International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
Conferences Published ↓
IC-AIRCM-T3-2026
SPHERE-2025
AIMAR-2025
SVGASCA-2025
ICCE-2025
Chinai-2023
PIPRDA-2023
ICMRS'23
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 8 Issue 2
March-April 2026
Indexing Partners
Leveraging Artificial Intelligence (AI) and Machine Learning (ML) techniques to detect Cyber Attacks: A Comparative Study
| Author(s) | Dr. Md Nurul Islam, Prof. Dr. S M K Quadri |
|---|---|
| Country | India |
| Abstract | The increasing sophistication and complexity of cyberattacks have heightened their frequency, thereby amplifying the need for robust and effective mechanisms for detecting these threats. The study reviews the state-of-the-art of machine learning and artificial intelligence techniques for detecting cyber intrusions across the organizational networks and cloud environments. In this article we have explored supervised, unsupervised, and hybrid models of machine learning techniques. The technique used in this study includes classical algorithms such as Support Vector Machine (SVM), Random Forest, K-Nearest Neighbors (KNN), Gradient Boosting Machines (GBM), and Convolutional Neural Networks (CNNs) for malware/intrusion detection. And for anomaly detection we have used Recurrent Neural Networks (RNNs). The overall output is analyzed on the basis of the performance measured by the different algorithms over the recently available dataset on kaggle.com. The assessment criteria are based on the accuracy, precision, and recall analysis; F1 score evaluation; and confusion matrix generation, etc. of these algorithms. Hybrid and federated techniques have been used to improve the resilience to the most devastating attacks, often with success for attackers, i.e., zero-day attacks. The finding of this study provides cybersecurity teams valuable insight to take prompt decisions for the suitability of such ML and AI approaches for cyberattacks detection. It entails the cybersecurity professional and researchers making informed decisions to strengthen the organization’s security posture by designing and deploying effective defense mechanisms. |
| Keywords | Cybersecurity; Cyber-attack; Machine Learning (ML); Cyber threat; Anomaly detection |
| Field | Computer Applications |
| Published In | Volume 7, Issue 5, September-October 2025 |
| Published On | 2025-10-25 |
| DOI | https://doi.org/10.36948/ijfmr.2025.v07i05.58758 |
Share this

E-ISSN 2582-2160
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
Powered by Sky Research Publication and Journals