Cybersecurity and Cyber Forensics: Machine Learning Approach

Ibrahim Goni (Department of Computer Science, Adamawa State University, Mubi, Nigeria)
Jerome Mishion Gumpy (Department of Computer Science, Federal University, Gashua, Nigeria)
Timothy Umar Maigari (Department of Computer Science, Federal College of Education Gombe, Nigeria)


We live in a connected world of digital devices which include mobile devices, workstations, control systems, transportation systems, base stations, satellites of different interconnected networks, Global positioning system (GPS) with their associated e-services in which internet provide platform for the connection of this devices worldwide. cyber forensics as a sub-branch of computer security that uses software and predefined techniques which is aim at extracting evidences from any form of digital device and can be presented to a court of law for criminal and/or civil proceedings provided that it satisfy this three conditions; comprehensiveness, authenticity and objectivity. Cyber space is recently considered a domain worth exploring and investigating and securing after lithosphere, hydrosphere, biosphere and atmosphere. Cyber threats, attacks and breaches have become a normal incident in day-to-day life of internet users. However, it is noted that cybersecurity is based on confidentiality, integrity and validity of data. In this research work machine learning algorithms applied to cybersecurity and cyber forensics are clearly explored and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.


Cybersecurity, Cyber Forensics, Cyber space, Cyber threat, Machine learning and deep learning

Full Text:



Shahzad S. (2015) protecting the integrity of digital evidence and basic human rights during the process of digital forensics. Ph.D. thesis Stockholm University.

Abdalzim A. M. A. & Amin B. A. M. (2015) a survey on mobile forensics for android smart phones IOSR Journal of computer engineering 17(2) 15-19

Nickson M. K., Victor R. K. & Venter H. (2019) Divergency deep learning cognitive computing techniques into cyber forensics Elservier Forensics Science international synergy 1(2019) 61-67

Rukayat A. A., Charles O. U. & Florence A. O. (2017) computer forensics guidelines: a requirement for testing cyber crime in Nigeria now?

Casey E. (2016) Editorial- A sea change in digital forensics and incident response. Digital investigation evidence Elservier Ltd 17, A1-A2.

Ehsan S. & Giti J. (2019) Seminars in proactive artificial intelligence for cyber security consulting and research, Systematic cybernetics and informatics 17(1) 297-305

Bandir A. (2019) Forensics analysis using text clustering in the age of large volume data: a review. International journal of advanced computer and application. 10(6), 72-76.

Al-Jadir I., Wong K. W., Fing C. C. & Xie H. (2018) Enhensing digital forensics analysis using memetic algorithm feature selection method for document clustering 2018 IEEE international conference on systems, Man and cybernetics 3673-3678.

Sunil B. & Preeti B. (2018) Application of artificial intelligence in cyber security. International journal of engineering research in computer science and engineering 5(4), 214-219.

David O. A., Goodness O. & Etecte M. A. (2019) Unbated cyber terrorism and huma security in Nigeria. Asian social science 15(11), 105-115.

April (2014) threat start-SMS spam volume by month of each region SC magazine. available online at http//

Apruzze G., Colajanni M. F., Ferreti L., & Marchett M. (2018) on the effectiveness of machine learning for cyber security in 2018 IEEE international conference on cyber conflict 371-390.

Buckza A. L. & Guven E. (2016) A survey of data mining and machine learning methods for cyber security intrusion detection IEEE communication survey and totorials 18(2), 1153-1176

Biswas S. K. (2018) intrusion detection using machine learning: A comparison study. International Journal of pure and applied mathematics 118(19), 101-114

Y. Xin, Kong L., Liu Z., Chen Y., Zhu H., Gao M., Hou H., & Wang C. Machine learning and deep learning methods for cyber security. IEEE Access 6: 35365-35381 (2018)

N. Miloseivic, Denghantanh A., Choo K. K. R. Machine learning aided android malware classification. Computer and electrical engineering 61: 266-274. (2017).

B. Geluvaraj, Stawik P. M., Kumar T. A. the future of cyber security: the major role of Artificial intelligence, Machine learning and deep learning in cyber space. International conference on computer network and communication technologies Springer Singapore. 739-747. (2019)

H. Mohammed B., Vinaykumar R., Soman K. P. A short review on applications of deep learning for cyber security (2018).

M. Rege, Mbah R. B. K. Machine learning for cyber defense and attack. in the 7th International conference on data analysis 73-78 (2018).

D. Ding, Hang Q. L., Xing Y., Ge X., and Zhang X. M. A survey on security control and attack detection for industrial cyber physical system. Neuro-computing. 275. 1674-1683. (2018).

D. Berman S., Buczak A. L., Chavis J. S., Corbelt C. L. A survey of deep learning methods for cyber security information 10(4): (2018).

Y. Wang, Ye Z., Wan P., Zhao J. A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio network. Artificial intelligence review. 51(3): 413-506 (2019).

A. Abubakar, Paranggono B. Machine learning based intrusion detection system for software defined networks. 7th International conference on Emerging security techniques IEEE. 138-143. (2017).

S. Jose, Malathi D., Reddy B., Jayaseeli D. A survey on anomaly based host intrusion detection system. Journal of physics. Conference series 1000(1): (2018).

S. Dey, Ye Q., Sampalli S. A Machine learning based intrusion detection scheme for data fusion in mobile cloud involving heterogeneous clients network. Information fussion 49: 205-215. (2019).

P. Deshpande, Sharma S. C., Peddoju S. K., Junaid S. HIDS: a host based intrusion detection system for cloud computing environment. International journal of system assuarance engineering and management. 9(3): 567-576. (2018).

M. Nobakht, Sivaraman V., Boreli R. A host-Based Intrusion detection and mitigation framework for smart IoT using open flow in 11th International conference on availability reliability and security IEEE. 147-156. (2016).

A. Meshram, Christian H. Anomaly detection in industrial networks using machine learning: A road map. Machine learning for cyber physical system Springer Berlin Heldelberg. 65-72. (2017).

R. Devakunchari, Souraba, Prakhar M. A study of cyber security using machine learning techniques. International journal of innovative technology and exploring engineering. 8(7): 183-186. (2019)

E. Alison N. FLUF: fuzzy logic utility framework to support computer network defense decision making IEEE (2016).

A. Taylor, Leblanc S., Japkowicz N. Anomaly detection in auto-mobile control network data with long short term memory network in data science and advance analytics. IEEE international conference. 130-139. (2016).

O. Amosov S., Ivan Y. S., Amosovo S. G. Recognition of abnormal traffic using deep neural networks and fuzzy logic. International Multi-conference on industrial engineering and modern technologies IEEE (2019).

M. Gyun L. Artificial Intelligence for development series: Report on AI and IoT in Security Aspect. (2018).

L. Matt. Rise of machine: machine learning & its cybersecurity applications, NCC group white paper (2017).

National cyber security center UK,

A. Nuril, Supriyanto (2019) Forensic Authentication of WhatsApp Messenger Using the Information Retrieval Approach. International Journal of Cyber Security and Digital Forensics (IJCSDF) 8(3): 206-212. (2019).

A Marfianto, I Riadi. WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method. International Journal of Cyber Security and Digital Forensics (IJCSDF) 7(3): 319-327. (2018).

N Anwar, I. Riadi. Forensic Investigative Analysis of WhatsApp Messenger Smartphone Against WhatsApp Web-Based, Journal Information Technology Electromagnetic Computing and Information, 3(1): 1-10. (2017).

S. Ikhsani and C. Hidayanto, Whatsapp and LINE Messenger Forensic Analysis with Strong and Valid Evidence in Indonesia. Tek. ITS, 5(2): 728-736. (2016).

M. Ashawa, S. Morris. Analysis of Android Malware Detection Techniques: A Systematic Review. International Journal of Cyber Security and Digital Forensics (IJCSDF) 8(3): 177-187. (2019).

W. Songyang, Wang, P., Zhang, Y. Effective detection of android malware based on the usage of data flow APIs and machine learning: Information and Software Technology, 75: 17--25 (2016).

Anastasia, S., Gamayunov, D.: Review of the mobile malware detection approaches: Parallel, Distributed and Network-Based Processing (PDP). In: Proc. 2015. IEEE 23rd Euro micro International Conference, pp. 600--603(2015).

D. Anusha, Troia, F. D., Visaggio, C. A., Austin, T. H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 13(1) 1-12 (2017)

S. Morgan, (2017). Cyber security Business Report. Retrieved from CSO: y-2019.html

R. Collier, (2017). NHS ransomware attack spreads worldwide. CMAJ, 189(22), 786-787.

H. Trisnasenjaya, I. Riadi Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework. International Journal of Cyber Security and Digital Forensics (IJCSDF) 8(1): 89-97. (2019).

H. Parag Rughani. Artificial Intelligence Based Digital Forensics Framework. International Journal of Advanced Research in Computer Science. 8(8): 10-14. (2017)

2016: Current State of Cybercrime, RSA Whitepaper, 2016

World Internet Users and 2017 Population Stats, accessed from http://

R. Mark. Computer forensics: Basics. Lecture note Purdue University (2004)

Ibrahim Goni & Ahmed L.(2015) Propose Neuro-Fuzzy-Genetic Intrusion Detection System International Journal of Computer Applications Vol. 115 No.8 available online at



  • There are currently no refbacks.
Copyright © 2020 Ibrahim Goni, Jerome Mishion Gumpy, Timothy Umar Maigari Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.