CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

A Study on Machine Learning-based Models for Cyber Attack Classification and Severity Estimation

by Anup Kumar, Lalan Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 41
Year of Publication: 2025
Authors: Anup Kumar, Lalan Kumar Singh
10.5120/ijca2025925729

Anup Kumar, Lalan Kumar Singh . A Study on Machine Learning-based Models for Cyber Attack Classification and Severity Estimation. International Journal of Computer Applications. 187, 41 ( Sep 2025), 65-70. DOI=10.5120/ijca2025925729

@article{ 10.5120/ijca2025925729,
author = { Anup Kumar, Lalan Kumar Singh },
title = { A Study on Machine Learning-based Models for Cyber Attack Classification and Severity Estimation },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2025 },
volume = { 187 },
number = { 41 },
month = { Sep },
year = { 2025 },
issn = { 0975-8887 },
pages = { 65-70 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number41/a-study-on-machine-learning-based-models-for-cyber-attack-classification-and-severity-estimation/ },
doi = { 10.5120/ijca2025925729 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-09-23T00:37:01.515178+05:30
%A Anup Kumar
%A Lalan Kumar Singh
%T A Study on Machine Learning-based Models for Cyber Attack Classification and Severity Estimation
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 41
%P 65-70
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing complexity and frequency of cyber threats have rendered traditional rule-based security approaches inadequate. Machine Learning (ML) has emerged as a powerful solution, offering automated detection, prediction, and mitigation of cyberattacks by learning from data patterns. This study explores the application of ML techniques, focusing on linear regression for predicting continuous threat severity and logistic regression for binary attack classification. Using a cybersecurity dataset, both models demonstrate high accuracy and effective performance in their respective tasks. The study discusses the strengths and limitations of these models, emphasizing the need for larger, more diverse datasets to enhance real-world applicability. Finally, it outlines future directions for integrating advanced ML algorithms into adaptive security frameworks to build more resilient cyber defense systems.

References
  1. Suryadi, M. T., Aminanto, A. E., & Aminanto, M. E. (2024). Empowering digital resilience: Machine learning‑based policing models for cyber‑attack detection in Wi‑Fi networks. Electronics, 13(13), 2583. https://doi.org/10.3390/electronics13132583
  2. Barik, K., Misra, S. & Fernandez-Sanz, L. A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks. Int J Comput Intell Syst 17, 290 (2024). https://doi.org/10.1007/s44196-024-00686-3
  3. AB, H. B., & S, G. (2025). Cyber attacks classification using supervised machine learning techniques. Journal of Sensors, IoT & Health Sciences (JSIHS)., 57–67. https://doi.org/10.69996/jsihs.2025004
  4. Dahir, U. M., Hashi, A. O., Abdirahman, A. A., Elmi, M. A., & Rodriguez, O. E. R. (2024). Machine Learning-Based Anomaly Detection Model for Cybersecurity Threat Detection. Ingénierie Des Systèmes D Information, 29(6), 2415–2424. https://doi.org/10.18280/isi.290628
  5. Wang, W., Harrou, F., Bouyeddou, B., Senouci, S., & Sun, Y. (2022). Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. International Journal of Critical Infrastructure Protection, 38, 100542. https://doi.org/10.1016/j.ijcip.2022.100542
  6. Apruzzese, G., Laskov, P., De Oca, E. M., Mallouli, W., Rapa, L. B., Grammatopoulos, A. V., & Di Franco, F. (2022). The role of machine learning in cybersecurity. Digital Threats Research and Practice, 4(1), 1–38. https://doi.org/10.1145/3545574
  7. Wazid, M., Das, A. K., Chamola, V., & Park, Y. (2022). Uniting cyber security and machine learning: Advantages, challenges and future research. ICT Express, 8(3), 313–321. https://doi.org/10.1016/j.icte.2022.04.007
  8. Das, R., & Morris, T. H. (2017). Machine learning and cyber security. 2017 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 1–7. https://doi.org/10.1109/iccece.2017.8526232.
  9. Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems. https://doi.org/10.1007/s10115-025-02429-y.
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Machine Learning Linear Regression Logistic Regression Threat Detection Attack Classification Severity Prediction Data-driven Security Intrusion Detection Cyber Defense Systems