×
Home Current Archive Editorial board
Instructions for papers
For Authors Aim & Scope Contact
Review paper

EVALUATING THE EFFECTIVENESS OF PREDICTION TECHNIQUES FOR CYBERATTACKS: A COMPREHESIVE TAXONOMY

By
Azhar F. Al-zubidi Orcid logo ,
Azhar F. Al-zubidi

AL Nahrain University , Baghdad , Iraq

University of Technology , Baghdad , Iraq

Alaa Kadhim Farhan Orcid logo ,
Alaa Kadhim Farhan

University of Technology , Baghdad , Iraq

Abeer Alsadoon Orcid logo
Abeer Alsadoon

Charles Sturt University , Bathurst , Australia

Abstract

The rising threat of cyberattacks in today's society emphasizes the urgent need for improved methods to both detect and prevent these incidents. This paper focuses on assessing the effectiveness of various techniques for predicting cyberattacks. The DTCF taxonomy was proposed for predicting these attacks, considering datasets, techniques, challenges, and future trends. This taxonomy includes four key stages. 1) data preprocessing, 2) feature selection, 3) development of prediction models, and 4) their subsequent validation and assessment. Our research reviews progress algorithms for each stage, analyzing their advantages and weaknesses. Consequently, the results of this study emphasize the critical role of precise detection and prediction in combating the increasingly complex threat of multiple cyberattacks, which are inherently more challenging to identify and predict than isolated incidents. Our examination of diverse learning methods reveals the essential role of data preprocessing in enhancing the efficacy of prediction systems. Effective preprocessing aids in reducing issues like noise, outliers, missing data, and extraneous features and, by doing so, refining the accuracy of predictions.

References

1.
Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study. Applied Artificial Intelligence. 2022 Dec 31;36(1):2055399.
2.
Asl M, Naderi H. Filter Spamming in Computer Networks by Text Mining and Machine Learning Method. International Academic Journal of Science and Engineering. 2016;3(2):146–60.
3.
Hussain Ali Y, Sabu Chooralil V, Balasubramanian K, Manyam RR, Kidambi Raju S, T. Sadiq A, et al. Optimization system based on convolutional neural network and internet of medical things for early diagnosis of lung cancerMar 2;10. Bioengineering. 2023 Mar 2;10(3):320.
4.
Leema AA, Balakrishnan P, Jothiaruna N. Harnessing the Power of Web Scraping and Machine Learning to Uncover Customer Empathy from Online Reviews. Indian Journal of Information Sources and Services. 2024;14(3):52–63.
5.
Dixit P, Kohli R, Acevedo-Duque A, Gonzalez-Diaz RR, Jhaveri RH. Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection. Security and Communication Networks. 2021;2021(1):5561816.

Citation

This is an open access article distributed under the  Creative Commons Attribution Non-Commercial License (CC BY-NC) License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 

Article metrics

Google scholar: See link

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.