Next Article in Journal
Evaluation of Power Requirement for a Self-Propelled Garlic Collector Based on Load Experiments and Variable Impact Analysis Under Various Operating Conditions
Previous Article in Journal
Coprime Distributed Array for Super-Resolution DOA Estimation
Previous Article in Special Issue
Artificial Intelligence in Maritime Cybersecurity: A Systematic Review of AI-Driven Threat Detection and Risk Mitigation Strategies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions

Department of Computer Science and Engineering, University of North Texas, Denton, TX 76205, USA
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(23), 4563; https://doi.org/10.3390/electronics14234563
Submission received: 7 October 2025 / Revised: 2 November 2025 / Accepted: 11 November 2025 / Published: 21 November 2025

Abstract

The convergence of ubiquitous connectivity, large-scale data generation, and rapid advancements in machine learning is transforming the field of cybersecurity. The widespread adoption of interconnected systems including Internet of Things devices, mobile platforms, and cloud infrastructures has introduced new attack surfaces and significantly increased the complexity of securing digital environments. Concurrently, these technologies have enabled the development of intelligent, data-driven defense strategies. Achieving effective protection in these settings requires not only applying machine learning to detect and prevent threats but also recognizing that such models can themselves become targets of adversarial manipulation. This survey presents a comprehensive analysis of recent progress at the intersection of machine learning and cybersecurity. It explores defensive applications such as malware detection, network traffic classification, and anomaly detection, as well as offensive strategies including adversarial evasion, poisoning, and backdoor attacks. Particular attention is paid to adversarial machine learning, highlighting the increasing sophistication of attacks that exploit model vulnerabilities and the corresponding evolution of defense mechanisms. Beyond synthesizing current research, the survey also identifies key open challenges and emerging research directions. This survey provides a comprehensive and accessible reference for researchers and practitioners aiming to understand and advance the secure application of machine learning across diverse cybersecurity domains.
Keywords: adversarial machine learning; trustworthy machine learning; responsible AI; malware detection; network traffic analysis; anomaly detection adversarial machine learning; trustworthy machine learning; responsible AI; malware detection; network traffic analysis; anomaly detection

Share and Cite

MDPI and ACS Style

He, Z.; Davila, D.; Bi, S.; Wang, T.; Hou, T. Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions. Electronics 2025, 14, 4563. https://doi.org/10.3390/electronics14234563

AMA Style

He Z, Davila D, Bi S, Wang T, Hou T. Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions. Electronics. 2025; 14(23):4563. https://doi.org/10.3390/electronics14234563

Chicago/Turabian Style

He, Zefeng, Diego Davila, Shengping Bi, Tao Wang, and Tao Hou. 2025. "Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions" Electronics 14, no. 23: 4563. https://doi.org/10.3390/electronics14234563

APA Style

He, Z., Davila, D., Bi, S., Wang, T., & Hou, T. (2025). Machine Learning for Cybersecurity: A Survey of Applications, Adversarial Challenges, and Future Research Directions. Electronics, 14(23), 4563. https://doi.org/10.3390/electronics14234563

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop