EXPLORING THE POTENTIAL OF ARTIFICIAL INTELLIGENCE TO PREDICT CYBER ATTACKS: CREATION, EVALUATION AND COMPARATIVE ANALYSIS OF EFFECTIVE MODELS OF FINE-TUNING, RANDOM FORESTS, AND NEURAL NETWORKS

Authors

  • Miroslav Stefanov Computer science department, ULSIT
  • Boyan Jekov Computer science department, ULSIT
  • Tito Titov Computer science department, ULSIT
  • Andriyan Stoilov Computer science department, ULSIT
  • Kiril Nikolov Computer science department, ULSIT

DOI:

https://doi.org/10.17770/etr2025vol5.8504

Keywords:

Anomaly Detection, Artificial Intelligence, Cyber Attack Prediction, Cybersecurity, Machine Learning Models

Abstract

This quantitative investigation focuses on the application of artificial intelligence (AI) models for predicting cyberattacks and detecting anomalies in network traffic, aiming to enhance cybersecurity defenses. With the increasing complexity of cyber threats, AI offers a promising solution to address these challenges by providing predictive and responsive capabilities. This study compares three AI models — Fine-Tuning, Random Forests, and TensorFlow — using datasets aggregated on daily, weekly, and monthly levels. The methodology includes advanced data preprocessing, statistical analysis, and evaluation metrics such as RMSE, R², Precision, Recall, and F1-Score. Random Forests demonstrated exceptional accuracy and reliability, achieving high R² values and minimal errors. Fine-Tuning showed strong predictive capabilities but required careful parameter tuning to maintain accuracy. TensorFlow proved to be a powerful tool but required optimization to improve precision and reduce false positives. These results highlight the importance of model selection and parameter tuning in AI-driven cybersecurity applications.

 

References

“How AI will automate cybersecurity in the post-COVID world | VentureBeat.” Accessed: Feb. 25, 2025. [Online]. Available: https://venturebeat.com/business/how-ai-will-automate-cybersecurity-in-the-post-covid-world/

“Hands-On Artificial Intelligence for Cybersecurity | Data | Paperback.” Accessed: Feb. 25, 2025. [Online]. Available: https://www.packtpub.com/en-us/product/hands-on-artificial-intelligence-for-cybersecurity-9781789804027

V. Quezada, F. Astudillo-Salinas, L. Tello-Oquendo, and P. Bernal, “Real-time bot infection detection system using DNS fingerprinting and machine-learning,” Computer Networks, vol. 228, p. 109725, Jun. 2023, doi: 10.1016/J.COMNET.2023.109725.

N. Q. Do, A. Selamat, O. Krejcar, E. Herrera-Viedma, and H. Fujita, “Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions,” IEEE Access, vol. 10, pp. 36429–36463, 2022, doi: 10.1109/ACCESS.2022.3151903.

A. Lichy, O. Bader, R. Dubin, A. Dvir, and C. Hajaj, “When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification,” Comput Secur, vol. 124, p. 103000, Jan. 2023, doi: 10.1016/J.COSE.2022.103000.

S. Aktar and A. Yasin Nur, “Towards DDoS attack detection using deep learning approach,” Comput Secur, vol. 129, p. 103251, Jun. 2023, doi: 10.1016/J.COSE.2023.103251.

J. Devlin, M.-W. Chang, K. Lee, K. T. Google, and A. I. Language, “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding,” Proceedings of the 2019 Conference of the North, pp. 4171–4186, 2019, doi: 10.18653/V1/N19-1423.

L. Breiman, “Random forests,” Mach Learn, vol. 45, no. 1, pp. 5–32, Oct. 2001, doi: 10.1023/A:1010933404324/METRICS.

M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems,” Mar. 2016, Accessed: Feb. 25, 2025. [Online]. Available: https://arxiv.org/abs/1603.04467v2

J. D. Hunter, “Matplotlib: A 2D graphics environment,” Comput Sci Eng, vol. 9, no. 3, pp. 90–95, 2007, doi: 10.1109/MCSE.2007.55.

F. Pedregosa FABIANPEDREGOSA et al., “Scikit-learn: Machine Learning in Python,” Journal of Machine Learning Research, vol. 12, no. 85, pp. 2825–2830, 2011, Accessed: Feb. 25, 2025. [Online]. Available: http://jmlr.org/papers/v12/pedregosa11a.html

W. McKinney, “Data Structures for Statistical Computing in Python,” scipy, pp. 56–61, 2010, doi: 10.25080/MAJORA-92BF1922-00A.

M. L. Waskom, “seaborn: statistical data visualization,” J Open Source Softw, vol. 6, no. 60, p. 3021, Apr. 2021, doi: 10.21105/JOSS.03021.

T. Kluyver et al., “Jupyter Notebooks – a publishing format for reproducible computational workflows,” Positioning and Power in Academic Publishing: Players, Agents and Agendas - Proceedings of the 20th International Conference on Electronic Publishing, ELPUB 2016, pp. 87–90, 2016, doi: 10.3233/978-1-61499-649-1-87.

Downloads

Published

08.06.2025

How to Cite

EXPLORING THE POTENTIAL OF ARTIFICIAL INTELLIGENCE TO PREDICT CYBER ATTACKS: CREATION, EVALUATION AND COMPARATIVE ANALYSIS OF EFFECTIVE MODELS OF FINE-TUNING, RANDOM FORESTS, AND NEURAL NETWORKS. (2025). ENVIRONMENT. TECHNOLOGY. RESOURCES. Proceedings of the International Scientific and Practical Conference, 5, 255-263. https://doi.org/10.17770/etr2025vol5.8504