An Integrated Framework for Data Security Using Advanced Machine Learning Classification and Best Practices
Abstract
In the current interconnected digital environment, data security has become a paramount concern, as cyberattacks and data breaches are increasing in frequency and complexity. Both organizations and people face challenges in safeguarding sensitive information, requiring resilient security systems that can adjust to various threats. This paper presents a comprehensive approach to data security, focusing on integrating advanced classification techniques and best practices to secure data proactively. This study uses and analyzes advanced classification algorithms like decision trees, support vector machines (SVM), and neural networks to determine how well they work to find, sort, and keep sensitive data safe across various security needs. The results indicate substantial improvements in classification accuracy, with the optimal model attaining an accuracy rate of 98.83%. The other models, including decision tress and SVM provide 89% and 92% accuracy, respectively. This highlights the dependability and resilience of these methods in detecting possible security concerns across various datasets. In addition to these classification results, we comprehensively analyze industry best practices in data security, encompassing encryption technologies, dynamic access control, and continuous monitoring to mitigate vulnerabilities and improve threat detection. Integrating sophisticated classification methodologies with these optimal practices provides a comprehensive security framework that enhances data protection and mitigates risk. This study offers significant insights for practitioners and organizations aiming to implement a more systematic and efficient data security approach, enhancing academic and practical discussions in this domain. This work seeks to strengthen the effectiveness of data security practices by introducing a novel method that integrates high-accuracy categorization with proactive security protocols.References
C. Thapa and S. Camtepe, "Precision health data: Requirements, challenges and existing techniques for data security and privacy," Computers in Biology and Medicine, vol. 129, pp. 104130, 2021.
Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, no. 6, pp. 1333, 2023.
D. Dasgupta, Z. Akhtar, and S. Sen, "Machine learning in cybersecurity: a comprehensive survey," The Journal of Defense Modeling and Simulation, vol. 19, no. 1, pp. 57--106, 2022.
I. H. Sarker, "Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions," SN Computer Science, vol. 2, no. 6, pp. 420, 2021.
W. Ahmad, A. Rasool, A. R. Javed, T. Baker, and Z. Jalil, "Cyber security in IoT-based cloud computing: A comprehensive survey," Electronics, vol. 11, no. 1, pp. 16, 2021.
W. S. Admass, Y. Y. Munaye, and A. A. Diro, "Cyber security: State of the art, challenges and future directions," Cyber Security and Applications, vol. 2, pp. 100031, 2024.
Z. Zhang, H. Al Hamadi, E. Damiani, C. Y. Yeun, and F. Taher, "Explainable artificial intelligence applications in cyber security: State-of-the-art in research," IEEE Access, vol. 10, pp. 93104--93139, 2022.
A. B. Ige, E. Kupa, and O. Ilori, "Analyzing defense strategies against cyber risks in the energy sector: Enhancing the security of renewable energy sources," International Journal of Science and Research Archive, vol. 12, no. 1, pp. 2978--2995, 2024.
A. B. Ige, E. Kupa, and O. Ilori, "Best practices in cybersecurity for green building management systems: Protecting sustainable infrastructure from cyber threats," International Journal of Science and Research Archive, vol. 12, no. 1, pp. 2960--2977, 2024.
R. Kaur, D. Gabrijelčič, and T. Klobučar, "Artificial intelligence for cybersecurity: Literature review and future research directions," Information Fusion, vol. 97, pp. 101804, 2023.
Z. Yang, X. Liu, T. Li, D. Wu, J. Wang, Y. Zhao, and H. Han, "A systematic literature review of methods and datasets for anomaly-based network intrusion detection," Computers & Security, vol. 116, pp. 102675, 2022.
A. Fatani, A. Dahou, M. A. Al-Qaness, S. Lu, and M. A. Elaziz, "Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system," Sensors, vol. 22, no. 1, pp. 140, 2021.
X. Sun, F. R. Yu, and P. Zhang, "A survey on cyber-security of connected and autonomous vehicles (CAVs)," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6240--6259, 2021.
S. Nifakos, K. Chandramouli, C. K. Nikolaou, P. Papachristou, S. Koch, E. Panaousis, and S. Bonacina, "Influence of human factors on cyber security within healthcare organisations: A systematic review," Sensors, vol. 21, no. 15, pp. 5119, 2021.
A. U. R. Butt, T. Mahmood, T. Saba, S. O. Bahaj, F. S. Alamri, M. W. Iqbal, and A. R. Khan, "An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment," IEEE Access, 2023.
M. I. Khan, A. Imran, A. H. Butt, A. U. R. Butt, et al., "Activity Detection of Elderly People Using Smartphone Accelerometer and Machine Learning Methods," International Journal of Innovations in Science & Technology, vol. 3, no. 4, pp. 186--197, 2021.
M. Ghiasi, T. Niknam, Z. Wang, M. Mehrandezh, M. Dehghani, and N. Ghadimi, "A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future," Electric Power Systems Research, vol. 215, pp. 108975, 2023.
D. Chen, P. Wawrzynski, and Z. Lv, "Cyber security in smart cities: a review of deep learning-based applications and case studies," Sustainable Cities and Society, vol. 66, pp. 102655, 2021.
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, "Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning," IEEE Access, vol. 10, pp. 40281--40306, 2022.
Z. Zhang, H. Ning, F. Shi, F. Farha, Y. Xu, J. Xu, F. Zhang, and K.-K. R. Choo, "Artificial intelligence in cyber security: research advances, challenges, and opportunities," Artificial Intelligence Review, pp. 1--25, 2022.
A. Khraisat and A. Alazab, "A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges," Cybersecurity, vol. 4, pp. 1--27, 2021.
T. O. Oladoyinbo, O. O. Adebiyi, J. C. Ugonnia, O. O. Olaniyi, and O. J. Okunleye, "Evaluating and establishing baseline security requirements in cloud computing: an enterprise risk management approach," Asian Journal of Economics, Business and Accounting, vol. 23, no. 21, pp. 222--231, 2023.
R. Vallabhaneni, S. E. V. S. Pillai, S. A. Vaddadi, S. R. Addula, and B. Ananthan, "Secured web application based on CapsuleNet and OWASP in the cloud," Indonesian Journal of Electrical Engineering and Computer Science, vol. 35, no. 3, pp. 1924--1932, 2024.
M. K. Hasan, A. K. M. A. Habib, Z. Shukur, F. Ibrahim, S. Islam, and M. A. Razzaque, "Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations," Journal of Network and Computer Applications, vol. 209, pp. 103540, 2023.
I. H. Sarker, M. H. Furhad, and R. Nowrozy, "AI-driven cybersecurity: an overview, security intelligence modeling and research directions," SN Computer Science, vol. 2, no. 3, pp. 173, 2021.
M. A. Ferrag, O. Friha, L. Maglaras, H. Janicke, and L. Shu, "Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis," IEEE Access, vol. 9, pp. 138509--138542, 2021.
DOI:
https://doi.org/10.31449/inf.v49i12.7838Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







