A Pipeline-Based Approach for Enhancing Political Threat Detection Using Machine Learning


Authors : Chandra Sekhar Sanaboina

Volume/Issue : Volume 10 - 2025, Issue 7 - July


Google Scholar : https://tinyurl.com/m3kx7jyw

DOI : https://doi.org/10.38124/ijisrt/25jul232

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : Especially on social media and other online platforms, the internet provides a strong venue for the expression of ideas, feelings, and views. The public's sentiments are frequently reflected in these internet messages, which, if unregulated, might cause major problems like rioting or instability, which could affect the safety of the country. In order to avoid any security issues, it is essential to monitor such emotions. A novel approach to predicting political security threats is presented in this project. It combines two methods: (i) lexical analysis, which involves searching for words that typically convey strong emotions like anger or fear, and (ii) machine learning, which involves training computers to identify patterns in data in order to improve threat prediction. Examining online material for emotional content using classifiers such as Decision Tree, Naive Bayes, and Support Vector Machine (SVM) allows the method to detect and anticipate indications of instability. From data processing to prediction, the whole process is automated in this project thanks to the establishment of a pipeline. The data cleaning, model training, and prediction processes are all integrated into one streamlined flow thanks to scikit-learn. To improve outcomes, the project intends to test different algorithm combinations within the pipeline and see which ones work best. In order to avert political instability, it efficiently analyzes internet messages for indicators of disturbance and allows authorities to take swift action.

Keywords : Political Threat, Machine Learning, Security, Lexical Analysis, Decision Tree, Support Vector Machines, Naïve Bayes, Pipeline Based Approach Social Media Platforms.

References :

  1. N. A. M. Razali et al., “Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique,” IEEE Access, vol. 11, pp. 17151–17164, 2023, doi: 10.1109/ACCESS.2023.3246162.
  2. E. Lee, F. Rustam, P. B. Washington, F. El Barakaz, W. Aljedaani, and I. Ashraf, “Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model,” IEEE Access, vol. 10, pp. 9717–9728, 2022, doi: 10.1109/ACCESS.2022.3144266.
  3. R. Mubarak, T. Alsboui, O. Alshaikh, I. Inuwa-Dutse, S. Khan, and S. Parkinson, “A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats,” IEEE Access, vol. 11, pp. 144497–144529, 2023, doi: 10.1109/ACCESS.2023.3344653.
  4. S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of dark web threat analysis and detection: A systematic approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/ACCESS.2020. 3024198.
  5. E. N. Crothers, N. Japkowicz, and H. L. Viktor, “Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods,” IEEE Access, vol. 11, pp. 70977–71002, 2023, doi: 10.1109/ACCESS.2023.3294090.
  6. G. Xie, L. T. Yang, Y. Yang, H. Luo, R. Li, and M. Alazab, “Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4467–4477, Jul. 2021, doi: 10.1109/TITS.2021.3055351.
  7. Y. Luo, M. He, and X. Wang, “Analyzing the semantic structure of network flow: a threat detection method with independent generalization capabilities,” IEEE Trans Netw Sci Eng, 2024, doi: 10.1109/TNSE.2024.3483216.
  8. X. Tao et al., “User Behavior Threat Detection Based on Adaptive Sliding Window GAN,” IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2493–2503, Apr. 2024, doi: 10.1109/TNSM.2024.3355698.
  9. R. Rajesh, S. Hemalatha, S. M. Nagarajan, G. G. Devarajan, M. Omar, and A. K. Bashir, “Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4249–4257, Feb. 2024, doi: 10.1109/TCE. 2024.3370193.
  10. X. Cai et al., “LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection,” Mar. 2024, doi: 10.1109/TIFS.2024.3488527.
  11. S. Salim, N. Moustafa, and A. Almorjan, “Responsible Deep Federated Learning-based Threat Detection for Satellite Communications,” IEEE Internet Things J, 2025, doi: 10.1109/JIOT.2025.3531884.
  12. M. Al Razib, D. Javeed, M. T. Khan, R. Alkanhel, and M. S. A. Muthanna, “Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework,” IEEE Access, vol. 10, pp. 53015–53026, 2022, doi: 10.1109/ACCESS.2022.3172304.
  13. Y. Zhang, W. Liu, K. Kuok, and N. Cheong, “Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior,” IEEE Access, vol. 12, pp. 8536–8551, 2024, doi: 10.1109/ACCESS. 2024.3349943.
  14. J. Xiao, L. Yang, F. Zhong, X. Wang, H. Chen, and D. Li, “Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network,” IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 3717–3733, Sep. 2023, doi: 10.1109/TNSM.2022. 3222635.
  15. T. Al-Shehari, M. Al-Razgan, T. Alfakih, R. A. Alsowail, and S. Pandiaraj, “Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm,” IEEE Access, vol. 11, pp. 118170–118185, 2023, doi: 10.1109/ACCESS.2023.3326750.
  16. J. Dahl, G. R. De Campos, and J. Fredriksson, “Prediction-Uncertainty-Aware Threat Detection for ADAS: A Case Study on Lane-Keeping Assistance,” IEEE Transactions on Intelligent Vehicles, vol. 8, no. 4, pp. 2914–2925, Apr. 2023, doi: 10.1109/TIV.202 3.3253555.
  17. R. B. Peccatiello, J. J. C. Gondim, and L. P. F. Garcia, “Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection,” IEEE Access, vol. 11, pp. 70560–70573, 2023, doi: 10.1109/ACCESS.2 023.3293825.
  18. V. Christopher et al., “Minority Resampling Boosted Unsupervised Learning with Hyperdimensional Computing for Threat Detection at the Edge of Internet of Things,” IEEE Access, vol. 9, pp. 126646–126657, 2021, doi: 10.1109/ACCESS.2021.3111053.
  19. D. C. Le and N. Zincir-Heywood, “Anomaly Detection for Insider Threats Using Unsupervised Ensembles,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1152–1164, Jun. 2021, doi: 10.1109/TNSM.2021.3071928.
  20. R. Sánchez-Corcuera, A. Zubiaga, and A. Almeida, “Early Detection and Prevention of Malicious User Behavior on Twitter Using Deep Learning Techniques,” IEEE Trans Comput Soc Syst, pp. 1–13, Jul. 2024, doi: 10.1109/tcss.2024.3419171.
  21. M. Luqman, M. Faheem, W. Y. Ramay, M. K. Saeed, and M. B. Ahmad, “Utilizing Ensemble Learning for Detecting Multi-Modal Fake News,” IEEE Access, vol. 12, pp. 15037–15049, 2024, doi: 10.1109/ACCESS.2024.3357661.
  22. M. A. Ferrag et al., “Revolutionizing Cyber Threat Detection with Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices,” IEEE Access, vol. 12, pp. 23733–23750, 2024, doi: 10.1109/ACCESS.2024.3363469.
  23. D. C. Le, N. Zincir-Heywood, and M. I. Heywood, “Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning,” IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 30–44, Mar. 2020, doi: 10.1109/TNS M.2020.2967721.

Especially on social media and other online platforms, the internet provides a strong venue for the expression of ideas, feelings, and views. The public's sentiments are frequently reflected in these internet messages, which, if unregulated, might cause major problems like rioting or instability, which could affect the safety of the country. In order to avoid any security issues, it is essential to monitor such emotions. A novel approach to predicting political security threats is presented in this project. It combines two methods: (i) lexical analysis, which involves searching for words that typically convey strong emotions like anger or fear, and (ii) machine learning, which involves training computers to identify patterns in data in order to improve threat prediction. Examining online material for emotional content using classifiers such as Decision Tree, Naive Bayes, and Support Vector Machine (SVM) allows the method to detect and anticipate indications of instability. From data processing to prediction, the whole process is automated in this project thanks to the establishment of a pipeline. The data cleaning, model training, and prediction processes are all integrated into one streamlined flow thanks to scikit-learn. To improve outcomes, the project intends to test different algorithm combinations within the pipeline and see which ones work best. In order to avert political instability, it efficiently analyzes internet messages for indicators of disturbance and allows authorities to take swift action.

Keywords : Political Threat, Machine Learning, Security, Lexical Analysis, Decision Tree, Support Vector Machines, Naïve Bayes, Pipeline Based Approach Social Media Platforms.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe