Devashish M. Patil,
Darshan B. Khairnar,
Atharva B. Jagzap,
Anand N. Gharu,
- Student, Department. of Computer Engineering, MET Bhujbal Knowledge City Institute of Engineering, Savitribai Phule Pune University, Nashik, Maharashtra, India
- Student, Department. of Computer Engineering, MET Bhujbal Knowledge City Institute of Engineering, Savitribai Phule Pune University, Nashik, Maharashtra, India
- Student, Department. of Computer Engineering, MET Bhujbal Knowledge City Institute of Engineering, Savitribai Phule Pune University, Nashik, Maharashtra, India
- Assistant Professor, Department. of Computer Engineering, MET Bhujbal Knowledge City Institute of Engineering, Savitribai Phule Pune University, Nashik, Maharashtra, India
Abstract
It is now more difficult than ever to safeguard enterprises against cyberattacks due to their fast growth and growing sophistication. Stronger cyberattack detection systems are becoming more and more necessary as hostile strategies continue to evolve in order to safeguard information, preserve corporate trust, and protect sensitive data. An overview of contemporary detection techniques is given in this study, with a focus on integrating machine learning (ML) to increase efficacy. A thorough analysis of conventional methods is conducted, including hybrid anomaly-based detection and signature-based detection, pointing out both their benefits and drawbacks. Although these techniques have been useful in recognizing known dangers, they frequently fail to identify new or developing assaults, exposing businesses to serious risks. A useful remedy for these drawbacks is offered by machine learning approaches, which provide the capacity to continuously learn, adapt, and recognize intricate attack patterns that traditional systems could miss. Additionally, ML-based models increase detection speed and accuracy while reducing human error. The operational issues with conventional systems are also covered in the study, along with cutting-edge solutions to these problems. Organizations may greatly improve cybersecurity resilience and adjust to the ever-changing threat landscape by utilizing machine learning.
Keywords: Ensemble learning, classification, machine learning, feature extraction, adaptive learning, random forest
[This article belongs to Journal Of Network security ]
Devashish M. Patil, Darshan B. Khairnar, Atharva B. Jagzap, Anand N. Gharu. A Survey on Ensemble Technique for Enhanced Cyberattack Detection. Journal Of Network security. 2025; 13(03):50-54.
Devashish M. Patil, Darshan B. Khairnar, Atharva B. Jagzap, Anand N. Gharu. A Survey on Ensemble Technique for Enhanced Cyberattack Detection. Journal Of Network security. 2025; 13(03):50-54. Available from: https://journals.stmjournals.com/jons/article=2025/view=227919
References
- Wang W, Lu Z. Cyber security in the smart grid: Survey and challenges. Comput Netw. 2013 Apr 7; 57(5): 1344–71.
- Datta P, Panda SN, Bajaj S. Data analysis of cyber security for women in Haryana. In 2020 IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). 2020 Jun 4; 763–767.
- Anand A, Chirputkar A, Ashok P. Mitigating Cyber-Security Risks using Cyber-Analytics. In 2023 IEEE 7th International Conference on Trends in Electronics and Informatics (ICOEI). 2023 Apr 11; 630–635.
- Ulven JB, Wangen G. A systematic review of cybersecurity risks in higher education. Future Internet. 2021 Feb 2; 13(2): 39.
- Liao Y, Vemuri VR. Use of k-nearest neighbor classifier for intrusion detection. Comput Secur. 2002 Oct 1; 21(5): 439–48.
- Givargis T. Embedded system design: a unified hardware/software introduction. Wiley; New Jersey, USA. 2002.
- Dabhade V, Alvi AS. Malicious Node Detection and Prevention for Secured Communication in WSN. In Computer Networks, Big Data and IoT: Proceedings of ICCBI 2021. Singapore: Springer Nature Singapore; 2022 May 22; 121–136.
- Pabale AR, Kolhe RV, William P, Deshpande N, Paithankar DN, Yawalkar PM. Smart crack detection system using nanostructured materials with integrated optimization technology. Measurement: Sensors. 2023; 27: 100789.
- Panda M. Security in wireless sensor networks using cryptographic techniques. Am J Eng Res. 2014 Oct; 3(01): 50–6.
- Papp D, Ma Z, Buttyan L. Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In 2015 IEEE 13th Annual Conference on Privacy, Security and Trust (PST). 2015 Jul 21; 145–152.
- Van Huong P, Binh NN. Embedded system architecture design and optimization at the model level. International Journal of Computer and Communication Engineering (IJCCE). 2012 Nov 1; 1(4): 345–349.
- Lo CH, Ansari N. CONSUMER: A novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans Emerg Topics Comput. 2013 Jul 18; 1(1): 33–44.
- Anwar A, Mahmood AN. Cyber security of smart grid infrastructure. arXiv preprint arXiv:1401.3936. 2014 Jan 16.
- Cobilean V, Mavikumbure HS, Mcbride BJ, Vaagensmith B, Singh VK, Li R, Rieger C, Manic M. A review of visualization methods for cyber-physical security: Smart grid case study. IEEE Access. 2023 Jun 14; 11: 59788–803.
- Sridhar S, Hahn A, Govindarasu M. Cyber–physical system security for the electric power grid. Proc IEEE. 2011 Oct 3; 100(1): 210–24.
- Cardenas AA, Amin S, Sastry S. Secure control: Towards survivable cyber-physical systems. In 2008 IEEE 28th International Conference on Distributed Computing Systems Workshops. 2008 Jun 17; 495–500.
- Mohammed A, George G. Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review. In 2022 IEEE 3rd International Conference on Smart Grid and Renewable Energy (SGRE). 2022 Mar 20; 1–6.

Journal Of Network security
| Volume | 13 |
| Issue | 03 |
| Received | 12/06/2025 |
| Accepted | 05/09/2025 |
| Published | 17/09/2025 |
| Publication Time | 97 Days |
Login
PlumX Metrics