A review on Machine Learning Approaches for Identifying and Preventing Cyber Attacks
DOI:
https://doi.org/10.69968/ijisem.2026v5i1160-168Keywords:
Machine Learning, Cyber Attack Detection, Intrusion Detection Systems, Deep Learning, CybersecurityAbstract
The dynamic nature of cyber threats has brought in the need to come up with intelligent and adaptive security measures other than the conventional rule-based systems. Machine Learning (ML) has become a ground-breaking method to detect and prevent cyber attacks allowing recognition of patterns, detecting anomalies, and predictive threat analysis with the use of automated machines. The review paper presents an in-depth analysis of ML methods deployed to resolve cybersecurity issues, such as supervised, unsupervised, and deep-learning models, such as Support Vector Machines (SVM), K-Nearest Neighbors (KNN), Artificial Neural Networks (ANN), and ensemble models. The paper examines how they have been used to detect various cyber threats, including DDoS, malware, phishing, ransomware, attacks on IoT, and attacks on the supply chain. In addition, the paper also surveys the latest literature, benchmark datasets, assessment metrics, and comparison of the performance of the current models. The major challenges, such as data imbalance, adversarial manipulation, model bias, privacy concerns, and scalability issues, are also presented. The review identifies the recent progress and specifies the research prospects to enhance more resilient and adaptive cybersecurity infrastructure based on ML.
References
[1] A. Bilen and A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput. Sci., 2021, doi: 10.7717/peerj-cs.475.
[2] M. Asmar and A. Tuqan, “Integrating machine learning for sustaining cybersecurity in digital banks,” Heliyon, vol. 10, no. 17, p. e37571, 2024, doi: 10.1016/j.heliyon.2024.e37571.
[3] E. Ortiz-ruiz, J. R. Bermejo, J. A. Sicilia, and J. Bermejo, “Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia,” Electronics, vol. 13, no. 824, pp. 1–24, 2024.
[4] S. Ankalaki, A. R. Atmakuri, M. Pallavi, G. S. Hukkeri, T. Jan, and G. R. Naik, “Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial Intelligence,” IEEE Access, vol. 13, pp. 44662–44706, 2025, doi: 10.1109/ACCESS.2025.3547433.
[5] E. Kesavan, “Internet of Things (IoT): A Review of Security Challenges and Solutions,” Int. J. Innov. Sci. Eng. Manag., vol. 2, no. 4, 2023, doi: 10.69968/ijisem.2023v2i465-71.
[6] M. K. Hasan, R. A. Abdulkadir, S. Islam, T. R. Gadekallu, and N. Safie, “A review on machine learning techniques for secured cyber-physical systems in smart grid networks,” Energy Reports, vol. 11, pp. 1268–1290, 2024, doi: 10.1016/j.egyr.2023.12.040.
[7] G. Apruzzese, P. LASKOV, EDGARDO MONTES DE OCA, W. MALLOULI, and L. B. RAPA, “The Role of Machine Learning in Cybersecurity,” ACM Digit. Libr., vol. 4, no. 1, 2023, doi: 10.1145/3545574.
[8] S. Pal et al., “Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions,” J. Inf. Secur. Appl., vol. 96, no. 104269, 2026, doi: 10.1016/j.jisa.2025.104269.
[9] M. Ahsan, K. E. Nygard, R. Gomes, M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review,” J. Cybersecurity Priv., vol. 2, pp. 527–555, 2022.
[10] B. O. Calviño, E. Rodriguez, J. J. Costa, and M. Oriol, “Enhancing cybersecurity in railways: Machine learning approaches for attack detection,” Int. J. Crit. Infrastruct. Prot., vol. 50, no. 100788, 2025, doi: 10.1016/j.ijcip.2025.100788.
[11] E. Liu, “Early detection and mitigation of cyber attacks with machine learning and artificial intelligence,” in International Conference on Software Engineering and Machine Learning, 2024, pp. 261–266. doi: 10.54254/2755-2721/73/20240409.
[12] M. Roshanaei, M. R. Khan, and N. N. Sylvester, “Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions,” J. Inf. Secur., vol. 15, no. 03, 2024, doi: 10.4236/jis.2024.153019.
[13] N. Mohamed, “Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms,” Knowl. Inf. Syst., vol. 67, 2025, doi: 10.1007/s10115-025-02429-y.
[14] W. K. Abdullah and I. M. Husien, “Machine learning approaches for cyber attack classification: A review and comparative analysis,” Int. J. Commun. Inf. Technol., vol. 6, no. 2, pp. 172–180, 2025.
[15] S. Raju, “Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats,” Int. J. Comput. Appl., vol. 186, no. 50, pp. 6–12, 2024.
[16] C. Merlano, “Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review,” J. Cyber Secur., 2024, doi: 10.32604/jcs.2024.056164.
[17] A. Alshuaibi, M. Almaayah, and A. Ali, “Machine Learning for Cybersecurity Issues : A systematic Review,” J. Cyber Secur. Risk Audit., vol. 2025, no. 1, pp. 36–46, 2025.
[18] S. Saini and P. A. Kalia, “Detection of Cyber Attacks using Machine Learning,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 11, no. IX, pp. 1777–1785, 2023.
[19] F. Genuario, G. Santoro, M. Giliberti, S. Bello, E. Zazzera, and D. Impedovo, “Machine Learning-Based Methodologies for Cyber-Attacks and Network Traffic Monitoring: A Review and Insights,” Information, vol. 15, no. 741, pp. 1–27, 2024.
[20] R. A. Mustafa and H. S. Chyad, “Subject review: Cyber security using machine learning and deep learning techniques,” Glob. J. Eng. Technol. Adv., vol. 16, no. 2, pp. 212–219, 2023.
[21] O. B. J. Rabie, S. Selvarajan, and T. Hasanin, “A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models,” www.nature.com/scientificreports OPEN, pp. 1–20, 2024.
[22] G. D. Ranjane, V. H. Joshi, and P. L. K. Singhal, “Cyberattack Analysis, Detection and Prevention using Machine Learning,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 12, no. IV, 2024.
[23] J. M. Maluki, J. K. N. Macharia, and D. N. Kaimuru, “Machine Learning Approach for Cyberattack Detection and Prevention on IoT Networks,” Int. J. Comput. Appl., vol. 186, no. 77, pp. 17–26, 2025.
[24] K. Razzaq, M. Shah, M. Fattahi, and J. Tang, “Empowering machine learning for robust cyber- attack prevention in online retail: an integrative analysis,” Humanit. Soc. Sci. Commun., 2025, doi: 10.1057/s41599-025-04636-y.
[25] N. Saikiran and K. V. N. Jagadeesh, “An Intelligent Approach to Cyber Attack Detection in Networks using Machine Learning Techniques,” Int. J. Res. Innov. Appl. Sci., vol. X, no. VIII, pp. 1351–1358, 2025, doi: 10.51584/IJRIAS.
[26] R. B. Prakash and P. R. K, “Using Machine Learning to Detect Cyber Attacks,” Int. J. Res. Publ. Rev., vol. 5, no. 2, pp. 2793–2806, 2024.
[27] C. Singh, R. Singh, Shivaputra, M. Tiwari, and B. Hazela, “Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach,” EAI Endorsed Trans. Internet Things, vol. 10, pp. 1–6, 2024, doi: 10.4108/eetiot.5345.
[28] V. Thapliyal and P. Thapliyal, “Machine Learning for Cybersecurity: Threat Detection, Prevention, and Response,” Darpan Int. Res. Anal., vol. 12, no. 1, pp. 1–7, 2024.
[29] R. K. Dubey, N. Dandotiya, A. Sharma, S. Mishra, and S. K. Gupta, “Cyber attack Detection Using Machine Learning Techniques,” 2023 IEEE Int. Conf. ICT Bus. Ind. Gov., 2023, doi: 10.1109/ICTBIG59752.2023.10456080.
[30] D. Sahoo, C. Liu, and S. C. H. HOI, “Malicious URL Detection using Machine Learning: A Survey,” arXiv, pp. 1–37, 2019.
[31] A. Nikhat, “Machine Learning Based Cyber Security Technique For Detection Of Upcoming Cyber Attacks,” Int. J. Creat. Res. Thoughts, vol. 6, no. 2, pp. 534–538, 2018.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Ujjawal Valiya, Deepak Kumar Gupta, Archana Jain

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.





