Predicting and Mitigating Cyber Threats through Data Mining and Machine Learning

Abstract

Identifying and preventing botnet attacks has become increasingly difficult due to the explosive growth of IoT devices. This research suggests a useful method for detecting IoT botnet attacks that uses a Random Forest classifier to examine network traffic data and spot suspicious activity. EDA is used to analyze the dataset's structure, identify missing values, and evaluate the distribution of classes. Categorical features are encoded with labels to make them compatible with machine learning algorithms. A Random Forest classifier is selected to its capacity to effectively handle skewed distributions and dimensional data, taking into account the dataset's intrinsic class imbalance. Using the classifier's integrated ranking mechanism, feature importance analysis is carried out, choosing only the most pertinent features to improve mode ln performance. The data is then classified into training and testing sets, with the most important features being used to train the model. Accuracy, classification reports, and F1-score are used to assess the system, showing that the Random Forest classifier accurately and efficiently detects IoT botnet attacks. This study emphasizes how important feature selection, data pretreatment, and machine learning models are to bolstering IoT network cybersecurity defenses.

Country : India

1 M. Mutharasu2 G. Indu3 Y. Ankitha

  1. Asst. Professor, Department of C.S.E. (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P., India
  2. UG Scholar, Department of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P., India
  3. UG Scholar, Department of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P., India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 185-191

doi.org/10.47001/IRJIET/2025.INSPIRE31

References

  1. Z. Almahmoud, P. D. Yoo, E. Damiani, K.-K. R. Choo, and C. Y. Yeun, "Forecasting Cyber Threats and Pertinent Mitigation Technologies," Technological Forecasting & Social Change, vol. 210, pp. 123836, 2025.
  2. N. Samia, S. Saha, and A. Haque, "Predicting and Mitigating Cyber Threats Through Data Mining and Machine Learning," Computer Communications, vol. 228, pp. 107949, 2024.
  3. V. S. S. R. Nallapa Reddy, "Cybersecurity Threat Prediction Using Machine Learning," International Journal of Science and Research (IJSR), vol. 12, issue 4, April 2023.
  4. G. Mumtaz, S. Akram, M. W. Iqbal, M. U. Ashraf, K. A. Almarhabi, A. M. Alghamdi, and A. A. Bahaddad, "Classification and Prediction of Significant Cyber Incidents (SCI) Using Data Mining and Machine Learning (DM-ML)," IEEE Access, vol. 11, 2023. DOI: 10.1109/ACCESS.2023.3249663.
  5. S. Gupta, A. S. Sabitha, and R. Punhani, "Cyber Security Threat Intelligence Using Data Mining Techniques and Artificial Intelligence," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, issue 3, Sept. 2019. DOI: 10.35940/ijrte.C5675.098319.
  6. S. S. V. Raja, A. B., A. M., and G. S.,"Prediction of Cyber Attacks Using Machine Learning Technique," International Journal of Creative Research Thoughts (IJCRT), vol. 10, issue 6, June 2022. ISSN: 2320-2882.
  7. B. H. Reddy, T. Snehitha, G. L. L. Priya, and M. S. L., "The Power of Data: Machine Learning in Cyber Attack Classification," International Journal of Novel Research and Development (IJNRD), vol. 9, issue 4, April 2024. ISSN: 2456-4184.
  8. S. Subashini, K. Rishvana, and A. Shruthi, "A Dynamic Intelligence Mining of Cyber Threats in Public Online Access," International Journal of Novel Research and Development (IJNRD), vol. 9, issue 5, May 2024. ISSN: 2456-4184.
  9. D. Srinivas, R. Jegadeesan, V. Vishalakshi, A. Tabassum, P. Pujitha, and B. Manikanta, "Detection of Cyber Attacks Using Machine Learning," International Journal of Novel Research and Development (IJNRD), vol. 9, issue 5, May 2024. ISSN: 2456-4184.
  10. C. Khavale, S. Jaiswar, M. Mhatre, and N. Chakrawarti, "Data Mining and Machine Learning for Cyber Security," International Research Journal of Engineering and Technology (IRJET), vol. 7, issue 3, March 2020. ISSN: 2395-0056.
  11. C. Pathade and T. Bhosale, “Cyber Threats Prediction Using Machine Learning,” International Research Journal of Engineering and Technology (IRJET), vol. 8, issue 12, pp. 1250–1253, Dec. 2021. DOI: 10.2395/IRJET-V8I12210.
  12. S. Paikrao, S. S. Manan, H. Jagtap, S. Anumalla, and M. A. Devmane, “Cyber Threat Prediction Using ML,” International Research Journal of Engineering and Technology (IRJET), vol. 9, issue 11.
  13. A.S.M. Ajitha, A. B. Lohitha Sai, M. Meena, and S. K. Saranya, “Cyber Attack Prediction Using Machine Learning Algorithm,” International Research Journal of Engineering and Technology (IRJET), vol. 10, issue 4, pp. 2256–2258, Apr. 2024.
  14. P. K. Prajapat, “Predicting and Mitigating the Impact of Cybersecurity Threats Using Machine Learning,” Journal of Computer Engineering and Technology (JCET), vol. 5, issue 1, pp. 42–51, 2022.
  15. Z. Hasan, H. R. Mohammad, and M. Jishkariani, “Machine Learning and Data Mining Methods for Cyber Security: A Survey,” Mesopotamian Journal of Cybersecurity, vol. 2022.
  16. Ahmad, I., Basheri, M., Iqbal, M. J., & Anwar, S. (2018). Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection. IEEE Access, 6, 33789-33795.
  17. Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
  18. Chandrasekaran, M., Inshath, A., & Sharma, R. (2021). Predicting Cyber Attacks Using Machine Learning Models. International Journal of Computer Applications, 183(33), 45-52.
  19. Chio, C., & Freeman, D. (2018). Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly Media.
  20. Gharib, H., & Rahman, M. M. (2020). Threat Intelligence Using Machine Learning for Cyber Security Applications. Journal of Cyber Security Technology, 4(3), 1-14.
  21. Kwon, D., & Kim, H. (2022). Machine Learning-Based Cyber Threat Intelligence: A Review and Future Directions. Future Generation Computer Systems, 131, 53-68.
  22. Mohammadi, A., & Safavi, R. (2021). Cyber Threat Prediction Using Neural Networks. IEEE Transactions on Information Forensics and Security, 16, 1123-1134.
  23. Nguyen, T., & Reddi, V. J. (2019). A Deep Learning Approach for Detecting Cyber Threats. Proceedings of the IEEE, 107(8), 1445-1458.
  24. Zhang, Y., & Wang, J. (2022). Predicting ang Mitigating Cyber Threats with Machine Learning Algorithms. Computers & Security, 115, 102623.