IJWMT Vol. 15, No. 5, 8 Oct. 2025
Cover page and Table of Contents: PDF (size: 683KB)
PDF (683KB), PP.21-33
Views: 0 Downloads: 0
Cyber Threat Hunting, Socio-Political Risk Assessment, Machine Learning, Cybersecurity, Global Security, AI in Counterterrorism, Socio-Cyber Threat Integration
The new and emerging challenges posed by the convergence of cyber threats and socio-political tensions have risen as one of the core formidable threats to the present global security landscape. This paper proposes a hybrid predictive model intended to act against these real-world multidimensional attack vectors. The model integrates cyber threat hunting techniques with socio-political risk assessment methodologies to comprehensively forecast consequent cybersecurity threats to social unrest scenarios. Cyber threat data is collected from sources such as the Offensive Defensive-Intrusion Detection System (OD-IDS2022) and the Aegean Wi-Fi Intrusion Dataset (AWID3), and social terror attack information is gathered from the Global Database of Events, Language, and Tone (GDLET) Project and Armed Conflict Location & Event Data (ACLED) to comprise the bidirectional dataset for the model that contains views from both cyber and socio-political risk landscapes. The model adopts a holistic, robust predictive capability through k-fold cross-validation and feature importance evaluation implementation techniques. This multidisciplinary approach offers a synoptic understanding of emerging and future security threats and enables the execution of proactive measures to secure national and transnational borders.
Ananya Das, Azath H., Subhash Chandra Patel, Pushpinder Singh Patheja, "Integration of Cyber Threat Hunting and Socio- Political Risk Assessment for a Hybrid Predictive Model for Enhanced Global Security", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.5, pp. 21-33, 2025. DOI:10.5815/ijwmt.2025.05.02
[1]“12 Most Common Types of Cyberattacks.” https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/common- cyberattacks/
[2]H. Atkins, “The biggest cyberattacks in history,” History Hit. https://www.historyhit.com/the-biggest-cyberattacks-in-history/
[3]J. Beyer, “Cyberattack on critical infrastructure: Russia and the Ukrainian power grid attacks - The Henry M. Jackson School of International Studies,” The Henry M. Jackson School of International Studies, Mar. 15, 2021. https://jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/
[4]Shandler, “The 5×5—How retaliation shapes cyber conflict,” Atlantic Council, Jul. 07, 2022. https://www.atlanticcouncil.org/commentary/the-5x5-how-retaliation-shapes-cyber-conflict/
[5]D. Brando, A. Kotidis, A. Kovner, M. Lee, and S. L. Schreft, “Implications of cyber risk for financial stability,” May 12, 2022. https://www.federalreserve.gov/econres/notes/feds-notes/implications-of-cyber-risk-for-financial-stability-20220512.html
[6]CFR Editors, “Cyber conflict and the erosion of trust,” Council on Foreign Relations, Sep. 21, 2022. [Online]. Available: https://www.cfr.org/blog/cyber-conflict-and-erosion-trust
[7]C. G, “Social media misinformation and the prevention of political instability and mass atrocities,” Stimson Center, Nov. 2022, [Online]. Available: https://www.stimson.org/2022/social-media-misinformation-and-the-prevention-of-political-instability- and-mass-atrocities/
[8]Cybereason, “What is Threat Hunting? | A Complete Guide.” https://www.cybereason.com/fundamentals/what-is-threat- hunting
[9]C. Islam, M. A. Babar, and N. T. H. Le, “A Dynamic Threat Hunting Framework Integrated with Risk Assessment and Cyber Threat Intelligence,” Elsevier, Jan. 2024, doi: 10.2139/ssrn.4903759.
[10]C. E. Sottilotta, “Rethinking Political Risk: Concepts, Theories, challenges (Routledge, 2016),” Aur, Nov. 2016, [Online]. Available: https://www.academia.edu/29620166/Rethinking_Political_Risk_Concepts_Theories_Challenges_Routledge_2016_
[11]A. Barlybayev, A. Sharipbay, G. Shakhmetova, and A. Zhumadillayeva, “Development of a flexible information security risk model using machine learning methods and ontologies,” Applied Sciences, vol. 14, no. 21, p. 9858, Oct. 2024, doi: 10.3390/app14219858.
[12]Mandiant, “Poll vaulting: Cyber threats to global elections,” Google Cloud Blog, Apr. 25, 2024. https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-global-elections
[13]R. Chheda, “6 steps to successful and efficient threat hunting | SentinelOne,” SentinelOne, Apr. 03, 2024. https://www.sentinelone.com/blog/six-steps-to-successful-and-efficient-threat-hunting/
[14]“Cyber Threat Hunting Guide. Techniques, models, tools, benefits - zenarmor.com.” https://www.zenarmor.com/docs/network- security-tutorials/what-is-cyber-threat-hunting
[15]Adam Bannister, “Cloudflare tracks massive spike in cyber-attacks as protests rage against George Floyd death,” Jun 03, 2020, https://portswigger.net/daily-swig/cloudflare-tracks-massive-spike-in-cyber-attacks-as-protests-rage-against-george-floyd-death.
[16]T. Ganokratanaa and M. Ketcham, “Predictive analysis of terrorist activities in Thailand’s Southern provinces: a deep learning approach,” International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering, vol. 14, no. 2, p. 1797, Jan. 2024, doi: 10.11591/ijece.v14i2.pp1797-1808.
[17]“Cyber Attacks During the War on Terrorism: A Predictive analysis.” https://apps.dtic.mil/sti/citations/ADA395300
[18]A. Javed, M. Lakoju, P. Burnap, and O. Rana, “Security analytics for realātime forecasting of cyberattacks,” Software Practice and Experience, vol. 52, no. 3, pp. 788– 804, Apr. 2020, doi: 10.1002/spe.2822.
[19]F. A. Khan, G. Li, A. N. Khan, Q. W. Khan, M. Hadjouni, and H. Elmannai, “AI-Driven Counter-Terrorism: Enhancing global security through advanced predictive Analytics,” IEEE Access, vol. 11, pp. 135864–135879, Jan. 2023, doi: 10.1109/access.2023.3336811.
[20]A. Yeboah-Ofori et al., “Cyber Threat Predictive Analytics for improving cyber Supply chain security,” IEEE Access, vol. 9, pp. 94318–94337, Jan. 2021, doi: 10.1109/access.2021.3087109.
[21]N. D. Patel, B. M. Mehtre, and R. Wankar, “Od-ids2022: generating a new offensive defensive intrusion detection dataset for machine learning-based attack classification,” International Journal of Information Technology, vol. 15, no. 8, pp. 4349–4363, Sep. 2023, doi: 10.1007/s41870-023-01464-8.
[22]E. Chatzoglou, G. Kambourakis and C. Kolias, "Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset," in IEEE Access, vol. 9, pp. 34188-34205, 2021
[23]“The GDELT project.” https://www.gdeltproject.org/
[24]ACLED, “ACLED (Armed Conflict Location and Event Data),” ACLED, Nov. 05, 2024. https://acleddata.com/
[25]S. Iftikhar, “Cyberterrorism as a global threat: a review on repercussions and countermeasures,” PeerJ Computer Science, vol. 10, p. e1772, Jan. 2024, doi: 10.7717/peerj-cs.1772.
[26]“What are the Biggest Challenges to Federal Cybersecurity? (High Risk Update),” U.S. GAO, Jul. 30, 2024. https://www.gao.gov/blog/what-are-biggest-challenges-federal-cybersecurity-high-risk-update
[27]“Social media manipulation by political actors an industrial scale,” Jan. 13, 2021. https://www.ox.ac.uk/news/2021-01-13- social-media-manipulation-political-actors-industrial-scale-problem-oxford-report
[28]E. Ryan and D. Mullin, “From NotPetya to today’s global conflict landscape: cyberpolitical risk emerges as a critical challenge to business & society,” Teneo, Sep. 16, 2024. https://www.teneo.com/insights/articles/from-notpetya-to-todays-global-conflict- landscape-cyberpolitical-risk-emerges-as-a-critical-challenge-to-business-society/