TY - GEN
T1 - Cyber Threat Detection System Using Gradient Boosted Decision Tree
AU - Jha, Sruti
AU - Kumar, Abhimanyu
AU - Rath, Ashutosh
AU - Yang, Tiansheng
AU - Rathore, Rajkumar Singh
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2026.
PY - 2026/1/15
Y1 - 2026/1/15
N2 - Cyber threats are constantly changing, they put digital infrastructure at risk. This research uses XGBoost, a cutting-edge machine learning algorithm, to improve the capabilities of cyber threat detection. We hope to create a threat detection system that has both high accuracy and effectiveness by utilizing XGBoost's remarkable performance in managing sizable, complex datasets and its capacity to identify patterns that are complex in network transactions. A huge dataset of network traffic, that includes both benign and malicious activity, will be used to train the suggested system. We will evaluate the accuracy of the model in classifying cyber threats, such as malware attacks, phishing attempts, and advanced persistent threats, through thorough evaluation as well as testing. Once this XGBoost-powered system is successfully deployed, businesses will have a strong impact.
AB - Cyber threats are constantly changing, they put digital infrastructure at risk. This research uses XGBoost, a cutting-edge machine learning algorithm, to improve the capabilities of cyber threat detection. We hope to create a threat detection system that has both high accuracy and effectiveness by utilizing XGBoost's remarkable performance in managing sizable, complex datasets and its capacity to identify patterns that are complex in network transactions. A huge dataset of network traffic, that includes both benign and malicious activity, will be used to train the suggested system. We will evaluate the accuracy of the model in classifying cyber threats, such as malware attacks, phishing attempts, and advanced persistent threats, through thorough evaluation as well as testing. Once this XGBoost-powered system is successfully deployed, businesses will have a strong impact.
KW - Cyber threats
KW - Decision trees
KW - Machine learning
KW - XGBoost
KW - Z-score normalization
UR - https://www.scopus.com/pages/publications/105028789077
U2 - 10.1007/978-981-96-8104-4_37
DO - 10.1007/978-981-96-8104-4_37
M3 - Conference contribution
AN - SCOPUS:105028789077
SN - 9789819681037
T3 - Lecture Notes in Networks and Systems
SP - 567
EP - 577
BT - Proceedings of 6th Doctoral Symposium on Computational Intelligence - DoSCI 2025
A2 - Swaroop, Abhishek
A2 - Kansal, Vineet
A2 - Hassanien, Aboul Ella
PB - Springer Science and Business Media Deutschland GmbH
T2 - 6th Doctoral Symposium on Computational Intelligence, DoSCI 2025
Y2 - 28 March 2025 through 29 March 2025
ER -