Explore open access research and scholarly works from STORE - University of Staffordshire Online Repository

Advanced Search

An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data

Sadegh-Zadeh, Seyed-Ali and TAJDINI, Mostafa (2025) An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data. Decision Analytics Journal, 11 (2). ISSN 2772-6622

[thumbnail of 1-s2.0-S2772662225000323-main.pdf]
Preview
Text
1-s2.0-S2772662225000323-main.pdf - Publisher's typeset copy
Available under License Type Creative Commons Attribution 4.0 International (CC BY 4.0) .

Download (2MB) | Preview
Official URL: https://doi.org/10.1016/j.dajour.2025.100576

Abstract or description

Cyber threat detection is a critical challenge in cybersecurity, with numerous existing solutions relying on rule-based systems, supervised learning models, and entropy-based anomaly detection. However, rule-based methods are often limited by their dependence on predefined signatures, making them ineffective against novel attacks. Supervised learning approaches require extensive labelled​ datasets, which are often unavailable or quickly outdated due to evolving threats. Traditional entropy-based anomaly detection techniques struggle with high false positive rates and computational inefficiencies when applied to large-scale DNS traffic. These limitations necessitate a more adaptive and scalable approach. This study integrates geographic profiling with Domain Name System (DNS) data analysis to enhance cyber threat detection, offering a novel approach to understanding cyber threats through geographical insights. The primary objective is to develop unsupervised machine learning models to identify potentially malicious IP addresses based on DNS query anomalies, leveraging the correlation between geographic locations and DNS behaviours. The proposed method utilizes K-means clustering to process geolocation and passive DNS datasets, detect anomalies, and identify cyber threat hotspots. Our results demonstrate the effectiveness of geographic profiling in cyber threat intelligence, with K-means clustering achieving a high silhouette score of 0.985, indicating well-separated and meaningful threat groupings. Additionally, our entropy-based anomaly detection identified high-risk DNS activities with an accuracy of 92.3%, reducing false positives compared to traditional DNS monitoring techniques. The geospatial analysis revealed that 82% of cyber threats originate from 15 high-entropy regions, aligning with global cybersecurity incident reports. The proposed predictive framework significantly improves cyber threat detection, enhancing real-time threat visibility and response capabilities. By integrating geographic profiling with DNS data analysis, we advance cybersecurity defences by providing a more nuanced and data-driven understanding of cyber threats.

Item Type: Article
Uncontrolled Keywords: Machine learning; Cyber threat detection; Geographic profiling; Domain Name System anomalies; Network security; Cybersecurity
Faculty: School of Digital, Technologies and Arts > Computer Science, AI and Robotics
Depositing User: Ali SADEGH ZADEH
Date Deposited: 09 Feb 2026 15:03
Last Modified: 09 Feb 2026 15:03
Related URLs:
URI: https://eprints.staffs.ac.uk/id/eprint/9533

Actions (login required)

View Item
View Item