Using Data Mining as a Tool to Enhance Threat Detection and Response

Authors

  • Syeda Kawsar Security Engineer, Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9246/ICRTCSIT-121

Keywords:

Data Mining, Threat Detection, Threat Response, Cybersecurity, Anomaly Detection, Intrusion Detection, Machine Learning, Pattern Recognition, Data Analysis, Security Analytics, Incident Response, Predictive Analytics, Big Data, Network Security, Risk Management

Abstract

As the nature and scope of cyber threats are growing, signature-based protection mechanisms can no longer protect online resources. Having data mining investigate large volumes of data to uncover hidden patterns has been an essential aspect in the enhancement of threat detection and response. In this paper, we shall examine how data mining strategies can be applied to identify anomalies that can be utilized to predict attacks and even automatically defend the systems. According to the recent findings in machine learning and predictive analytics, information-driven models are more effective in identifying, responding faster, and helping in preemptive cybersecurity procedures. The other issues associated with the deployment of data mining solutions in cybersecurity that have been discussed in the study are data quality, complexity of computation, and privacy

Downloads

Download data is not yet available.

References

[1] Aminu, M., Akinsanya, A., Dako, D. A., & Oyedokun, O. (2024). Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms. International Journal of Computer Applications Technology and Research, 13(8), 11-27.

[2] Chukwunweike, J. N., Praise, A., & Bashirat, B. A. (2024). Harnessing Machine Learning for Cybersecurity: How Convolutional Neural Networks are Revolutionizing Threat Detection and Data Privacy.

[3] Danish, M. (2024). Enhancing cyber security through predictive analytics: Real-time threat detection and response. arXiv preprint arXiv:2407.10864.

[4] Dong, X., Dang, B., Zang, H., Li, S., & Ma, D. (2024). The prediction trend of enterprise financial risk based on machine learning arima model. Journal of Theory and Practice of Engineering Science, 4(01), 65-71.

[5] Guezzaz, A., Benkirane, S., Azrour, M., & Khurram, S. (2021). A reliable network intrusion detection approach using decision tree with enhanced data quality. Security and Communication Networks, 2021(1), 1230593.

[6] Halim, Z., Yousaf, M. N., Waqas, M., Sulaiman, M., Abbas, G., Hussain, M., ... & Hanif, M. (2021). An effective genetic algorithm-based feature selection method for intrusion detection systems. Computers & Security, 110, 102448.

[7] Katiyar, N., Tripathi, M. S., Kumar, M. P., Verma, M. S., Sahu, A. K., & Saxena, S. (2024). AI and Cyber-Security: Enhancing threat detection and response with machine learning. Educational Administration: Theory and Practice, 30(4), 6273-6282.

[8] Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys & Tutorials, 25(3), 1748-1774.

[9] Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-Rakhami, M. S. (2021). Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access, 9, 94318-94337.

[10] B. C. C. Marella, G. C. Vegineni, S. Addanki, E. Ellahi, A. K. K and R. Mandal, "A Comparative Analysis of Artificial Intelligence and Business Intelligence Using Big Data Analytics," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1139-1144, doi: 10.1109/CE2CT64011.2025.10939850.

[11] Thirunagalingam, A. (2024). Transforming real-time data processing: the impact of AutoML on dynamic data pipelines. Available at SSRN 5047601.

[12] L. N. R. Mudunuri, V. M. Aragani, and P. K. Maroju, "Enhancing Cybersecurity in Banking: Best Practices and Solutions for Securing the Digital Supply Chain," Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 929-936, Sep. 2024.

[13] Singhal, S., Kothuru, S. K., Sethibathini, V. S. K., & Bammidi, T. R. (2024). ERP excellence a data governance approach to safeguarding financial transactions. Int. J. Manag. Educ. Sustain. Dev, 7(7), 1-18.

[14] Sehrawat, S. K. (2024). Leveraging AI for early detection of chronic diseases through patient data integration. AVE Trends in Intelligent Health Letters, 1(3), 125-136.

[15] Hullurappa, M. (2023). Anomaly Detection in Real-Time Data Streams: A Comparative Study of Machine Learning Techniques for Ensuring Data Quality in Cloud ETL. Int. J. Innov. Sci. Eng, 17(1), 9.

[16] Kommineni, M. "Explore Knowledge Representation, Reasoning, and Planning Techniques for Building Robust and Efficient Intelligent Systems." International Journal of Inventions in Engineering & Science Technology 7.2 (2021): 105- 114.

[17] S. K. Gunda, "Enhancing Software Fault Prediction with Machine Learning: A Comparative Study on the PC1 Dataset," 2024 Global Conference on Communications and Information Technologies (GCCIT), BANGALORE, India, 2024, pp. 1-4, https://doi.org/10.1109/GCCIT63234.2024.10862351

[18] Reddy, R. R. P. (2024). Enhancing Endpoint Security through Collaborative Zero-Trust Integration: A Multi-Agent Approach. International Journal of Computer Trends and Technology, 72(8), 86-90.

[19] Rajesh Kumar Kanji, Vinodkumar Reddy Surasani, Naveen Kumar Kotha and Uday Kiran Chilakalapalli4 (2023). NLP-BASED INTER AND INTRA-SENTENCE RELATIONSHIP ANALYSIS-AWARE BANK CUSTOMER BEHAVIOR ANALYSIS AND PREFERENCE DETECTION USING GLSNSTM. Journal of Computational Analysis and Applications, 31(4), 1834-1857

[20] Amrish Solanki, Kshitiz Jain, Shrikaa Jadiga, "Building a Data-Driven Culture: Empowering Organizations with Business Intelligence," International Journal of Computer Trends and Technology (IJCTT), vol. 72, no. 2, pp. 46-55, 2024. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V72I2P109

Published

2025-10-10

How to Cite

1.
Kawsar S. Using Data Mining as a Tool to Enhance Threat Detection and Response. IJETCSIT [Internet]. 2025 Oct. 10 [cited 2025 Nov. 7];:149-53. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/441

Similar Articles

11-20 of 347

You may also start an advanced similarity search for this article.