Evaluating the effectiveness of machine learning algorithms in detecting malicious traffic on corporate networks
DOI:
https://doi.org/10.69849/yptp6153Keywords:
Machine Learning, Malicious traffic, Network security, Corporate networks, Intrusion detectionAbstract
The growing complexity of cyber threats imposes significant challenges on organizations that rely on digital infrastructures for their operations. Traditional signature-based intrusion detection methods have proven limited against sophisticated and dynamic attacks, especially those enhanced by automated techniques. In this context, Machine Learning algorithms emerge as a promising alternative for identifying anomalous patterns in network traffic. This article aims to evaluate the effectiveness of Machine Learning algorithms in detecting malicious traffic in corporate networks through a qualitative bibliographic research grounded in scientific literature from the last twenty years. The analysis encompasses comparative studies on the performance of supervised and unsupervised models, evaluation metrics, and practical implementation limitations. Results indicate that models based on supervised learning exhibit high predictive performance; however, they face challenges related to scalability, explainability, and adaptation to zero-day attacks. It is concluded that the effectiveness of these algorithms depends not only on the computational architecture adopted but also on organizational maturity and corporate data governance.
References
BIGGIO, Battista; ROLI, Fabio. Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, v. 84, p. 317-331, 2018.
BRUNDAGE, Miles et al. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Oxford: Future of Humanity Institute, 2018.
BUCZAK, Anna L.; GUVEN, Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, v. 18, n. 2, p. 1153-1176, 2016.
CHANDOLA, Varun; BANERJEE, Arindam; KUMAR, Vipin. Anomaly detection: A survey. ACM Computing Surveys, v. 41, n. 3, p. 1-58, 2009.
GOODFELLOW, Ian; BENGIO, Yoshua; COURVILLE, Aaron. Deep learning. Cambridge: MIT Press, 2016.
KHAN, Muhammad Afzal et al. A survey of machine learning-based network intrusion detection systems. IEEE Access, v. 7, p. 70926-70950, 2019.
SIENA, Osmar. Metodologia da pesquisa científica: elementos para elaboração e apresentação de trabalhos acadêmicos. Porto Velho: [s.n.], 2007. Disponível em: http://www.mestradoadm.unir.br/site_antigo/doc/manualdetrabalhoacademicoatual.pdf. Acesso em: 10 de janeiro de 2013.
SOMMER, Robin; PAXSON, Vern. Outside the closed world: On using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2010. p. 305-316.
STALLINGS, William. Network security essentials: Applications and standards. 6. ed. Boston: Pearson, 2017.
VERKERKEN, Dries et al. A survey on distributed machine learning for intrusion detection systems. IEEE Communications Surveys & Tutorials, v. 24, n. 1, p. 501-534, 2022.
VINAYAKUMAR, R. et al. Deep learning approach for intelligent intrusion detection system. IEEE Access, v. 7, p. 41525-41550, 2019.
ZHANG, Jian et al. Network anomaly detection: A survey and comparative analysis of stochastic and deterministic methods. Computer Networks, v. 51, n. 12, p. 3440-3462, 2007.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Cleilson Lopes Monteiro, Viviane dos Santos Almeida, Thiago Amaral Guarnieri, Dhiodines Fabrício Souza da Costa, Carlos Eduardo de Souza Santos, Renato do Nascimento, Cristino Corrêa Jordão (Autor)

This work is licensed under a Creative Commons Attribution 4.0 International License.
"Os Autores que publicam nesta revista concordam com os seguintes termos:
-
Os Autores mantêm os direitos autorais e concedem à revista o direito de primeira publicação, com o trabalho simultaneamente licenciado sob a licença Creative Commons Attribution 4.0 International (CC BY 4.0). Esta licença permite que o trabalho seja compartilhado, copiado e adaptado em qualquer suporte ou formato, para qualquer fim, inclusive comercial, desde que seja atribuído o devido crédito de autoria e de publicação inicial nesta revista.
-
Os Autores têm autorização para assumir compromissos contratuais adicionais separadamente, para a distribuição não-exclusiva da versão do trabalho publicada nesta revista (ex.: publicar em repositório institucional ou como capítulo de livro), com reconhecimento de autoria e publicação inicial nesta revista.
-
A revista permite e incentiva os autores a publicar e distribuir seu trabalho online (ex.: em repositórios institucionais ou na sua página pessoal) após o processo de edição e publicação, pois isso pode gerar alterações produtivas, bem como aumentar o impacto e a citação do trabalho publicado."