IDEAS home Printed from https://ideas.repec.org/a/daw/ijsrmt/v4y2025i10p64-68id894.html

Harnessing Machine Learning Algorithms for Proactive Cyber Threat Detection and Real-Time Incident Response in Enterprise Networks

Author

Listed:
  • Marcel Okoebor

Abstract

The networks supporting business enterprises are becoming increasingly vulnerable to advanced cyber threats, including ransomware, insider threats, and advanced persistent attacks, which necessitate proactive countermeasures. With proactive threat detection and real-time incident response, ML has become a revolutionary way of optimising cybersecurity. The conceptual review synthesises existing frameworks, theoretical models, and algorithmic solutions to indicate how ML may be incorporated into enterprise security architectures. The paper analyzes ML paradigms of interest, including supervised, unsupervised, deep learning, and reinforcement learning, focusing on their conceptual strengths, limitations, and applicability in identifying known and unknown threats. It also explores the architectures of ML-enabled detection systems, including data gathering, feature extraction, model training, ongoing surveillance, and the incorporation of automated responses. Analysis i s presented on conceptual models of real-time incident response, including response orchestration, intelligent decision support, mechanical playbooks, and Security Orchestration, Automation, and Response (SOAR) incorporation. Among the issues the review identifies, there are critical gaps and challenges, including data privacy restrictions, interpretability issues, scalability, adversarial threats, and a lack of integration of conceptual frameworks. It emphasizes the necessity that any proposed model should be empirically validated so that the model becomes practically applicable. The synthesis of these ideas has helped to build a theoretically enlightened vision of ML-enabled cybersecurity. It has highlighted a course of action to construct resilient, adaptive, and predictive enterprise security mechanisms.

Suggested Citation

  • Marcel Okoebor, 2025. "Harnessing Machine Learning Algorithms for Proactive Cyber Threat Detection and Real-Time Incident Response in Enterprise Networks," International Journal of Scientific Research and Modern Technology, Prasu Publications, vol. 4(10), pages 64-68.
  • Handle: RePEc:daw:ijsrmt:v:4:y:2025:i:10:p:64-68:id:894
    as

    Download full text from publisher

    File URL: https://www.ijsrmt.com/index.php/ijsrmt/article/view/894
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Markus Goldstein & Seiichi Uchida, 2016. "A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data," PLOS ONE, Public Library of Science, vol. 11(4), pages 1-31, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yin, Sihua & Yang, Haidong & Xu, Kangkang & Zhu, Chengjiu & Zhang, Shaqing & Liu, Guosheng, 2022. "Dynamic real–time abnormal energy consumption detection and energy efficiency optimization analysis considering uncertainty," Applied Energy, Elsevier, vol. 307(C).
    2. Adele Ravagnani & Fabrizio Lillo & Paola Deriu & Piero Mazzarisi & Francesca Medda & Antonio Russo, 2024. "Dimensionality reduction techniques to support insider trading detection," Papers 2403.00707, arXiv.org, revised May 2024.
    3. Priyanga Dilini Talagala & Rob J Hyndman & Kate Smith-Miles, 2019. "Anomaly Detection in High Dimensional Data," Monash Econometrics and Business Statistics Working Papers 20/19, Monash University, Department of Econometrics and Business Statistics.
    4. Sevvandi Kandanaarachchi & Mario A Munoz & Rob J Hyndman & Kate Smith-Miles, 2018. "On normalization and algorithm selection for unsupervised outlier detection," Monash Econometrics and Business Statistics Working Papers 16/18, Monash University, Department of Econometrics and Business Statistics.
    5. Priyanga Dilini Talagala & Rob J Hyndman & Catherine Leigh & Kerrie Mengersen & Kate Smith-Miles, 2019. "A Feature-Based Framework for Detecting Technical Outliers in Water-Quality Data from In Situ Sensors," Monash Econometrics and Business Statistics Working Papers 1/19, Monash University, Department of Econometrics and Business Statistics.
    6. Piero Mazzarisi & Adele Ravagnani & Paola Deriu & Fabrizio Lillo & Francesca Medda & Antonio Russo, 2022. "A machine learning approach to support decision in insider trading detection," Papers 2212.05912, arXiv.org.
    7. Cian Ryan & Finbarr Murphy & Martin Mullins, 2019. "Semiautonomous Vehicle Risk Analysis: A Telematics‐Based Anomaly Detection Approach," Risk Analysis, John Wiley & Sons, vol. 39(5), pages 1125-1140, May.
    8. Elmira Asadi-Fard & Samereh Falahatkar & Mahdi Tanha Ziyarati & Xiaodong Zhang & Mariapia Faruolo, 2023. "Assessment of RXD Algorithm Capability for Gas Flaring Detection through OLI-SWIR Channels," Sustainability, MDPI, vol. 15(6), pages 1-20, March.
    9. Kenichiro Nagata & Toshikazu Tsuji & Kimitaka Suetsugu & Kayoko Muraoka & Hiroyuki Watanabe & Akiko Kanaya & Nobuaki Egashira & Ichiro Ieiri, 2021. "Detection of overdose and underdose prescriptions—An unsupervised machine learning approach," PLOS ONE, Public Library of Science, vol. 16(11), pages 1-14, November.
    10. Ruhi Kiran Bajaj & Rebecca Mary Meiring & Fernando Beltran, 2023. "Co-Design, Development, and Evaluation of a Health Monitoring Tool Using Smartwatch Data: A Proof-of-Concept Study," Future Internet, MDPI, vol. 15(3), pages 1-15, March.
    11. Chatterjee, Joyjit & Dethlefs, Nina, 2021. "Scientometric review of artificial intelligence for operations & maintenance of wind turbines: The past, present and future," Renewable and Sustainable Energy Reviews, Elsevier, vol. 144(C).
    12. Fan, Cheng & Xiao, Fu & Zhao, Yang & Wang, Jiayuan, 2018. "Analytical investigation of autoencoder-based methods for unsupervised anomaly detection in building energy data," Applied Energy, Elsevier, vol. 211(C), pages 1123-1135.
    13. Shuo Xu & Liyuan Hao & Xin An & Dongsheng Zhai & Hongshen Pang, 2019. "Types of DOI errors of cited references in Web of Science with a cleaning method," Scientometrics, Springer;Akadémiai Kiadó, vol. 120(3), pages 1427-1437, September.
    14. Milan Miric & Hakan Ozalp & Erdem Dogukan Yilmaz, 2023. "Trade‐offs to using standardized tools: Innovation enablers or creativity constraints?," Strategic Management Journal, Wiley Blackwell, vol. 44(4), pages 909-942, April.
    15. Parminder Singh & Sujatha Krishnamoorthy & Anand Nayyar & Ashish Kr Luhach & Avinash Kaur, 2019. "Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system," International Journal of Distributed Sensor Networks, , vol. 15(10), pages 15501477198, October.
    16. Borges, Dérick G. F. & Coutinho, Eluã R. & Cerqueira-Silva, Thiago & Grave, Malú & Vasconcelos, Adriano O. & Landau, Luiz & Coutinho, Alvaro L. G. A. & Ramos, Pablo Ivan P. & Barral-Netto, Manoel & Pi, 2025. "Combining machine learning and dynamic system techniques to early detection of respiratory outbreaks in routinely collected primary healthcare records," LSE Research Online Documents on Economics 127964, London School of Economics and Political Science, LSE Library.
    17. Erkuş, Ekin Can & Purutçuoğlu, Vilda, 2021. "Outlier detection and quasi-periodicity optimization algorithm: Frequency domain based outlier detection (FOD)," European Journal of Operational Research, Elsevier, vol. 291(2), pages 560-574.
    18. Durgesh Samariya & Amit Thakkar, 2023. "A Comprehensive Survey of Anomaly Detection Algorithms," Annals of Data Science, Springer, vol. 10(3), pages 829-850, June.
    19. Vinicius Francisco Rofatto & Marcelo Tomio Matsuoka & Ivandro Klein & Maurício Roberto Veronez & Luiz Gonzaga da Silveira Junior, 2020. "On the effects of hard and soft equality constraints in the iterative outlier elimination procedure," PLOS ONE, Public Library of Science, vol. 15(8), pages 1-29, August.
    20. Perwez, Usama & Yamaguchi, Yohei & Ma, Tao & Dai, Yanjun & Shimoda, Yoshiyuki, 2022. "Multi-scale GIS-synthetic hybrid approach for the development of commercial building stock energy model," Applied Energy, Elsevier, vol. 323(C).

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:daw:ijsrmt:v:4:y:2025:i:10:p:64-68:id:894. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Rahul Goyal (email available below). General contact details of provider: https://ijsrmt.com/index.php/ijsrmt/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.