EXPLORING THE POTENTIAL OF ARTIFICIAL INTELLIGENCE TO PREDICT CYBER ATTACKS: CREATION, EVALUATION AND COMPARATIVE ANALYSIS OF EFFECTIVE MODELS OF FINE-TUNING, RANDOM FORESTS, AND NEURAL NETWORKS
DOI:
https://doi.org/10.17770/etr2025vol5.8504Keywords:
Anomaly Detection, Artificial Intelligence, Cyber Attack Prediction, Cybersecurity, Machine Learning ModelsAbstract
This quantitative investigation focuses on the application of artificial intelligence (AI) models for predicting cyberattacks and detecting anomalies in network traffic, aiming to enhance cybersecurity defenses. With the increasing complexity of cyber threats, AI offers a promising solution to address these challenges by providing predictive and responsive capabilities. This study compares three AI models — Fine-Tuning, Random Forests, and TensorFlow — using datasets aggregated on daily, weekly, and monthly levels. The methodology includes advanced data preprocessing, statistical analysis, and evaluation metrics such as RMSE, R², Precision, Recall, and F1-Score. Random Forests demonstrated exceptional accuracy and reliability, achieving high R² values and minimal errors. Fine-Tuning showed strong predictive capabilities but required careful parameter tuning to maintain accuracy. TensorFlow proved to be a powerful tool but required optimization to improve precision and reduce false positives. These results highlight the importance of model selection and parameter tuning in AI-driven cybersecurity applications.
References
“How AI will automate cybersecurity in the post-COVID world | VentureBeat.” Accessed: Feb. 25, 2025. [Online]. Available: https://venturebeat.com/business/how-ai-will-automate-cybersecurity-in-the-post-covid-world/
“Hands-On Artificial Intelligence for Cybersecurity | Data | Paperback.” Accessed: Feb. 25, 2025. [Online]. Available: https://www.packtpub.com/en-us/product/hands-on-artificial-intelligence-for-cybersecurity-9781789804027
V. Quezada, F. Astudillo-Salinas, L. Tello-Oquendo, and P. Bernal, “Real-time bot infection detection system using DNS fingerprinting and machine-learning,” Computer Networks, vol. 228, p. 109725, Jun. 2023, doi: 10.1016/J.COMNET.2023.109725.
N. Q. Do, A. Selamat, O. Krejcar, E. Herrera-Viedma, and H. Fujita, “Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions,” IEEE Access, vol. 10, pp. 36429–36463, 2022, doi: 10.1109/ACCESS.2022.3151903.
A. Lichy, O. Bader, R. Dubin, A. Dvir, and C. Hajaj, “When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification,” Comput Secur, vol. 124, p. 103000, Jan. 2023, doi: 10.1016/J.COSE.2022.103000.
S. Aktar and A. Yasin Nur, “Towards DDoS attack detection using deep learning approach,” Comput Secur, vol. 129, p. 103251, Jun. 2023, doi: 10.1016/J.COSE.2023.103251.
J. Devlin, M.-W. Chang, K. Lee, K. T. Google, and A. I. Language, “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding,” Proceedings of the 2019 Conference of the North, pp. 4171–4186, 2019, doi: 10.18653/V1/N19-1423.
L. Breiman, “Random forests,” Mach Learn, vol. 45, no. 1, pp. 5–32, Oct. 2001, doi: 10.1023/A:1010933404324/METRICS.
M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems,” Mar. 2016, Accessed: Feb. 25, 2025. [Online]. Available: https://arxiv.org/abs/1603.04467v2
J. D. Hunter, “Matplotlib: A 2D graphics environment,” Comput Sci Eng, vol. 9, no. 3, pp. 90–95, 2007, doi: 10.1109/MCSE.2007.55.
F. Pedregosa FABIANPEDREGOSA et al., “Scikit-learn: Machine Learning in Python,” Journal of Machine Learning Research, vol. 12, no. 85, pp. 2825–2830, 2011, Accessed: Feb. 25, 2025. [Online]. Available: http://jmlr.org/papers/v12/pedregosa11a.html
W. McKinney, “Data Structures for Statistical Computing in Python,” scipy, pp. 56–61, 2010, doi: 10.25080/MAJORA-92BF1922-00A.
M. L. Waskom, “seaborn: statistical data visualization,” J Open Source Softw, vol. 6, no. 60, p. 3021, Apr. 2021, doi: 10.21105/JOSS.03021.
T. Kluyver et al., “Jupyter Notebooks – a publishing format for reproducible computational workflows,” Positioning and Power in Academic Publishing: Players, Agents and Agendas - Proceedings of the 20th International Conference on Electronic Publishing, ELPUB 2016, pp. 87–90, 2016, doi: 10.3233/978-1-61499-649-1-87.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Miroslav Stefanov, Boyan Jekov, Tito Titov, Andriyan Stoilov, Kiril Nikolov

This work is licensed under a Creative Commons Attribution 4.0 International License.