×
Home Current Archive Editorial board
News Contact
Review paper

EVALUATING THE EFFECTIVENESS OF PREDICTION TECHNIQUES FOR CYBERATTACKS: A COMPREHESIVE TAXONOMY

By
Azhar F. Al-zubidi Orcid logo ,
Azhar F. Al-zubidi

AL Nahrain University , Baghdad , Iraq

University of Technology , Baghdad , Iraq

Alaa Kadhim Farhan Orcid logo ,
Alaa Kadhim Farhan

University of Technology , Baghdad , Iraq

Abeer Alsadoon Orcid logo
Abeer Alsadoon

Charles Sturt University , Bathurst , Australia

Abstract

The rising threat of cyberattacks in today's society emphasizes the urgent need for improved methods to both detect and prevent these incidents. This paper focuses on assessing the effectiveness of various techniques for predicting cyberattacks. The DTCF taxonomy was proposed for predicting these attacks, considering datasets, techniques, challenges, and future trends. This taxonomy includes four key stages. 1) data preprocessing, 2) feature selection, 3) development of prediction models, and 4) their subsequent validation and assessment. Our research reviews progress algorithms for each stage, analyzing their advantages and weaknesses. Consequently, the results of this study emphasize the critical role of precise detection and prediction in combating the increasingly complex threat of multiple cyberattacks, which are inherently more challenging to identify and predict than isolated incidents. Our examination of diverse learning methods reveals the essential role of data preprocessing in enhancing the efficacy of prediction systems. Effective preprocessing aids in reducing issues like noise, outliers, missing data, and extraneous features and, by doing so, refining the accuracy of predictions.

References

1.
Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study. Applied Artificial Intelligence. 2022;Dec 31;36(1):2055399.
2.
Asl M, Naderi H. Filter Spamming in Computer Networks by Text Mining and Machine Learning Method. International Academic Journal of Science and Engineering. 2016;3(2):146–60.
3.
Hussain Ali Y, Sabu Chooralil V, Balasubramanian K, Manyam RR, Kidambi Raju S, T. Sadiq A, et al. Optimization system based on convolutional neural network and internet of medical things for early diagnosis of lung cancerMar 2;10. Bioengineering. 2023;Mar 2;10(3):320.
4.
Leema AA, Balakrishnan P, Jothiaruna N. Harnessing the Power of Web Scraping and Machine Learning to Uncover Customer Empathy from Online Reviews. Indian Journal of Information Sources and Services. 2024;14(3):52–63.
5.
Dixit P, Kohli R, Acevedo-Duque A, Gonzalez-Diaz RR, Jhaveri RH. Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection. Security and Communication Networks. 2021;2021(1):5561816.
6.
Bamal S, Singh L. Detecting Conjunctival Hyperemia Using an Effective Machine Learning based Method. Journal of Internet Services and Information Security. 2024;14(4):499–510.
7.
Ahsan M, Nygard KE, Gomes R, Chowdhury MM, Rifat N, Connolly JF. Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review. Journal of Cybersecurity and Privacy. 2022 Jul 10;2(3):527–55.
8.
Dasari, D. R., Bindu G. H. Feature Selection Model-based Intrusion Detection System for Cyberattacks on the Internet of Vehicles Using Cat and Mouse Optimizer. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2022;15(2):251–69.
9.
Prabhakaran V, Kulandasamy A. Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection. Neural Computing and Applications. 2021;Nov 33;(21):14459–79.
10.
Ramprasath J, Ramya P, Rathnapriya T. Malicious attack detection in software defined networking using machine learning approach. International Journal of Advances in Engineering and Emerging Technology. Jul 31;11(1):22–7.
11.
Al-zubidi AF, Farhan AK, Towfek SM. Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model. Journal of Intelligent Systems. 2024;Apr 23;33(1):20230195.
12.
Alnumay WS. Use of machine learning for the detection, identification, and mitigation of cyber-attacks. International Journal of Communication and Computer Technologies. 2024;2024;(1):38–44.
13.
Maseer ZK, Yusof R, Bahaman N, Mostafa SA, Foozy CF. Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE access. 2021;Feb 3;(9):22351–70.
14.
Kumar P. Toward design of an intelligent cyberattack detection system using hybrid feature reduced approach for iot networks. Arab J Sci Eng. 2021;46:3749–78.
15.
Wu P, Guo H. LuNET: a deep neural network for network intrusion detection. IEEE symposium series on computational intelligence (SSCI). 2019 Dec 6:(pp. 617-624).IEEE.
16.
Nagarajan SM, Deverajan GG, Bashir AK, Mahapatra RP, Al-Numay MS. IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems. Computer Communications. 2022;Apr 15;188: 81-9.
17.
Lv L, Wang W, Zhang Z, Liu X. A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-Based Systems. 2020;May 11;195:105648.
18.
Tufan E, Tezcan C, Acarturk C. Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network. IEEE Access. 2021;Mar 26;9:50078–92.
19.
Disha RA, Waheed S. Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Cybersecurity. 2022;Jan 4;5(1):1.
20.
Shahzad F, Mannan A, Javed AR, Almadhor AS, Baker T, Al-Jumeily OBE D. Cloud-based multiclass anomaly detection and categorization using ensemble learning. Journal of Cloud Computing. 2022;Nov 3;11(1):74.
21.
Mouti S, Shukla SK, Althubiti SA, Ahmed MA, Alenezi F, Arumugam M. Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks. Computers and Electrical Engineering. 2022;Oct 1;103:108308.
22.
Nayak J, Meher SK, Souri A, Naik B, Vimal S. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. The Journal of Supercomputing. 2022;Sep;78(13):14866–91.
23.
Ur Rehman S, Khaliq M, Imtiaz SI, Rasool A, Shafiq M, Javed AR, et al. DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU). Future Generation Computer Systems. 2021;May 1;118:453–66.
24.
Ahmad Z, Shahid Khan A, Nisar K, Haider I, Hassan R, Haque MR, et al. Anomaly Detection Using Deep Neural Network for IoT Architecture. Applied Sciences. 2021;Jul 30;11(15):7050.
25.
Mahdavifar S, Ghorbani AA. DeNNeS: deep embedded neural network expert system for detecting cyber attacks. Neural Computing and Applications. 2020;Sep;32(18):14753–80.
26.
Alshingiti Z, Alaqel R, Al-Muhtadi J, Haq QEU, Saleem K, Faheem MH. A Deep Learning-Based Phishing Detection System Using CNN, LSTM, and LSTM-CNN. Electronics. 2023;Jan 3;12(1):232.
27.
Al-Abassi A, Karimipour H, Dehghantanha A, Parizi R. An ensemble deep learning-based cyber-attack detection in industrial control system. Ieee Access. 2020;May 4;8:83965–73.
28.
Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo K, Parizi RM. An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet of Things Journal. 2020;May 21;7(9):8852–9.
29.
Dutta V, Choraś M, Pawlicki M, Kozik R. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Sensors. 2020;Aug 15;20(16):4583.
30.
Aljabri M, Aljameel SS, Mohammad RM, Almotiri SH, Mirza S, Anis FM, et al. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors. 2021;Oct 25;21(21):7070.
31.
Yan T, Zhou T, Zhan YZhan Y, Xia Y. TFDPM: Attack detection for cyber–physical systems with diffusion probabilistic models. Knowledge-Based Systems. 2022;Nov 14;255:109743.
32.
Al-Juboori SA, Hazzaa F, Jabbar ZS, Salih S, Gheni HM. Man-in-the-middle and denial of service attacks detection using machine learning algorithms. Bulletin of Electrical Engineering and Informatics. 2023;Feb 1;12(1):418–26.
33.
Sangodoyin AO, Akinsolu MO, Pillai P, Grout V. Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning. IEEE Access. 2021;Aug 31;9:122495–508.
34.
Alsaedi EM, Farhan AK. RCAE_BFV: Retrieve Encrypted Images using Convolution AutoEncoder and BFV. Iraqi Journal of Computer, Communication, Control and System Engineering. 2022;22(3):48–61.
35.
Mohammed, A. A., Al-Ghrairi, A. H. T., Al-zubidi, A. F., Saeed, H. M. ). Unsupervised classification and analysis of Istanbul-Turkey satellite image utilizing the remote sensing. In AIP Conference Proceedings . AIP Publishing LLC . 2023;(Vol. 2457, No. 1, p. 040007).
36.
Ameen ZH, AL-Bakri NF, Al-zubidi AF, Hashim SH, Jaaz ZA. A New COVID-19 Patient Detection Strategy Based on Hidden Naïve Bayes Classifier. Iraqi Journal of Science. 2024;6705–24.
37.
Saadi ZM, Sadiq AT, Akif OZ, Farhan AK. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords. Electronics. 2024;13(15):3042.
38.
Al-zubidi AF, Farhan AK, El-Kenawy ESM. Surveying Machine Learning in Cyberattack Datasets: A Comprehensive Analysis. Journal of Soft Computing and Computer Applications. 2024;1(1).
39.
Af AZ, Farhan A. Multi-Class Anomaly Detection in Network Intrusion Detection Using Variational Autoencoder. International Journal of Safety & Security Engineering. 2025;(6):15.
40.
Alsaedi E, Farhan A, Falah M, Oleiwi B. Classification of encrypted data using deep learning and Legendre polynomials. 2022;331–45.
41.
Abdalrdha Z, Al-Bakry A, Farhan A. Improving the CNN Model for Arabic Crime Tweet Detection Based on an Intelligent Dictionary. 2023;748–53.
42.
Al-Zubidi A, Farhan. Multi-Class Semi-Supervised Anomaly Detection for Network Intrusion Detection: A Novel Variational Autoencoder Approach. International Journal of Safety & Security Engineering. 2025;(6).
43.
Gupta R, Tanwar S, Tyagi S, Kumar N. Machine Learning Models for Secure Data Analytics: A taxonomy and threat model. Computer Communications. 2020;153:406–40.
44.
Dahiya M, Nitin N, Dahiya D. Intelligent Cyber Security Framework Based on SC-AJSO Feature Selection and HT-RLSTM Attack Detection. Applied Sciences. 2022;12(13):6314.
45.
Sarker IH. CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things. 2021;14:100393.

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.