 98.8% precision, and 99.0% F1-score across the UNSW-NB15 dataset, significantly better than the traditional statistical baselines. The random forest ransomware detection system achieved 98.5% accuracy, 97.9% recall, and area under the ROC curve (AUC) 0.995, showing robustness in distinguishing malicious and legitimate encryption activity. CAMLPAD identified 94.7% of anomalies with less than a 3% false positive rate and successfully identified zero-day attacks in real time without any labelled training data. . Comparative analysis reveals that supervised methods excel in well-characterised environments, while unsupervised models are indispensable for novel threat discovery. The study also addresses model explainability, adversarial robustness, and mitigation of human error, recommending an adaptive, multi-layered, and interpretable ML-driven cybersecurity architecture that combines continuous retraining, adversarial hardening, and human oversight to sustain high-performance cyber defence.
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- Michael Oladipo Akinsanya, Oluwafemi Clement Adeusi, Kazeem Bamidele Ajanaku, A Detailed Review of Contemporary Cyber/Network Security Approaches and Emerging Challenges , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Michael Oladipo Akinsanya, Aminath Bolaji Bello, Oluwafemi Clement Adeusi, A Comprehensive Review of Edge Computing Approaches for Secure and Efficient Data Processing in IoT Networks , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
Similar Articles
- Joy Nnenna Okolo, A Systematic Analysis of Artificial Intelligence and Data Science Integration for Proactive Cyber Defense: Exploring Methods, Implementation Obstacles, Emerging Innovations, and Future Security Prospects , Communication In Physical Sciences: Vol. 7 No. 4 (2021): VOLUME 7 ISSUE 4
- Dahunsi Samuel Adeyemi., Enhancing Cloud Security Using Predictive AI Analysis: A Systematic Review of Literature , Communication In Physical Sciences: Vol. 12 No. 8 (2025): VOLUME 12 ISSUE 8
- Humphrey Sam Samuel, Emmanuel Edet Etim, John Paul Shinggu, Bulus. Bako , Machine learning of Rotational spectra analysis in interstellar medium , Communication In Physical Sciences: Vol. 10 No. 1 (2023): VOLUME 10 ISSUE 1
- Edith Agberxonu, Abdulateef Disu, Chidin Dike, Toyosi Mustapha, Lawrence Abakah, Machine Learning and Artificial Intelligence in FinTech: Driving Innovation in Digital Payments, Fraud Detection, and Financial Inclusion , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- David Adetunji Ademilua, Edoise Areghan, AI-Driven Cloud Security Frameworks: Techniques, Challenges, and Lessons from Case Studies , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Fatima Binta Adamu, Muhammad Bashir Abdullahi, Sulaimon Adebayo Bashir, Abiodun Musa Aibinu, Conceptual Design Of A Hybrid Deep Learning Model For Classification Of Cervical Cancer Acetic Acid Images , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- Mujeeb Abdulrazaq, Rare-Event Prediction in Imbalanced Data: A Unified Evaluation and Optimization Framework for High-Risk Systems , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Michael Oladipo Akinsanya, Aminath Bolaji Bello, Oluwafemi Clement Adeusi, A Comprehensive Review of Edge Computing Approaches for Secure and Efficient Data Processing in IoT Networks , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Edoise Areghan, From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- David Adetunji Ademilua, Cloud Security in the Era of Big Data and IoT: A Review of Emerging Risks and Protective Technologies , Communication In Physical Sciences: Vol. 7 No. 4 (2021): VOLUME 7 ISSUE 4
You may also start an advanced similarity search for this article.



