A Review of Machine and Deep Learning Techniques for Cyber Security

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2025 | Volume : 16 | 03 | Page : –
    By

    Yasoda Krishna Reddy Annapureddy,

  • V. Krishna Reddy,

  1. , Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation (Deemed to be University) Guntur, Andhra Pradesh, India
  2. , Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation (Deemed to be University) Guntur, Andhra Pradesh, India

Abstract

document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_196033’);});Edit Abstract & Keyword

Now a days in the digital landscape, cyber threats and attacks are increasing in an exponential manner. posing server risks to organizations and critical infrastructures. Data breaches often result from sophisticated threat models that exploit vulnerabilities in networks, systems and user behaviors [1]. Cyber solutions are increasingly incorporating machine learning and deep learning to prevent and mitigate these security issues. These technologies have the potential to detect anomalies, classify threats and predict potential solutions. However, the dynamic nature of the threats presents major challenges which are new and complex threat continue to emerge daily [3]. These increasing threat models must be continually documented and used to retrain which will lead to improvement in the existing prediction models to maintain their accuracy and reliability. A wide range of approaches have already been proposed for threat detection and prediction, each leveraging different algorithms, datasets and evaluation metrics. In this paper, the most well-known machine learning and deep learning models for predicting cyber threats are compared [4]. We evaluate these models using key performance indicators such as precision, recall, accuracy, and adaptability to emerging threats, aiming to identify the most effective approaches for real-world scenarios.

Keywords: Cyber security, Machine learning, Deep learning, Threat prediction, Threat detection, Data analysis, Data processing, Network security, Intrusion detection, Malware detection, Phishing detection, Vulnerability assessment, Risk analysis, Automation, Cyber threat intelligence, Critical infrastructure protection.

How to cite this article:
Yasoda Krishna Reddy Annapureddy, V. Krishna Reddy. A Review of Machine and Deep Learning Techniques for Cyber Security. Journal of Computer Technology & Applications. 2025; 16(03):-.
How to cite this URL:
Yasoda Krishna Reddy Annapureddy, V. Krishna Reddy. A Review of Machine and Deep Learning Techniques for Cyber Security. Journal of Computer Technology & Applications. 2025; 16(03):-. Available from: https://journals.stmjournals.com/jocta/article=2025/view=0


document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_196033’);});Edit

References

  1. Haass JC. Cyber threat intelligence and machine learning. In: 2022 Fourth International Conference on Transdisciplinary AI (TransAI); 2022 Sep 7–9; Laguna Hills, CA, USA. IEEE; 2022. p. 156–9. doi:10.1109/TransAI54797.2022.00033.
  2. Dhir S, Kumar Y. Study of machine and deep learning classifications in cyber physical system. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT); 2020 Aug 20–22; Tirunelveli, India. IEEE; 2020. p. 333–8. doi:10.1109/ICSSIT48917.2020.9214237.
  3. Sathya K, Premalatha J, Suwathika S. Reinforcing cyber world security with deep learning approaches. In: 2020 International Conference on Communication and Signal Processing (ICCSP); 2020 Jul 28–30; Chennai, India. IEEE; 2020. p. 766–9. doi:10.1109/ICCSP48568.2020.9182067.
  4. Goyal Y, Sharma A. A semantic machine learning approach for cyber security monitoring. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC); 2019 Mar 27–29; Erode, India. IEEE; 2019. p. 439–42. doi:10.1109/ICCMC.2019.8819796.
  5. Garigipati N, Reddy VK. An integrated quantum and biometric key generation-based cloud data security framework for structured and unstructured electronic health records. J Theor Appl Inf Technol. 2023 Mar;101(5):1648–67.
  6. Annapureddy YKR, Katuri G, Dande UE, Shaik H. Fake face creation using generative adversarial network. Int J Adv Res Ideas Innov Technol. 2020 Dec;6(6). Paper ID: V6I6-1207.
  7. Dastagiraiah C, Reddy VK. Novel machine learning methodology in resource provisioning for forecasting of workload in distributed cloud environment. J Theor Appl Inf Technol. 2022 May;100(10):3319–27.
  8. Rao KVP, Reddy VK, Prasad T, Naresh D. A cloud computing hierarchical hybrid intrusion detection system using machine learning. In: Proceedings of the 1st International Conference on Disruptive Technologies in Computing and Communication Systems; 2023 Aug 11–12; Hyderabad: Teegala Krishna Reddy Engineering College.
  9. Shirisha N, Dimple V, Reddy VK. Analysis of complex diseases with different machine learning techniques. In: Proceedings of the International Conference on Innovative Computing & Communication (ICICC); 2021. Available from: https://ssrn.com/abstract=3884796 or http://dx.doi.org/10.2139/ssrn.3884796
  10. Reddy VK, Reddy LSSR. Security architecture of cloud computing. Int J Eng Sci Technol. 2011 Sep;3(9):7149–55

Ahead of Print Subscription Review Article
Volume 16
03
Received 06/06/2025
Accepted 05/07/2025
Published 08/07/2025
Publication Time 32 Days

[first_name] [last_name]

My IP

PlumX Metrics