A review on Machine Learning Approaches for Identifying and Preventing Cyber Attacks

Authors

  • Ujjawal Valiya M.Tech Student, School of Engineering & Technology, IIMT University, Meerut
  • Deepak Kumar Gupta Assistant Professor, Computer Science & Engineering Department, School of Engineering & Technology, IIMT University, Meerut
  • Archana Jain HOD, Computer Science & Engineering Department, School of Engineering & Technology, IIMT University, Meerut

DOI:

https://doi.org/10.69968/ijisem.2026v5i1160-168

Keywords:

Machine Learning, Cyber Attack Detection, Intrusion Detection Systems, Deep Learning, Cybersecurity

Abstract

The dynamic nature of cyber threats has brought in the need to come up with intelligent and adaptive security measures other than the conventional rule-based systems. Machine Learning (ML) has become a ground-breaking method to detect and prevent cyber attacks allowing recognition of patterns, detecting anomalies, and predictive threat analysis with the use of automated machines. The review paper presents an in-depth analysis of ML methods deployed to resolve cybersecurity issues, such as supervised, unsupervised, and deep-learning models, such as Support Vector Machines (SVM), K-Nearest Neighbors (KNN), Artificial Neural Networks (ANN), and ensemble models. The paper examines how they have been used to detect various cyber threats, including DDoS, malware, phishing, ransomware, attacks on IoT, and attacks on the supply chain. In addition, the paper also surveys the latest literature, benchmark datasets, assessment metrics, and comparison of the performance of the current models. The major challenges, such as data imbalance, adversarial manipulation, model bias, privacy concerns, and scalability issues, are also presented. The review identifies the recent progress and specifies the research prospects to enhance more resilient and adaptive cybersecurity infrastructure based on ML.

References

[1] A. Bilen and A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput. Sci., 2021, doi: 10.7717/peerj-cs.475.

[2] M. Asmar and A. Tuqan, “Integrating machine learning for sustaining cybersecurity in digital banks,” Heliyon, vol. 10, no. 17, p. e37571, 2024, doi: 10.1016/j.heliyon.2024.e37571.

[3] E. Ortiz-ruiz, J. R. Bermejo, J. A. Sicilia, and J. Bermejo, “Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia,” Electronics, vol. 13, no. 824, pp. 1–24, 2024.

[4] S. Ankalaki, A. R. Atmakuri, M. Pallavi, G. S. Hukkeri, T. Jan, and G. R. Naik, “Cyber Attack Prediction: From Traditional Machine Learning to Generative Artificial Intelligence,” IEEE Access, vol. 13, pp. 44662–44706, 2025, doi: 10.1109/ACCESS.2025.3547433.

[5] E. Kesavan, “Internet of Things (IoT): A Review of Security Challenges and Solutions,” Int. J. Innov. Sci. Eng. Manag., vol. 2, no. 4, 2023, doi: 10.69968/ijisem.2023v2i465-71.

[6] M. K. Hasan, R. A. Abdulkadir, S. Islam, T. R. Gadekallu, and N. Safie, “A review on machine learning techniques for secured cyber-physical systems in smart grid networks,” Energy Reports, vol. 11, pp. 1268–1290, 2024, doi: 10.1016/j.egyr.2023.12.040.

[7] G. Apruzzese, P. LASKOV, EDGARDO MONTES DE OCA, W. MALLOULI, and L. B. RAPA, “The Role of Machine Learning in Cybersecurity,” ACM Digit. Libr., vol. 4, no. 1, 2023, doi: 10.1145/3545574.

[8] S. Pal et al., “Vulnerabilities in Machine Learning for cybersecurity: Current trends and future research directions,” J. Inf. Secur. Appl., vol. 96, no. 104269, 2026, doi: 10.1016/j.jisa.2025.104269.

[9] M. Ahsan, K. E. Nygard, R. Gomes, M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review,” J. Cybersecurity Priv., vol. 2, pp. 527–555, 2022.

[10] B. O. Calviño, E. Rodriguez, J. J. Costa, and M. Oriol, “Enhancing cybersecurity in railways: Machine learning approaches for attack detection,” Int. J. Crit. Infrastruct. Prot., vol. 50, no. 100788, 2025, doi: 10.1016/j.ijcip.2025.100788.

[11] E. Liu, “Early detection and mitigation of cyber attacks with machine learning and artificial intelligence,” in International Conference on Software Engineering and Machine Learning, 2024, pp. 261–266. doi: 10.54254/2755-2721/73/20240409.

[12] M. Roshanaei, M. R. Khan, and N. N. Sylvester, “Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions,” J. Inf. Secur., vol. 15, no. 03, 2024, doi: 10.4236/jis.2024.153019.

[13] N. Mohamed, “Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms,” Knowl. Inf. Syst., vol. 67, 2025, doi: 10.1007/s10115-025-02429-y.

[14] W. K. Abdullah and I. M. Husien, “Machine learning approaches for cyber attack classification: A review and comparative analysis,” Int. J. Commun. Inf. Technol., vol. 6, no. 2, pp. 172–180, 2025.

[15] S. Raju, “Adaptive Security Through Machine Learning with Predictive Approach to Modern Cyber Threats,” Int. J. Comput. Appl., vol. 186, no. 50, pp. 6–12, 2024.

[16] C. Merlano, “Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review,” J. Cyber Secur., 2024, doi: 10.32604/jcs.2024.056164.

[17] A. Alshuaibi, M. Almaayah, and A. Ali, “Machine Learning for Cybersecurity Issues : A systematic Review,” J. Cyber Secur. Risk Audit., vol. 2025, no. 1, pp. 36–46, 2025.

[18] S. Saini and P. A. Kalia, “Detection of Cyber Attacks using Machine Learning,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 11, no. IX, pp. 1777–1785, 2023.

[19] F. Genuario, G. Santoro, M. Giliberti, S. Bello, E. Zazzera, and D. Impedovo, “Machine Learning-Based Methodologies for Cyber-Attacks and Network Traffic Monitoring: A Review and Insights,” Information, vol. 15, no. 741, pp. 1–27, 2024.

[20] R. A. Mustafa and H. S. Chyad, “Subject review: Cyber security using machine learning and deep learning techniques,” Glob. J. Eng. Technol. Adv., vol. 16, no. 2, pp. 212–219, 2023.

[21] O. B. J. Rabie, S. Selvarajan, and T. Hasanin, “A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models,” www.nature.com/scientificreports OPEN, pp. 1–20, 2024.

[22] G. D. Ranjane, V. H. Joshi, and P. L. K. Singhal, “Cyberattack Analysis, Detection and Prevention using Machine Learning,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 12, no. IV, 2024.

[23] J. M. Maluki, J. K. N. Macharia, and D. N. Kaimuru, “Machine Learning Approach for Cyberattack Detection and Prevention on IoT Networks,” Int. J. Comput. Appl., vol. 186, no. 77, pp. 17–26, 2025.

[24] K. Razzaq, M. Shah, M. Fattahi, and J. Tang, “Empowering machine learning for robust cyber- attack prevention in online retail: an integrative analysis,” Humanit. Soc. Sci. Commun., 2025, doi: 10.1057/s41599-025-04636-y.

[25] N. Saikiran and K. V. N. Jagadeesh, “An Intelligent Approach to Cyber Attack Detection in Networks using Machine Learning Techniques,” Int. J. Res. Innov. Appl. Sci., vol. X, no. VIII, pp. 1351–1358, 2025, doi: 10.51584/IJRIAS.

[26] R. B. Prakash and P. R. K, “Using Machine Learning to Detect Cyber Attacks,” Int. J. Res. Publ. Rev., vol. 5, no. 2, pp. 2793–2806, 2024.

[27] C. Singh, R. Singh, Shivaputra, M. Tiwari, and B. Hazela, “Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach,” EAI Endorsed Trans. Internet Things, vol. 10, pp. 1–6, 2024, doi: 10.4108/eetiot.5345.

[28] V. Thapliyal and P. Thapliyal, “Machine Learning for Cybersecurity: Threat Detection, Prevention, and Response,” Darpan Int. Res. Anal., vol. 12, no. 1, pp. 1–7, 2024.

[29] R. K. Dubey, N. Dandotiya, A. Sharma, S. Mishra, and S. K. Gupta, “Cyber attack Detection Using Machine Learning Techniques,” 2023 IEEE Int. Conf. ICT Bus. Ind. Gov., 2023, doi: 10.1109/ICTBIG59752.2023.10456080.

[30] D. Sahoo, C. Liu, and S. C. H. HOI, “Malicious URL Detection using Machine Learning: A Survey,” arXiv, pp. 1–37, 2019.

[31] A. Nikhat, “Machine Learning Based Cyber Security Technique For Detection Of Upcoming Cyber Attacks,” Int. J. Creat. Res. Thoughts, vol. 6, no. 2, pp. 534–538, 2018.

Downloads

Published

03-03-2026

Issue

Section

Articles

How to Cite

[1]
Ujjawal Valiya et al. 2026. A review on Machine Learning Approaches for Identifying and Preventing Cyber Attacks. International Journal of Innovations in Science, Engineering And Management. 5, 1 (Mar. 2026), 160–168. DOI:https://doi.org/10.69968/ijisem.2026v5i1160-168.