MACHINE LEARNING DRIVEN NETWORK TRAFFIC ANALYSIS FOR CYBERSECURITY: A COMPARATIVE STUDY OF SUPERVISED AND UNSUPERVISED LEARNING APPROACHES
DOI:
https://doi.org/10.33003/fjs-2025-0910-3752Keywords:
Machine Learning, , Network Traffic Analysis, Anomaly Detection, Supervised Learning, Unsupervised LearningAbstract
This study looks at how well machine learning (ML) methods work in cybersecurity, focusing on their ability to tell apart malicious and normal network traffic. Using the CICIDS2017 dataset, we compare supervised learning models like Random Forest and Support Vector Machines with unsupervised techniques such as K-means clustering and Isolation Forest. We evaluate their performance using multiple metrics, including accuracy, precision, recall, F1-score, and cluster validity indices, to find the most effective approach for spotting anomalies in network data. The results show that Random Forest delivers the best overall performance, achieving over 99.4% accuracy with very few false negatives. Meanwhile, unsupervised methods excel at detecting new, previously unseen patterns without needing labeled data. In particular, the Isolation Forest model achieves a recall of 93%, making it highly effective at identifying anomalies. K-means clustering also performs well, clearly separating traffic patterns with strong Silhouette scores (0.8622) and favorable Davies-Bouldin indices (0.6063).
References
Alloghani, M., Al-Jumeily, D., Mustafina, J., Hussain, A., & Aljaaf, A. J. (2020). A systematic review on supervised and unsupervised machine learning algorithms for data science. Supervised and Unsupervised Learning for Data Science, 3–21.
Alom, M. Z., & Taha, T. M. (2017). Network intrusion detection for cyber security using unsupervised deep learning approaches. 2017 IEEE National Aerospace and Electronics Conference (NAECON), 63–69. https://doi.org/10.1109/NAECON.2017.8268746
Bin Sarhan, B., & Altwaijry, N. (2023). Insider Threat Detection Using Machine Learning Approach. Applied Sciences, 13(1). https://doi.org/10.3390/app13010259
Bohara, A., Noureddine, M. A., Fawaz, A., & Sanders, W. H. (2017). An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement. 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 224–233. https://doi.org/10.1109/SRDS.2017.31
Chen, S., Webb, G. I., Liu, L., & Ma, X. (2020). A novel selective naïve Bayes algorithm. Knowledge-Based Systems, 192, 105361. https://doi.org/https://doi.org/10.1016/j.knosys.2019.105361
Jony, A. I., & Arnob, A. K. B. (2024). Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset. International Journal of Information Technology and Computer Science, 16(4), 56–65. https://doi.org/10.5815/ijitcs.2024.04.04
Kim, S., & Park, K. J. (2021). A survey on machine-learning based security design for cyber-physical systems. Applied Sciences (Switzerland), 11(12). https://doi.org/10.3390/app11125458
Korteling, J. E. (Hans), van de Boer-Visschedijk, G. C., Blankendaal, R. A. M., Boonekamp, R. C., & Eikelboom, A. R. (2021). Human-versus artificial intelligence. Frontiers in Artificial Intelligence, 4, 622364.
Maikano, F. A. (2024). 8 Machine Learning Approaches for Cyber Bullying Detection in Hausa Language Social Media: a Comprehensive Review and Analysis. MACHINE LEARNING APPROACHES… Maikano FJS FUDMA Journal of Sciences (FJS, 8(3), 344–348. https://doi.org/10.33003/fjs-2024-0803-2517
Murtagh, F., & Contreras, P. (2017). Algorithms for hierarchical clustering: an overview, II. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(6), e1219.
Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., & Mohammad, R. M. (2023). Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks, 12(2). https://doi.org/10.3390/jsan12020029
Sakhai, M., & Wielgosz, M. (2021). Modern Cybersecurity Solution using Supervised Machine Learning. http://arxiv.org/abs/2109.07593
Tao, X., Peng, Y., Zhao, F., Zhao, P., & Wang, Y. (2018). A parallel algorithm for network traffic anomaly detection based on Isolation Forest. International Journal of Distributed Sensor Networks, 14, 155014771881447. https://doi.org/10.1177/1550147718814471
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2025 Abdulrahman Tunde Alabelewe, Nasir Shinkafi, Samson Adeyinka, Suleiman Abu Usman, Maryam Safiyanu Masari, Muhammad Auwal Bello, Joshua Yakubu Anche

This work is licensed under a Creative Commons Attribution 4.0 International License.