Evaluating the effectiveness of machine learning algorithms in detecting malicious traffic on corporate networks

Authors

DOI:

https://doi.org/10.69849/yptp6153

Keywords:

Machine Learning, Malicious traffic, Network security, Corporate networks, Intrusion detection

Abstract

The growing complexity of cyber threats imposes significant challenges on organizations that rely on digital infrastructures for their operations. Traditional signature-based intrusion detection methods have proven limited against sophisticated and dynamic attacks, especially those enhanced by automated techniques. In this context, Machine Learning algorithms emerge as a promising alternative for identifying anomalous patterns in network traffic. This article aims to evaluate the effectiveness of Machine Learning algorithms in detecting malicious traffic in corporate networks through a qualitative bibliographic research grounded in scientific literature from the last twenty years. The analysis encompasses comparative studies on the performance of supervised and unsupervised models, evaluation metrics, and practical implementation limitations. Results indicate that models based on supervised learning exhibit high predictive performance; however, they face challenges related to scalability, explainability, and adaptation to zero-day attacks. It is concluded that the effectiveness of these algorithms depends not only on the computational architecture adopted but also on organizational maturity and corporate data governance.

Author Biographies

  • Cleilson Lopes Monteiro, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: cleilsonmontteiro@gmail.com, lattes: https://lattes.cnpq.br/4881886811613821

  • Viviane dos Santos Almeida, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Docente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: vivianealmeida.edu@gmail.com,  lattes: https://lattes.cnpq.br/6234559329439208

  • Thiago Amaral Guarnieri, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: thiago.guarnieri@gmail.com, lattes: https://lattes.cnpq.br/4819463147196353

  • Dhiodines Fabrício Souza da Costa, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: dh.iodines@hotmail.com, lattes: https://lattes.cnpq.br/9404784729905383

  • Carlos Eduardo de Souza Santos, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: eduardopires99@gmail.com, lattes: https://lattes.cnpq.br/4081573005681428

  • Renato do Nascimento, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: renatodonascimento@live.com, lattes: https://lattes.cnpq.br/9873039236611224

  • Cristino Corrêa Jordão, Instituto Federal de Educação, Ciência e Tecnologia de Mato Grosso (IFMT), Campus Cuiabá, Cuiabá, MT, Brasil.

    Discente do Curso de Especialização em Redes e Computação Distribuída do Instituto Federal de Ciência e Tecnologia do Mato Grosso, Campus Cuiabá, e-mail: cristino07jordao@gmail.com, lattes: https://lattes.cnpq.br/1881454363188440

References

BIGGIO, Battista; ROLI, Fabio. Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, v. 84, p. 317-331, 2018.

BRUNDAGE, Miles et al. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Oxford: Future of Humanity Institute, 2018.

BUCZAK, Anna L.; GUVEN, Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, v. 18, n. 2, p. 1153-1176, 2016.

CHANDOLA, Varun; BANERJEE, Arindam; KUMAR, Vipin. Anomaly detection: A survey. ACM Computing Surveys, v. 41, n. 3, p. 1-58, 2009.

GOODFELLOW, Ian; BENGIO, Yoshua; COURVILLE, Aaron. Deep learning. Cambridge: MIT Press, 2016.

KHAN, Muhammad Afzal et al. A survey of machine learning-based network intrusion detection systems. IEEE Access, v. 7, p. 70926-70950, 2019.

SIENA, Osmar. Metodologia da pesquisa científica: elementos para elaboração e apresentação de trabalhos acadêmicos. Porto Velho: [s.n.], 2007. Disponível em: http://www.mestradoadm.unir.br/site_antigo/doc/manualdetrabalhoacademicoatual.pdf. Acesso em: 10 de janeiro de 2013.

SOMMER, Robin; PAXSON, Vern. Outside the closed world: On using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2010. p. 305-316.

STALLINGS, William. Network security essentials: Applications and standards. 6. ed. Boston: Pearson, 2017.

VERKERKEN, Dries et al. A survey on distributed machine learning for intrusion detection systems. IEEE Communications Surveys & Tutorials, v. 24, n. 1, p. 501-534, 2022.

VINAYAKUMAR, R. et al. Deep learning approach for intelligent intrusion detection system. IEEE Access, v. 7, p. 41525-41550, 2019.

ZHANG, Jian et al. Network anomaly detection: A survey and comparative analysis of stochastic and deterministic methods. Computer Networks, v. 51, n. 12, p. 3440-3462, 2007.

Published

2026-03-13

How to Cite

Monteiro, C. L., Almeida, V. dos S., Guarnieri, T. A., Costa, D. F. S. da, Santos, C. E. de S., Nascimento, R. do, & Jordão, C. C. (2026). Evaluating the effectiveness of machine learning algorithms in detecting malicious traffic on corporate networks. Revista Ft, 30(156), 01-11. https://doi.org/10.69849/yptp6153