Cyber Attack Prediction Using Machine Learning: A Comparative Study of Bayesian Network and Support Vector Machine
DOI:
https://doi.org/10.62123/aqila.v2i2.123Keywords:
Cyber Attack Prediction, Machine Learning, Bayesian Network, Support Vector MachineAbstract
Cybersecurity is becoming a critical issue with the increasing reliance on digital systems that are vulnerable to attacks. Proactive cyberattack prediction is one of the main approaches in early detection systems, where machine learning plays a strategic role. This research compares two popular machine learning algorithms, namely Bayesian Network and Support Vector Machine (SVM), to determine the most effective algorithm in predicting cyberattacks. This research uses two benchmark datasets, namely UNSW-NB15 and KDD99, as well as real attack data from Elazığ, Turkey. The analysis shows that the Bayesian Network implemented through the MCVAE_PBNN approach achieves up to 96% accuracy on the UNSW-NB15 dataset, with the advantage of detecting distributed and uncertain attacks. On the other hand, the SVM linear (SVML) algorithm showed a prediction accuracy of 95.02% in attack method classification, excelling in the case of data with clearly defined features. This study also analyzes the advantages and limitations of both algorithms, and provides implementation recommendations based on the needs of the detection system. The findings reinforce the urgency of developing adaptive predictive models in modern cybersecurity.
References
[1] D. Dasgupta, Z. Akhtar, and S. Sen, “Machine learning in cybersecurity: a comprehensive survey,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 19, no. 1, pp. 57–106, Jan. 2022, doi: 10.1177/1548512920951275.
[2] G. Kocher and G. Kumar, “Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges,” Soft comput, vol. 25, no. 15, pp. 9731–9763, 2021.
[3] S. Mouti, S. K. Shukla, S. A. Althubiti, M. A. Ahmed, F. Alenezi, and M. Arumugam, “Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks,” Computers and Electrical Engineering, vol. 103, p. 108308, 2022.
[4] A. Bilen and A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput Sci, vol. 7, p. e475, Apr. 2021, doi: 10.7717/peerj-cs.475.
[5] E. Pleshakova, A. Osipov, S. Gataullin, T. Gataullin, and A. Vasilakos, “Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends,” Journal of Computer Virology and Hacking Techniques, vol. 20, no. 3, pp. 429–440, 2024.
[6] O. V Siva, K. Neeraja, D. Kalyan, and K. S. Naga, “Cyber Attack Detection and Prediction System,” in 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), 2024, pp. 1–8. doi: 10.1109/ACCAI61061.2024.10602219.
[7] R. Verma and B. Thakur, “Machine Learning Techniques for the Prediction of Cyber-Attacks,” in 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2023, pp. 978–985. doi: 10.1109/ICCCIS60361.2023.10425542.
[8] A. Swaminathan, B. Ramakrishnan, K. M, and S. R, “Prediction of Cyber-attacks and Criminality Using Machine Learning Algorithms,” in 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2022, pp. 547–552. doi: 10.1109/3ICT56508.2022.9990652.
[9] K. Veena, K. Meena, Y. Teekaraman, R. Kuppusamy, and A. Radhakrishnan, “C SVM classification and KNN techniques for cyber crime detection,” Wirel Commun Mob Comput, vol. 2022, no. 1, p. 3640017, 2022.
[10] I. Kotenko, E. Fedorchenko, E. Novikova, and A. Jha, “Cyber attacker profiling for risk analysis based on machine learning,” Sensors, vol. 23, no. 4, p. 2028, 2023.
[11] A. R. P. Reddy, “The role of artificial intelligence in proactive cyber threat detection in cloud environments,” NeuroQuantology, vol. 19, no. 12, pp. 764–773, 2021.
[12] A. R. Lubis, Y. Y. Lase, D. A. R, and D. Witarsyah, “Optimization of SVM Classification Accuracy with Bayesian Optimization Utilizing Data Augmentation,” in 2023 6th International Conference of Computer and Informatics Engineering (IC2IE), IEEE, Sep. 2023, pp. 169–174. doi: 10.1109/IC2IE60547.2023.10331580.
[13] Z. Ruan, Y. Miao, L. Pan, N. Patterson, and J. Zhang, “Visualization of big data security: a case study on the KDD99 cup data set,” Digital Communications and Networks, vol. 3, no. 4, pp. 250–259, Nov. 2017, doi: 10.1016/j.dcan.2017.07.004.
[14] S. Mouti, S. K. Shukla, S. A. Althubiti, M. A. Ahmed, F. Alenezi, and M. Arumugam, “Cyber Security Risk management with attack detection frameworks using multi connect variational auto-encoder with probabilistic Bayesian networks,” Computers and Electrical Engineering, vol. 103, Oct. 2022, doi: 10.1016/j.compeleceng.2022.108308.
[15] A. Bilen and A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput Sci, vol. 7, pp. 1–21, 2021, doi: 10.7717/PEERJ-CS.475.
[16] A. D. Vibhute, M. Khan, C. H. Patil, S. V. Gaikwad, A. V. Mane, and K. K. Patel, “Network anomaly detection and performance evaluation of Convolutional Neural Networks on UNSW-NB15 dataset,” Procedia Comput Sci, vol. 235, pp. 2227–2236, 2024, doi: 10.1016/j.procs.2024.04.211.
[17] N. U. I. Hossain, M. Nagahi, R. Jaradat, C. Shah, R. Buchanan, and M. Hamilton, “Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: A system of systems problem,” J Comput Des Eng, vol. 7, no. 3, pp. 352–366, Jun. 2020, doi: 10.1093/jcde/qwaa029.
[18] H. J. Kang, K. L. Aw, and D. Lo, “Detecting false alarms from automatic static analysis tools: How far are we?,” in Proceedings of the 44th International Conference on Software Engineering, 2022, pp. 698–709.
[19] N. R. Datta et al., “Quantification of thermal dose in moderate clinical hyperthermia with radiotherapy: a relook using temperature–time area under the curve (AUC),” International journal of hyperthermia, vol. 38, no. 1, pp. 296–307, 2021.
[20] R. Ben Said, Z. Sabir, and I. Askerzade, “CNN-BiLSTM: A Hybrid Deep Learning Approach for Network Intrusion Detection System in Software Defined Networking with Hybrid Feature Selection.,” IEEE Access, vol. PP, p. 1, Jan. 2023, doi: 10.1109/ACCESS.2023.3340142.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Cut Try Utari, Indri Sulistianingsih, Diva Rofsyahfitri, Nurul Rizkina Kalsum Batubara, Wizdanil Yumna Nawar

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.






