A Systematic Review of Advanced Data Mining Techniques for Enhancing Cyber and Information Security
Keywords:
Data Mining, Cybersecurity, Intrusion Detection, Machine LearningAbstract
The rapid escalation of cyber threats, driven by increasingly sophisticated attack vectors and the widespread digitization of organizational ecosystems, has intensified the demand for intelligent, adaptive, and data-driven security mechanisms. This systematic review examines the evolution, application, and effectiveness of advanced data mining techniques in enhancing cyber and information security across diverse technological environments. Drawing from a wide range of peer-reviewed studies, the review synthesizes findings on supervised, unsupervised, hybrid, and deep learning models used for intrusion detection, malware classification, behavioral analytics, phishing identification, and threat intelligence extraction. Emphasis is placed on the comparative performance of algorithms based on accuracy, precision, recall, scalability, false positive management, and real-time responsiveness. The review also highlights key challenges, including data imbalance, dataset limitations, adversarial machine learning threats, and computational constraints. Furthermore, emerging opportunities such as federated learning, adversarial resilience, cross-domain transfer learning, blockchain integration, IoT and edge-enabled security mechanisms, and predictive analytics–powered SOCs are explored. The findings indicate that while no single technique is universally superior, hybrid and ensemble models consistently offer more robust and adaptive defenses. Overall, this review contributes a comprehensive understanding of how data mining can strengthen cybersecurity strategies, guide future research pathways, and support the development of intelligent, proactive defense architectures.
References
Abawajy, J. H., & Kelarev, A. V. (2016). Big data mining for cyber security: A survey. Journal of Cyber Security and Mobility, 5(1), 1–29.
Alazab, M., Awajan, A., Mesleh, A., Alhyari, S., Khreishah, A., & Alazab, M. (2020). Intelligent mobile malware detection using permission requests and API calls. Future Generation Computer Systems, 107, 509–521.
Almomani, A., Al-Kasasbeh, B., & Al-Akhras, M. (2016). WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016, 1–16.
Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). On the effectiveness of machine and deep learning for cyber security. Proceedings of the 10th International Conference on Cyber Conflict (CyCon), 371–390.
Ashraf, J., & Latif, S. (2014). Handling intrusion and malware threats in big data: A security perspective. Proceedings of the IEEE International Congress on Big Data, 498–505.
Aslahi-Shahri, B., Rahmani, R., Chizari, H., Maralani, A., Eslami, M., Maralani, A., & Shojaedini, M. M. (2016). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Applications, 27(6), 1669–1676.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
Dey, S., & Rahman, R. M. (2019). A hybrid approach of neural network and decision tree classifier for phishing detection. Journal of Computers, 14(3), 137–146.
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.
HaddadPajouh, H., Dehghantanha, A., Parizi, R. M., & Choo, K. K. R. (2018). A survey on machine learning for intrusion detection systems. Computers & Security, 87, 101780.
Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, 21–26.
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2(1), 1–22.
Kumar, P., Tripathi, R., & Singh, S. K. (2020). A comprehensive survey of intrusion detection techniques employing machine learning in IoT networks. Computer Communications, 164, 112–133.
Lee, J., & Kim, S. (2016). Big data analysis for cyber security. Proceedings of the IEEE International Conference on Big Data and Smart Computing (BigComp), 329–332.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Engineering, Science and Humanities

This work is licensed under a Creative Commons Attribution 4.0 International License.


