ISO 9001:2015

International Journal of Innovations & Research Analysis (IJIRA) [ Vol. 6 | No. 1(II) | January - March, 2026 ]

From Logs to Learning: A Data-Driven Framework for Predicting Cyber Threats Using Machine Intelligence

Ruchita Mathur & Harshita Mathur

The rapid expansion of digital services across e-governance, financial systems, healthcare platforms, and cloud-based infrastructures has significantly increased exposure to cyber threats. Reports published by CERT (Computer Emergency Response Time)-In indicate a steady rise in cyber incidents, including phishing, ransomware, distributed denial-of-service attacks, and unauthorized access attempts. Conventional signature-based detection mechanisms are increasingly inadequate against evolving and previously unseen attack patterns. This paper presents a data-driven framework that transforms system and network logs into predictive insights using machine intelligence. The framework is validated using secondary datasets aligned with national cybersecurity advisories and publicly available intrusion detection benchmarks widely adopted in academic research. Experimental evaluation demonstrates that ensemble learning models can effectively predict malicious activity with high accuracy, supporting proactive and automated cyber defense strategies.

  1. CERT-In. Annual Cyber Security Incident Reports. Ministry of Electronics and Information Technology, Government of India.
  2. Moustafa, N., & Slay, J. (2015). UNSW-NB15: A comprehensive data set for network intrusion detection systems. Military Communications and Information Systems Conference (MilCIS).
  3. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.
  4. Chio, C., & Freeman, D. (2018). Machine Learning and Security. O’Reilly Media.
  5. Ministry of Home Affairs. National Cyber Crime Reporting Portal – Annual Statistics. Government of India.
  6. Reserve Bank of India. Cyber Security Framework in Banks. RBI Circulars and Guidelines.
  7. National Critical Information Infrastructure Protection Centre (NCIIPC). Cyber Security Guidelines for Critical Sectors. Government of India.
  8. Sharma, S., Gupta, B. B., & Yadav, A. (2019). Machine learning-based intrusion detection systems for cyber security in smart environments. International Journal of Machine Learning and Cybernetics, 10(8), 2147–2162.
  9. Gupta, B. B., &Quamara, M. (2020). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21).
  10. Kaur, G., & Singh, M. (2021). Cyber-attack detection using machine learning techniques: A comparative study. Procedia Computer Science, 173, 80–89.

DOI:

Article DOI:

DOI URL:


Download Full Paper:

Download