Authors :
Chandra Sekhar Sanaboina
Volume/Issue :
Volume 10 - 2025, Issue 7 - July
Google Scholar :
https://tinyurl.com/m3kx7jyw
DOI :
https://doi.org/10.38124/ijisrt/25jul232
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Especially on social media and other online platforms, the internet provides a strong venue for the expression of
ideas, feelings, and views. The public's sentiments are frequently reflected in these internet messages, which, if unregulated,
might cause major problems like rioting or instability, which could affect the safety of the country. In order to avoid any
security issues, it is essential to monitor such emotions. A novel approach to predicting political security threats is presented
in this project. It combines two methods: (i) lexical analysis, which involves searching for words that typically convey strong
emotions like anger or fear, and (ii) machine learning, which involves training computers to identify patterns in data in order
to improve threat prediction. Examining online material for emotional content using classifiers such as Decision Tree, Naive
Bayes, and Support Vector Machine (SVM) allows the method to detect and anticipate indications of instability. From data
processing to prediction, the whole process is automated in this project thanks to the establishment of a pipeline. The data
cleaning, model training, and prediction processes are all integrated into one streamlined flow thanks to scikit-learn. To
improve outcomes, the project intends to test different algorithm combinations within the pipeline and see which ones work
best. In order to avert political instability, it efficiently analyzes internet messages for indicators of disturbance and allows
authorities to take swift action.
Keywords :
Political Threat, Machine Learning, Security, Lexical Analysis, Decision Tree, Support Vector Machines, Naïve Bayes, Pipeline Based Approach Social Media Platforms.
References :
- N. A. M. Razali et al., “Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique,” IEEE Access, vol. 11, pp. 17151–17164, 2023, doi: 10.1109/ACCESS.2023.3246162.
- E. Lee, F. Rustam, P. B. Washington, F. El Barakaz, W. Aljedaani, and I. Ashraf, “Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model,” IEEE Access, vol. 10, pp. 9717–9728, 2022, doi: 10.1109/ACCESS.2022.3144266.
- R. Mubarak, T. Alsboui, O. Alshaikh, I. Inuwa-Dutse, S. Khan, and S. Parkinson, “A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats,” IEEE Access, vol. 11, pp. 144497–144529, 2023, doi: 10.1109/ACCESS.2023.3344653.
- S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of dark web threat analysis and detection: A systematic approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/ACCESS.2020. 3024198.
- E. N. Crothers, N. Japkowicz, and H. L. Viktor, “Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods,” IEEE Access, vol. 11, pp. 70977–71002, 2023, doi: 10.1109/ACCESS.2023.3294090.
- G. Xie, L. T. Yang, Y. Yang, H. Luo, R. Li, and M. Alazab, “Threat Analysis for Automotive CAN Networks: A GAN Model-Based Intrusion Detection Technique,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4467–4477, Jul. 2021, doi: 10.1109/TITS.2021.3055351.
- Y. Luo, M. He, and X. Wang, “Analyzing the semantic structure of network flow: a threat detection method with independent generalization capabilities,” IEEE Trans Netw Sci Eng, 2024, doi: 10.1109/TNSE.2024.3483216.
- X. Tao et al., “User Behavior Threat Detection Based on Adaptive Sliding Window GAN,” IEEE Transactions on Network and Service Management, vol. 21, no. 2, pp. 2493–2503, Apr. 2024, doi: 10.1109/TNSM.2024.3355698.
- R. Rajesh, S. Hemalatha, S. M. Nagarajan, G. G. Devarajan, M. Omar, and A. K. Bashir, “Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4249–4257, Feb. 2024, doi: 10.1109/TCE. 2024.3370193.
- X. Cai et al., “LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection,” Mar. 2024, doi: 10.1109/TIFS.2024.3488527.
- S. Salim, N. Moustafa, and A. Almorjan, “Responsible Deep Federated Learning-based Threat Detection for Satellite Communications,” IEEE Internet Things J, 2025, doi: 10.1109/JIOT.2025.3531884.
- M. Al Razib, D. Javeed, M. T. Khan, R. Alkanhel, and M. S. A. Muthanna, “Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework,” IEEE Access, vol. 10, pp. 53015–53026, 2022, doi: 10.1109/ACCESS.2022.3172304.
- Y. Zhang, W. Liu, K. Kuok, and N. Cheong, “Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior,” IEEE Access, vol. 12, pp. 8536–8551, 2024, doi: 10.1109/ACCESS. 2024.3349943.
- J. Xiao, L. Yang, F. Zhong, X. Wang, H. Chen, and D. Li, “Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network,” IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 3717–3733, Sep. 2023, doi: 10.1109/TNSM.2022. 3222635.
- T. Al-Shehari, M. Al-Razgan, T. Alfakih, R. A. Alsowail, and S. Pandiaraj, “Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm,” IEEE Access, vol. 11, pp. 118170–118185, 2023, doi: 10.1109/ACCESS.2023.3326750.
- J. Dahl, G. R. De Campos, and J. Fredriksson, “Prediction-Uncertainty-Aware Threat Detection for ADAS: A Case Study on Lane-Keeping Assistance,” IEEE Transactions on Intelligent Vehicles, vol. 8, no. 4, pp. 2914–2925, Apr. 2023, doi: 10.1109/TIV.202 3.3253555.
- R. B. Peccatiello, J. J. C. Gondim, and L. P. F. Garcia, “Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection,” IEEE Access, vol. 11, pp. 70560–70573, 2023, doi: 10.1109/ACCESS.2 023.3293825.
- V. Christopher et al., “Minority Resampling Boosted Unsupervised Learning with Hyperdimensional Computing for Threat Detection at the Edge of Internet of Things,” IEEE Access, vol. 9, pp. 126646–126657, 2021, doi: 10.1109/ACCESS.2021.3111053.
- D. C. Le and N. Zincir-Heywood, “Anomaly Detection for Insider Threats Using Unsupervised Ensembles,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1152–1164, Jun. 2021, doi: 10.1109/TNSM.2021.3071928.
- R. Sánchez-Corcuera, A. Zubiaga, and A. Almeida, “Early Detection and Prevention of Malicious User Behavior on Twitter Using Deep Learning Techniques,” IEEE Trans Comput Soc Syst, pp. 1–13, Jul. 2024, doi: 10.1109/tcss.2024.3419171.
- M. Luqman, M. Faheem, W. Y. Ramay, M. K. Saeed, and M. B. Ahmad, “Utilizing Ensemble Learning for Detecting Multi-Modal Fake News,” IEEE Access, vol. 12, pp. 15037–15049, 2024, doi: 10.1109/ACCESS.2024.3357661.
- M. A. Ferrag et al., “Revolutionizing Cyber Threat Detection with Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices,” IEEE Access, vol. 12, pp. 23733–23750, 2024, doi: 10.1109/ACCESS.2024.3363469.
- D. C. Le, N. Zincir-Heywood, and M. I. Heywood, “Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning,” IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 30–44, Mar. 2020, doi: 10.1109/TNS M.2020.2967721.
Especially on social media and other online platforms, the internet provides a strong venue for the expression of
ideas, feelings, and views. The public's sentiments are frequently reflected in these internet messages, which, if unregulated,
might cause major problems like rioting or instability, which could affect the safety of the country. In order to avoid any
security issues, it is essential to monitor such emotions. A novel approach to predicting political security threats is presented
in this project. It combines two methods: (i) lexical analysis, which involves searching for words that typically convey strong
emotions like anger or fear, and (ii) machine learning, which involves training computers to identify patterns in data in order
to improve threat prediction. Examining online material for emotional content using classifiers such as Decision Tree, Naive
Bayes, and Support Vector Machine (SVM) allows the method to detect and anticipate indications of instability. From data
processing to prediction, the whole process is automated in this project thanks to the establishment of a pipeline. The data
cleaning, model training, and prediction processes are all integrated into one streamlined flow thanks to scikit-learn. To
improve outcomes, the project intends to test different algorithm combinations within the pipeline and see which ones work
best. In order to avert political instability, it efficiently analyzes internet messages for indicators of disturbance and allows
authorities to take swift action.
Keywords :
Political Threat, Machine Learning, Security, Lexical Analysis, Decision Tree, Support Vector Machines, Naïve Bayes, Pipeline Based Approach Social Media Platforms.