Analyzing Big Data to Mitigate Cyber Attacks Using Machine Learning Classifications: A Comparative Study of an Efficient Classifier Set

Main Article Content

ali jawad

Abstract

In this research, we address a set of methodological approaches and approaches in scientific research in the field of cybersecurity and big data analysis using machine learning techniques, which have made the data analysis process easier to understand and mitigate cyberattacks. This method involves data processing and analysis in a series of stages, or in the form of analytical protection layers, including analysis and organization of large databases,. Training and qualifying classifiers is a method for reducing the dimensionality and skewness of feature vectors according to basic procedure analysis.. Using the principal components in the analysis, we employ various binary classifiers for vector K-nearest neighbors and many other algorithms, such as Bayesian algorithms and others, analyze vector machines, as well as artificial intelligence, which work to increase the efficiency and accuracy of attack detection devices. Artificial neural networks are also highly efficient in detecting  cyberattacks and analyzing all network disturbances. Through our research, the basic idea was to classify and segment data and deal with each type of data separately to facilitate processing. Another approach is to combine data classifiers. This idea relies on two options: soft voting and majority voting. Each approach has its own method and method for specific use. methods for intrusion detection and penetration of large databases. In the first approach, we analyze and process data in parallel by classifying and dividing it into several subsets, and assigning each subset a separate path. In this method, we partition the problem, making the solution simpler and the data less complex. In the other approach, we also use sensors to collect client data within search servers. The sensor contains a set of parallel paths, each path analyzes the data and information for the client, and is conducted through a parallel network that detects anomalies through two different data sets. One group contains computer network traffic, which includes examining data and hosts from distributed denial of service (DDOS) attacks. The other group contains the Internet of Things and its data.

Downloads

Download data is not yet available.

Article Details

How to Cite
jawad, ali. (2025). Analyzing Big Data to Mitigate Cyber Attacks Using Machine Learning Classifications: A Comparative Study of an Efficient Classifier Set. AlKadhim Journal for Computer Science, 3(4), 1–21. https://doi.org/10.61710/kjcs.v3i4.113
Section
Computer Science

References

Behiry, M. H., & Aly, M. (2024). Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods. Journal of Big Data, 11(1), 16.‏

Choudhury, S., & Bhowal, A. (2015, May). Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. In 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM) (pp. 89-95). IEEE.‏

Inuwa, M. M., & Das, R. (2024). A comparative analysis of various machine learning methods for anomaly detection in cyber-attacks on IoT networks. Internet of Things, 26, 101162.‏

Sarker, I. H. (2021). Cyber Learning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things, 14, 100393.‏

Alaketu, M. A., Oguntimilehin, A., Olatunji, K. A., Abiola, O. B., Badeji-Ajisafe, B., Akinduyite, C. O., ... & Okebule, T. (2024). Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. Int. Arab J. Inf. Technol., 21(2), 326-337.

‏Alaketu, M. A., Oguntimilehin, A., Olatunji, K. A., Abiola, O. B., Badeji-Ajisafe, B., Akinduyite, C. O., ... & Okebule, T. (2024). Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. Int. Arab J. Inf. Technol., 21(2), 326-337.‏ Alaketu, M. A., Oguntimilehin, A., Olatunji, K. A., Abiola, O. B., Badeji-Ajisafe, B., Akinduyite, C. O., ... & Okebule, T. (2024). Comparative analysis of intrusion detection models using big data analytics and machine learning techniques. Int. Arab J. Inf. Technol., 21(2), 326-337.‏

Nabi, F., & Zhou, X. (2024). Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security. Cyber Security and Applications, 2, 100033

Azam, Z., Islam, M. M., & Huda, M. N. (2023). Comparative analysis of intrusion detection systems and machine learning-based model analysis through decision tree. Ieee Access, 11, 80348-80391.

Nyame, L., Marfo-Ahenkorah, E., Abrahams, A., Ashley-Osuzoka, J., Ashong, G., & Aboagye, D. (2024). Rise in Cyber Threats in the United States and the Need for Advanced Cyber Risk Mitigation Tools and Adequate Skills to Combat Cyber Threats.‏

Alauthman, M., Aldweesh, A., Al-Qerem, A., Daoud, I., Alkasassbeh, M., & Gawanmeh, A. (2025, April). Evaluating Reinforcement Learning Reward Functions for APT Detection in Industrial IoT Systems. In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA) (pp. 1-6). IEEE.‏

Huertas, L. M. (2025). Using Improvement Science and Participatory Action Research to Enhance Critical Thinking in First-Generation Hispanic Female STEM Students (Doctoral dissertation, Barry University).‏

Erendor, M. E. (Ed.). (2024). Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons. CRC Press.‏

Alsodi, O., Zhou, X., Gururajan, R., Shrestha, A., & Btoush, E. (2025). From Tweets to Threats: A Survey of Cybersecurity Threat Detection Challenges, AI-Based Solutions and Potential Opportunities in X. Applied Sciences, 15(7), 3898.‏

Sindiramutty, S. R. (2023). Autonomous threat hunting: A future paradigm for AI-driven threat intelligence. arXiv preprint arXiv:2401.00286.‏

Wang, L., Chen, J., & Zhang, X. (2021). Real-time AI-driven cybersecurity threat detection and response. Journal of CyberIntelligence, 14(2), 78-95.

Johnson, M., & Miller, R AI-powered (2022).defense mechanisms: utomated containment and response strategies. Cybersecurity Review, 10(4), 33-50.

Priyadharshini, S. L., Al Mamun, M. A., Khandakar, S., Prince, N. N. U., Shnain, A. H., Abdelghafour, Z. A., & Brahim, S. M. (2024). Unlocking Cybersecurity Value through Advance Technology and Analytics from Data to Insight. Nanotechnology Perceptions, 202-210.‏

Smith, J., & Johnson, (2022). RPredictive analytics in cybersecurity: Leveraging AI for proactive defense. Cyber Threat Intelligence Journal, 15(3), 45-62.

Rajagopal, N. K., Qureshi, N. I., Durga, S., Ramirez Asis, E. H., Huerta Soto, R. M., Gupta, S. K., & Deepak, S Future of Business Culture: An Artificial Intelligence-Driven Digital Framework for Organization Decision-Making Process. Complexity, 54:2022: 7796507. https://doi.org/10.1155/2022/7796507

Derbeko P, Dolev S, Gudes E, Sharma S (2016) Security and privacy aspects in MapReduce on clouds: a survey. Comp Sci Rev 20:1–28. https://doi.org/10.1016/j.cosrev.2016.05.001.

Muthusubramanian, M., Mohamed, I. A., & Pakalapati, N. (2024). Machine learning for cybersecurity threat detection and prevention. Int. J. Innov. Sci. Res. Technol, 9(2), 1470-1476.‏

Abimbola, O., & Idris, O. O. (2025). A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Path of Science, 11(3), 4009-4020.‏

World Journal of Advanced Research and Reviews. GSC Online Press; 2024. p. 1778–90. Available from: https://dx.doi.org/10.30574/wjarr.2024.23.2.2550

. Inuwa, M. M., & Das, R. (2024). A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things, 26, 101162.

Rodrigues GA, Serrano AL, Vergara GF, Albuquerque RD, Nze GD. Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded US Companies. Future Internet. 2024 Jun 5;16(6):201.

Kryparos G. Information security in the realm of FinTech. InThe Rise and Development of FinTech 2018 Feb 15 (pp. 43-65).

Joseph Nnaemeka Chukwunweike, Moshood Yussuf, Oluwatobiloba Okusi, Temitope Oluwatobi Bakare, Ayokunle J. Abisola. The role of deep learning in ensuring privacy integrity and security: Applications in AI-driven cybersecurity solutions [Internet]. Vol.

Darem AA, Alhashmi AA, Alkhaldi TM, Alashjaee AM, Alanazi SM, Ebad SA. Cyber threats classifications and countermeasures in banking and financial sector. IEEE Access. 2023 Oct 23;11:125138-58.

Abimbola, O., & Idris, O. O. (2025). A Critical Cyber security Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Path of Science, 11(3), 4009-4020.‏

Abimbola, O., & Idris, O. O. (2025). A Critical Cyber security Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Path of Science, 11(3), 4009-4020.‏