Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
It is an undeniable fact that currently
information is a pretty significant
presence for all companies or
organizations. Therefore protecting its
security is crucial and the security
models driven by real datasets has
become quite important. The operations
based on military, government,
commercial and civilians are linked to
the security and availability of computer
systems and network. From this point of
security, the network security is a
significant issue because the capacity of
attacks is unceasingly rising over the
years and they turn into be more
sophisticated and distributed. The
objective of this review is to explain and
compare the most commonly used
datasets. This paper focuses on the
datasets used in artificial intelligent and
machine learning techniques, which are
the primary tools for analyzing network
traffic and detecting abnormalities.
Keywords—ML algorithms over Cyber
Security, Random Forest (RF), SVM,
Logistic Regression(LR), Decision Tree
(DT), Naive Bayes Algorithm, Boosting.
Keywords:
Cybersecurity Datasets
Cite Article:
"INVESTIGATION OF PERFORMANCE OF MACHINE LEARNING ALGORITHMS OVER CYBER SECURITY DATASETS", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2455-2631, Vol.10, Issue 8, page no.b255-b261, August-2025, Available :http://www.ijrti.org/papers/IJRTI2508133.pdf
Downloads:
000627
ISSN:
2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator