Machine Learning and Cybersecurity—Trends and Future Challenges
1. Research Highlights
1.1. Intrusion Detection and Adversarial Resilience
- Contribution 1 develops a genetic algorithm-driven feature selection method for automated network incident identification, improving intrusion detection accuracy.
- Contribution 2 introduces a robust intrusion detection system for 5G networks, based on Extremely Randomized Trees and Infinite Feature Selection, designed to withstand adversarial attacks.
- Contribution 3 evaluates multi-class SVM approaches for network traffic classification on the UWF-ZeekData dataset, offering insights into efficient ML deployment for cybersecurity.
1.2. Phishing, Web Security, and Application-Layer Threats
- Contribution 4 presents a systematic review of deep learning techniques for phishing email detection, outlining the strengths and challenges of applying DL to large-scale, real-time email defense.
- Contribution 5 proposes machine learning models for SQL injection detection, advancing web application security with predictive and adaptive defenses.
1.3. Cyber–Physical and Automotive Security
- Contribution 6 employs unsupervised learning to detect false information attacks in vehicular ad hoc networks (VANETs), enhancing trust in connected vehicle ecosystems.
- Contribution 7 reviews the cybersecurity of automotive wired networking systems, highlighting evolving threats to Ethernet and CAN buses and proposing countermeasures supported by ML-driven monitoring.
- Contribution 8 applies CNN-based image deep learning for detecting DNS amplification distributed reflection denial-of-service (DRDoS) attacks, advancing automated mitigation of large-scale disruptions.
1.4. Cloud and Container Security
- Contribution 9 introduces an eBPF-based runtime security framework combined with ML to detect cryptojacking in containerized environments, offering a lightweight and real-time defense mechanism for cloud-native infrastructures.
1.5. Large-Scale Risk and Public-Sector Security
- Contribution 10 applies ML to quantify cyber risk across 7000 municipalities, providing a nationwide perspective on vulnerabilities in local public administrations and their potential role in compromising national infrastructure.
2. Future Outlook
- Resilient ML models: Developing algorithms resistant to adversarial attacks, spoofing, and poisoning is critical for safeguarding trust.
- Multi-modal and cross-domain integration: Extending ML applications from biometrics to networks, automotive systems, and cloud containers underscores the need for adaptable, multi-layered defenses.
- Transparent and explainable AI: Interpretability of ML-based security decisions remains essential for compliance, ethics, and operational trust.
- Privacy-by-design frameworks: Future systems must balance powerful data-driven learning with strong guarantees of user privacy and regulatory compliance.
- Cyber–physical security: Emerging areas such as VANETs, automotive Ethernet, and municipal cyber-risk analysis highlight the convergence of physical and digital security challenges.
Acknowledgments
Conflicts of Interest
List of Contributions
- Aksoy, A.; Valle, L.; Kar, G. Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection. Electronics 2024, 13, 293. https://doi.org/10.3390/electronics13020293.
- Baldini, G. Mitigation of Adversarial Attacks in 5G Networks with a Robust Intrusion Detection System Based on Extremely Randomized Trees and Infinite Feature Selection. Electronics 2024, 13, 2405. https://doi.org/10.3390/electronics13122405.
- Krebs, R.; Bagui, S.S.; Mink, D.; Bagui, S.C. Applying Multi-Class Support Vector Machines: One-vs.-One vs. One-vs.-All on the UWF-ZeekDataFall22 Dataset. Electronics 2024, 13, 3916. https://doi.org/10.3390/electronics13193916.
- Kyaw, P.H.; Gutierrez, J.; Ghobakhlou, A. A Systematic Review of Deep Learning Techniques for Phishing Email Detection. Electronics 2024, 13, 3823. https://doi.org/10.3390/electronics13193823.
- Rosca, C.-M.; Stancu, A.; Popescu, C. Machine Learning Models for SQL Injection Detection. Electronics 2025, 14, 3420. https://doi.org/10.3390/electronics14173420.
- Borah, A.; Paranjothi, A. Enhancing VANET Security: An Unsupervised Learning Approach for Mitigating False Information Attacks in VANETs. Electronics 2025, 14, 58. https://doi.org/10.3390/electronics14010058.
- Canino, N.; Dini, P.; Mazzetti, S.; Rossi, D.; Saponara, S.; Soldaini, E. Cybersecurity of Automotive Wired Networking Systems: Evolution, Challenges, and Countermeasures. Electronics 2025, 14, 471. https://doi.org/10.3390/electronics14030471.
- Shin, H.; Jeong, J.; Cho, K.; Lee, J.; Kwon, O.; Shin, D. Detection of Domain Name Server Amplification Distributed Reflection Denial of Service Attacks Using Convolutional Neural Network-Based Image Deep Learning. Electronics 2025, 14, 76. https://doi.org/10.3390/electronics14010076.
- Kim, R.; Ryu, J.; Kim, S.; Lee, S.; Kim, S. Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning. Electronics 2025, 14, 1208. https://doi.org/10.3390/electronics14061208.
- Sanchez-Zurdo, J.; San-Martín, J. Beyond Geography and Budget: Machine Learning for Calculating Cyber Risk in the External Perimeter of Local Public Entities. Electronics 2025, 14, 3845. https://doi.org/10.3390/electronics14193845.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gharibi, W. Machine Learning and Cybersecurity—Trends and Future Challenges. Electronics 2025, 14, 4007. https://doi.org/10.3390/electronics14204007
Gharibi W. Machine Learning and Cybersecurity—Trends and Future Challenges. Electronics. 2025; 14(20):4007. https://doi.org/10.3390/electronics14204007
Chicago/Turabian StyleGharibi, Wajeb. 2025. "Machine Learning and Cybersecurity—Trends and Future Challenges" Electronics 14, no. 20: 4007. https://doi.org/10.3390/electronics14204007
APA StyleGharibi, W. (2025). Machine Learning and Cybersecurity—Trends and Future Challenges. Electronics, 14(20), 4007. https://doi.org/10.3390/electronics14204007