The Role of Data Science in Enhancing Web Security
Main Article Content
Abstract
With the rise of digital transformation, web security has become a critical concern for organizations, governments, and individuals. This study explores the role of data science in enhancing web security by leveraging machine learning algorithms and advanced analytics to predict and identify potential attacks in real-time. The main objective is to demonstrate how data-driven techniques, including predictive analytics, anomaly detection, and behavioral analysis, can be integrated into existing security frameworks to reduce vulnerabilities and strengthen defenses against cyber threats. The research gap addressed by this study lies in the insufficient application of comprehensive, data-driven methodologies for threat detection and classification in web security. The problem gap is the absence of integrated frameworks that combine feature engineering, classification models, and anomaly detection for both known and unknown threats. This study bridges these gaps by employing a structured dataset of web interactions to model, detect, and predict security threats using advanced data science techniques. Using a dataset of simulated web traffic and previous attack records, this research applies data preprocessing, feature engineering, and machine learning classification models, such as decision trees and random forests, to predict threat levels and identify anomalies. Results show that machine learning models can effectively classify threat levels, with a threat classification accuracy of 80 percent. This study contributes to the field by demonstrating how data science can improve web security practices, offering a proactive approach to detecting and mitigating cyber-attacks.
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
A. S. A. Alghawli and T. Radivilova, (2024), “Resilient cloud cluster with DevSecOps security model, automates a data analysis, vulnerability search and risk calculation,” Alexandria Engineering Journal, vol. 107, pp. 136–149, doi:10.1016/J.AEJ.2024.07.036. DOI: https://doi.org/10.1016/j.aej.2024.07.036
P. S. S. Kiran Gandikota, D. Valluri, S. B. Mundru, G. K. Yanala, and S. Sushaini, (2023), “Web Application Security through Comprehensive Vulnerability Assessment,” Procedia Computer Science, vol. 230, pp. 168–182, doi:10.1016/J.PROCS.2023.12.072. DOI: https://doi.org/10.1016/j.procs.2023.12.072
A. Sanmorino, (2023), “Emerging Trends in Cybersecurity for Health Technologies,” Jurnal Ilmiah Informatika Global, vol. 14, no. 3, pp. 76–81, doi:10.36982/JIIG.V14I3.3530. DOI: https://doi.org/10.36982/jiig.v14i3.3530
Y. Zahra and A. Sanmorino, (2024), “Exploring the Evolving Role of AI in Cybersecurity,” European Journal of Privacy Law & Technologies, vol. 0, no. 0.
A. Sanmorino, L. Marnisah, and H. Di Kesuma, (2024), “Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models,” Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16444–16449, doi:10.48084/ETASR.8362. DOI: https://doi.org/10.48084/etasr.8362
M. N. A. Ramadan, M. A. H. Ali, S. Y. Khoo, and M. Alkhedher, (2024), “AI-powered IoT and UAV systems for real-time detection and prevention of illegal logging,” Results in Engineering, vol. 24, p. 103277, doi:10.1016/J.RINENG.2024.103277. DOI: https://doi.org/10.1016/j.rineng.2024.103277
S. S. Shafin, (2024), “An Explainable Feature Selection Framework for Web Phishing Detection with Machine Learning,” Data Science and Management, doi:10.1016/J.DSM.2024.08.004. DOI: https://doi.org/10.1016/j.dsm.2024.08.004
G. Longo, F. Lupia, A. Merlo, F. Pagano, and E. Russo, (2025), “A data anonymization methodology for security operations centers: Balancing data protection and security in industrial systems,” Information Sciences, vol. 690, p. 121534, doi:10.1016/J.INS.2024.121534. DOI: https://doi.org/10.1016/j.ins.2024.121534
M. Althunayyan, A. Javed, and O. Rana, (2024), “A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning,” Vehicular Communications, vol. 49, p. 100837, doi:10.1016/J.VEHCOM.2024.100837. DOI: https://doi.org/10.1016/j.vehcom.2024.100837
A. Iftikhar, K. N. Qureshi, M. Shiraz, and S. Albahli, (2023), “Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 9, p. 101788, doi:10.1016/J.JKSUCI.2023.101788. DOI: https://doi.org/10.1016/j.jksuci.2023.101788
W. Serrano, (2024), “CyberAIBot: Artificial Intelligence in an Intrusion Detection System for CyberSecurity in the IoT,” Future Generation Computer Systems, p. 107543, doi:10.1016/J.FUTURE.2024.107543. DOI: https://doi.org/10.1016/j.future.2024.107543
M. L. Hernandez-Jaimes, A. Martinez-Cruz, K. A. Ramírez-Gutiérrez, and C. Feregrino-Uribe, (2023), “Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures,” Internet of Things, vol. 23, p. 100887, doi:10.1016/J.IOT.2023.100887. DOI: https://doi.org/10.1016/j.iot.2023.100887
A. Behera, K. S. Sahoo, T. K. Mishra, and M. Bhuyan, (2024), “A combination learning framework to uncover cyber attacks in IoT networks,” Internet of Things, vol. 28, p. 101395, doi:10.1016/J.IOT.2024.101395. DOI: https://doi.org/10.1016/j.iot.2024.101395
M. Al-Hawawreh and N. Moustafa, (2024), “Explainable deep learning for attack intelligence and combating cyber–physical attacks,” Ad Hoc Networks, vol. 153, p. 103329, doi:10.1016/J.ADHOC.2023.103329. DOI: https://doi.org/10.1016/j.adhoc.2023.103329
T. Sasi, A. H. Lashkari, R. Lu, P. Xiong, and S. Iqbal, (2024), “A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges,” Journal of Information and Intelligence, vol. 2, no. 6, pp. 455–513, doi:10.1016/J.JIIXD.2023.12.001. DOI: https://doi.org/10.1016/j.jiixd.2023.12.001