DSpace Repository

An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review

Show simple item record

dc.contributor.author John Kavoi, Dominic
dc.contributor.author Jumaa Katila, Charles
dc.contributor.author Richard, Otieno Omollo
dc.date.accessioned 2026-02-20T12:00:57Z
dc.date.available 2026-02-20T12:00:57Z
dc.date.issued 2025-07
dc.identifier.citation Kavoi, D.J., Katila, C.J. and Omollo, R.O. (2025) An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review. Journal of Information Security, 16, 406-436. https://doi.org/10.4236/jis.2025.163021 en_US
dc.identifier.issn Online: 2153-1242
dc.identifier.issn Print: 2153-1234
dc.identifier.uri DOI: 10.4236/jis.2025.163021
dc.identifier.uri https://repository.cuk.ac.ke/handle/123456789/1894
dc.description A research article published in the scientific research an academic publisher. en_US
dc.description.abstract In the current technological landscape, a lot of risks are present due to the availability of existing and novel kinds of attacks. For these attacks to be countered, systems that identify all the variants without any false positives and false negatives are in high demand. The existence of traditional attack detection methods, such as the signature-based algorithms, has proven that they cannot spot new attacks. This is because they work based on a database that has signatures of attacks. The other methods of detecting attacks that have been explored in this study are the hybrid and machine learning methods for detecting zero-day attacks. In this research, we are coming up with an ensemble set of machine learning algorithms that identify novel and existing attacks in real time from an existing dataset. All of these concepts are mainly based on the Confidentiality, Integrity and Availability (CIA) triad. In order to come up with this, the main method of deployment to be used is the machine learning pipeline. The study has a firm foundation based on theorems such as Bayes and the fundamental principles of computational learning theory. This is composed of stages such as the identification, cleaning, analysis and feature engineering of the data. From there, the ensemble algorithm will be implemented, its accuracy measured and then tuned to improve its efficiency. en_US
dc.language.iso en en_US
dc.publisher Scientific Research en_US
dc.relation.ispartofseries Volume 16;No.3
dc.subject Zero-Day Attacks. en_US
dc.subject Machine Learning. en_US
dc.subject Ensemble Algorithms. en_US
dc.subject Cybersecurity. en_US
dc.subject Anomaly Detection. en_US
dc.subject Intrusion Detection Systems (IDS). en_US
dc.subject CAN Bus Dataset. en_US
dc.subject Data Analysis. en_US
dc.title An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account