An Optimized Machine Learning Model for Detection and Classification of Supply Chain Attacks in Containerized Cloud Systems
Authors
Gracelink Computech Ventures, Awumaro Street, Oroki Road, Oyo (Nigeria). (Nigeria)
Department of Computer Sciences, Faculty of Computing, Ajayi Crowther University, P.M.B 1066, Oyo (Nigeria). (Nigeria)
Department of Computer Sciences, Faculty of Computing, Ajayi Crowther University, P.M.B 1066, Oyo (Nigeria). (Nigeria)
Department of Computer Sciences, Faculty of Computing, Ajayi Crowther University, P.M.B 1066, Oyo (Nigeria). (Nigeria)
Department of Computer Science, School of Secondary Education, (Science Programmes), Federal College of Education (Special), P.M.B 1089, Oyo. (Nigeria)
Article Information
DOI: 10.51244/IJRSI.2026.1313CS008
Subject Category: Education
Volume/Issue: 13/13 | Page No: 105-121
Publication Timeline
Submitted: 2026-04-18
Accepted: 2026-04-23
Published: 2026-05-11
Abstract
This research developed an enhanced machine-learning framework for classifying and detecting supply-chain attacks in containerized applications by integrating the Aquila Optimizer (AO) with the Extreme Gradient Boosting (XGBoost) algorithm. The research was motivated by the increasing security risks associated with container technologies such as Docker and Kubernetes, particularly across software supply chain stages including development, dependency management, and deployment. The NSL-KDD dataset and additional container-related datasets from GitHub repositories were utilized, with preprocessing steps including encoding, normalization, feature selection, and class balancing. The developed AO-XGBoost model optimizes hyperparameters and decision thresholds to improve detection capability. Experimental results show that the baseline XGBoost achieved an accuracy of 0.80 and an AUC-ROC of 0.85, while the developed AO-XGBoost model improved performance to 0.86 accuracy and 0.93 AUC-ROC. The optimized model also demonstrated significant improvements in precision, recall, and F1-score, indicating better balance and reduced false positives. These findings confirm that metaheuristic optimization enhances model generalization and effectiveness in high-dimensional cybersecurity datasets. The developed model provides a robust and scalable solution for detecting complex supply chain attacks in containerized environments, contributing to improved software security and resilience.
Keywords
Supply Chain Attacks, Containerized Applications, Machine Learning, XGBoost, Aquila Optimizer, Hyperparameter Optimization, Cloud Security
Downloads
References
1. Abualigah, L., Sbenaty, B., Ikotun, A. M., Zitar, R. A., Alsoud, A. R., Khodadadi, N., ... & Jia, H. (2024). Aquila optimizer: review, results and applications. Metaheuristic optimization algorithms, 89-103. [Google Scholar] [Crossref]
2. Abualigah, L., Diabat, A., Mirjalili, S., Elaziz, M. A.& Gandomi, A. H. (2021). The arithmetic optimization algorithm. Computer Methods in Applied Mechanics and Engineering, 376, 1-17. [Google Scholar] [Crossref]
3. Abualigah, L., Yousri, D., Abd Elaziz, M., Ewees, A. A., Al-Qaness, M. A., & Gandomi, A. H. (2021). Aquila optimizer: a novel meta-heuristic optimization algorithm. Computers & Industrial Engineering, 157, 107250. [Google Scholar] [Crossref]
4. Adhikari, S., & Baidya, S. (2024). Cyber security in containerization platforms: A comparative research of security challenges, measures and best practices. arXiv preprint arXiv:2404.18082. [Google Scholar] [Crossref]
5. Alnuaimi, F. A. H. & Albaldawi, T. H. K. (2024). An overview of machine learning classification techniques. BioWeb of Conferences, 97(00133), 1-24. [Google Scholar] [Crossref]
6. Alshboul, O., Shehadeh, A., Almasabha, G., & Almuflih, A. S. (2022). Extreme gradient boosting-based machine learning approach for green building cost prediction. Sustainability, 14(11), 6651. [Google Scholar] [Crossref]
7. Jani, Y. (2021). Security best practices for containerized applications. Journal of Scientific and Engineering Research, 8(8), 217-221. [Google Scholar] [Crossref]
8. Lozano, J. M. & Duran, J.M. (2021). Software supply chain attacks, a threat to global cybersecurity: Solar winds’s case research. International Journal of Safety and Security Engineering, 11(5), 537-545. [Google Scholar] [Crossref]
9. Ludvigsen, K. R., Nagaraja, S., & Daly, A. (2022). Preventing or mitigating adversarial supply chain attacks: A legal analysis. arXiv. https://doi.org/10.48550/arXiv.2208.03466. [Google Scholar] [Crossref]
10. Mahavaishnavi, V., Saminathan, R. & Prithviraj, R. (2023). Container security intelligence: leveraging machine learning for anomaly detection in containerized applications. Journal of Propulsion Technology, 44(3), 1-14. [Google Scholar] [Crossref]
11. Martínez, J., & Durán, J. M. (2021). Software supply chain attacks, a threat to global cybersecurity: SolarWinds’ case research. International Journal of Safety and Security Engineering, 11(5), 537-545. [Google Scholar] [Crossref]
12. Mehmood, K., Chaudhary, N. I., Khan, Z.A., Raja, M. A. Z., Cheema, K. M. & Milyani, A. H. (2022). Design of aquila optimization heuristic for identification of control autoregressive systems. Mathematics, 10(10), 1-23. https://www.mdpi.com/2227-7390/10/10/1749/pdf?version=1653041918 [Google Scholar] [Crossref]
13. Mustapha, I. B., Abdulkareem, M., Jassam, T. M., AlAteah, A. H., Al-Sodani, K. A. A., Al-Tholaia, M. M., ... & Ganiyu, A. (2024). Comparative analysis of gradient-boosting ensembles for estimation of compressive strength of quaternary blend concrete. International Journal of Concrete Structures and Materials, 18(1), 20. [Google Scholar] [Crossref]
14. Olumba, S. G., Oscar, F., Gregory, U. S., Okonwo, U. U., Ngoyi, L., Obiokafor, I. N., Akhamie, P., Fakoya, A. O., Olufemi, A., Onuche, P. U. O. & Oiaigbe, J. M. (2023). Enhancing [Google Scholar] [Crossref]
15. intrusion detection systems for supply chain attacks using optimized machine learning models:A case for BPSO-XGBoost. International Journal of Research and Publication, 2(5), 1-9. [Google Scholar] [Crossref]
16. Okoli, U. I., Obi, O. C., Adewusi, A. O., & Abrahams, T. O. (2024). Machine learning in cybersecurity: A review of threat detection and defense mechanisms. World Journal of Advanced Research and Reviews, 21(1), 2286-2295. [Google Scholar] [Crossref]
17. Phanireddy, S. (2023). Mitigating Supply Chain Attacks in Web Applications: A Case Research on Log4j and Spring4shell. [Google Scholar] [Crossref]
18. Praba, R., Darshan, G., Roshanraj, K. T. & Prakash, P. B. S. (2021). Research on machine learning algorithms. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(4), 67-72. [Google Scholar] [Crossref]
19. Reddy, R. V. K. & Babu, U. R. (2018). A review on classification techniques in machine learning. International Journal of advance research in science and engineering, 7(3), 40- 47. [Google Scholar] [Crossref]
20. Watada, J., Roy, A., Kadikar, R., Pham, H., & Xu, B. (2019). Emerging trends, techniques and open issues of containerization: a review. IEEE Access, 7, 152443-152472. [Google Scholar] [Crossref]
21. Wu, Z.,Wang, J., Shi, Q., Zhang, J., Liu, J. & Zhang, X. (2023). An attack-aware shipping [Google Scholar] [Crossref]
22. enterprise cybersecurity framework based on deep learning. In 2023 11th International Conference on Information Systems and Computing Technology (ISCTech), pp. 115–119, IEEE, 2023. [Google Scholar] [Crossref]
23. Zhu, J., Liu, J., Chen, Y., Xue, X. & Sun, S. (2023). Binary restructuring particle swarm [Google Scholar] [Crossref]
24. optimisation and its application. Biomimetics, 8(2), 1-17. https://pmc.ncbi.nlm.nih.gov/articles/PMC10296588/pdf/biomimetics-08-00266.pdf [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- Assessment of the Role of Artificial Intelligence in Repositioning TVET for Economic Development in Nigeria
- Teachers’ Use of Assure Model Instructional Design on Learners’ Problem Solving Efficacy in Secondary Schools in Bungoma County, Kenya
- “E-Booksan Ang Kaalaman”: Development, Validation, and Utilization of Electronic Book in Academic Performance of Grade 9 Students in Social Studies
- Analyzing EFL University Students’ Academic Speaking Skills Through Self-Recorded Video Presentation
- Major Findings of The Study on Total Quality Management in Teachers’ Education Institutions (TEIs) In Assam – An Evaluative Study