Cybersecurity Incidents on Digital Infrastructure and Industrial Networks

Authors

  • Victoria Abosede Ogunsanya, Adetomiwa Adesokan, Ifeoma Eleweke, Augustine Udoka Obu, Rasheed Afolabi, Rianat Abbas

Keywords:

Cybersecurity incidents, digital infrastructure, industrial networks, anomaly detection, machine learning, network security, DDoS attacks.

Abstract

Cybersecurity incidents pose significant threats to digital infrastructure and industrial networks,leading to operational disruptions, financial losses, and data breaches. With the increasing sophistication of cyberattacks, including DDoS attacks, malware infiltration, and unauthorized access, it is crucial to develop efficient detection mechanisms to safeguard critical systems. This study applies unsupervised machine learning, specifically K-Means clustering, to detect cybersecurity anomalies within network traffic data. By analyzing key network flow features, such as Flow Bytes/s, Packet Length, and Flow Inter-Arrival Time (IAT), this study aims to classify
normal and abnormal traffic patterns to enhance cybersecurity monitoring.

References

Abbas, R., Ogunsanya, V A., Nwanyim, S J., Afolabi, R., Kagame, R., Akinsola, A., Clement. T. (2024). Leveraging Machine Learning to Strengthen Network Security and Improve Threat Detection in Blockchain for Healthcare Systems. International Journal of Scientific and Management Research. 8 (2), 147-165

Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information, 15(11), 682.

Downloads

Published

2025-03-22

How to Cite

Victoria Abosede Ogunsanya, Adetomiwa Adesokan, Ifeoma Eleweke, Augustine Udoka Obu, Rasheed Afolabi, Rianat Abbas. (2025). Cybersecurity Incidents on Digital Infrastructure and Industrial Networks . Journal of Computational Analysis and Applications (JoCAAA), 34(3), 85–106. Retrieved from https://eudoxuspress.com/index.php/pub/article/view/2192

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.