MACHINE LEARNING DRIVEN NETWORK TRAFFIC ANALYSIS FOR CYBERSECURITY: A COMPARATIVE STUDY OF SUPERVISED AND UNSUPERVISED LEARNING APPROACHES

Authors

  • Abdulrahman Tunde Alabelewe
    Airforce Institute of Technology, Kaduna
  • Nasir Shinkafi
    Galaxy Backbone Limited
  • Samson Adeyinka
    Airforce Institute of Technology, Kaduna
  • Suleiman Abu Usman
    Airforce Institute of Technology, Kaduna
  • Maryam Safiyanu Masari
    Airforce Institute of Technology, Kaduna
  • Muhammad Auwal Bello
    Airforce Institute of Technology, Kaduna
  • Joshua Yakubu Anche
    Airforce Institute of Technology, Kaduna

Keywords:

Machine Learning, , Network Traffic Analysis, Anomaly Detection, Supervised Learning, Unsupervised Learning

Abstract

This study looks at how well machine learning (ML) methods work in cybersecurity, focusing on their ability to tell apart malicious and normal network traffic. Using the CICIDS2017 dataset, we compare supervised learning models like Random Forest and Support Vector Machines with unsupervised techniques such as K-means clustering and Isolation Forest. We evaluate their performance using multiple metrics, including accuracy, precision, recall, F1-score, and cluster validity indices, to find the most effective approach for spotting anomalies in network data. The results show that Random Forest delivers the best overall performance, achieving over 99.4% accuracy with very few false negatives. Meanwhile, unsupervised methods excel at detecting new, previously unseen patterns without needing labeled data. In particular, the Isolation Forest model achieves a recall of 93%, making it highly effective at identifying anomalies. K-means clustering also performs well, clearly separating traffic patterns with strong Silhouette scores (0.8622) and favorable Davies-Bouldin indices (0.6063).

Author Biography

Nasir Shinkafi

Group Head of Technical Services, Galaxy Backbone Limited

Dimensions

Alloghani, M., Al-Jumeily, D., Mustafina, J., Hussain, A., & Aljaaf, A. J. (2020). A systematic review on supervised and unsupervised machine learning algorithms for data science. Supervised and Unsupervised Learning for Data Science, 3–21.

Alom, M. Z., & Taha, T. M. (2017). Network intrusion detection for cyber security using unsupervised deep learning approaches. 2017 IEEE National Aerospace and Electronics Conference (NAECON), 63–69. https://doi.org/10.1109/NAECON.2017.8268746

Bin Sarhan, B., & Altwaijry, N. (2023). Insider Threat Detection Using Machine Learning Approach. Applied Sciences, 13(1). https://doi.org/10.3390/app13010259

Bohara, A., Noureddine, M. A., Fawaz, A., & Sanders, W. H. (2017). An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement. 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 224–233. https://doi.org/10.1109/SRDS.2017.31

Chen, S., Webb, G. I., Liu, L., & Ma, X. (2020). A novel selective naïve Bayes algorithm. Knowledge-Based Systems, 192, 105361. https://doi.org/https://doi.org/10.1016/j.knosys.2019.105361

Jony, A. I., & Arnob, A. K. B. (2024). Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset. International Journal of Information Technology and Computer Science, 16(4), 56–65. https://doi.org/10.5815/ijitcs.2024.04.04

Kim, S., & Park, K. J. (2021). A survey on machine-learning based security design for cyber-physical systems. Applied Sciences (Switzerland), 11(12). https://doi.org/10.3390/app11125458

Korteling, J. E. (Hans), van de Boer-Visschedijk, G. C., Blankendaal, R. A. M., Boonekamp, R. C., & Eikelboom, A. R. (2021). Human-versus artificial intelligence. Frontiers in Artificial Intelligence, 4, 622364.

Maikano, F. A. (2024). 8 Machine Learning Approaches for Cyber Bullying Detection in Hausa Language Social Media: a Comprehensive Review and Analysis. MACHINE LEARNING APPROACHES… Maikano FJS FUDMA Journal of Sciences (FJS, 8(3), 344–348. https://doi.org/10.33003/fjs-2024-0803-2517

Murtagh, F., & Contreras, P. (2017). Algorithms for hierarchical clustering: an overview, II. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(6), e1219.

Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., & Mohammad, R. M. (2023). Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. Journal of Sensor and Actuator Networks, 12(2). https://doi.org/10.3390/jsan12020029

Sakhai, M., & Wielgosz, M. (2021). Modern Cybersecurity Solution using Supervised Machine Learning. http://arxiv.org/abs/2109.07593

Tao, X., Peng, Y., Zhao, F., Zhao, P., & Wang, Y. (2018). A parallel algorithm for network traffic anomaly detection based on Isolation Forest. International Journal of Distributed Sensor Networks, 14, 155014771881447. https://doi.org/10.1177/1550147718814471

Random Forest Confusion Matrix

Published

15-10-2025

How to Cite

Alabelewe, A. T., Shinkafi, N., Adeyinka, S., Usman, S. A., Masari, M. S., Bello, M. A., & Anche, J. Y. (2025). MACHINE LEARNING DRIVEN NETWORK TRAFFIC ANALYSIS FOR CYBERSECURITY: A COMPARATIVE STUDY OF SUPERVISED AND UNSUPERVISED LEARNING APPROACHES. FUDMA JOURNAL OF SCIENCES, 9(10), 348-354. https://doi.org/10.33003/fjs-2025-0910-3752

How to Cite

Alabelewe, A. T., Shinkafi, N., Adeyinka, S., Usman, S. A., Masari, M. S., Bello, M. A., & Anche, J. Y. (2025). MACHINE LEARNING DRIVEN NETWORK TRAFFIC ANALYSIS FOR CYBERSECURITY: A COMPARATIVE STUDY OF SUPERVISED AND UNSUPERVISED LEARNING APPROACHES. FUDMA JOURNAL OF SCIENCES, 9(10), 348-354. https://doi.org/10.33003/fjs-2025-0910-3752

Most read articles by the same author(s)