Research Article

Designing Secure and Usable Systems: The Intersection of Human-Computer Interaction, Cybersecurity, and Machine Learning

by  Mohammad Rasel Mahmud, Syed Imtiazul Sami, Md Khaled Bin Showkot Tanim, Md Shadman Soumik
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 14
Published: June 2025
Authors: Mohammad Rasel Mahmud, Syed Imtiazul Sami, Md Khaled Bin Showkot Tanim, Md Shadman Soumik
10.5120/ijca2025925147
PDF

Mohammad Rasel Mahmud, Syed Imtiazul Sami, Md Khaled Bin Showkot Tanim, Md Shadman Soumik . Designing Secure and Usable Systems: The Intersection of Human-Computer Interaction, Cybersecurity, and Machine Learning. International Journal of Computer Applications. 187, 14 (June 2025), 38-47. DOI=10.5120/ijca2025925147

                        @article{ 10.5120/ijca2025925147,
                        author  = { Mohammad Rasel Mahmud,Syed Imtiazul Sami,Md Khaled Bin Showkot Tanim,Md Shadman Soumik },
                        title   = { Designing Secure and Usable Systems: The Intersection of Human-Computer Interaction, Cybersecurity, and Machine Learning },
                        journal = { International Journal of Computer Applications },
                        year    = { 2025 },
                        volume  = { 187 },
                        number  = { 14 },
                        pages   = { 38-47 },
                        doi     = { 10.5120/ijca2025925147 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Mohammad Rasel Mahmud
                        %A Syed Imtiazul Sami
                        %A Md Khaled Bin Showkot Tanim
                        %A Md Shadman Soumik
                        %T Designing Secure and Usable Systems: The Intersection of Human-Computer Interaction, Cybersecurity, and Machine Learning%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 14
                        %P 38-47
                        %R 10.5120/ijca2025925147
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this fast-paced world of IT security, HCI, cybersecurity, and machine learning initiatives should lead to design that is strong and easy to use technological systems. This study assesses the capabilities of three notable ML models—ANN, CNN, and SVM—in making cybersecurity better, utilizing the UNSW-NB15 data set. Using an 80-20 train-test split and 5-fold cross-validation of the data, the CNN model showed to be the best across the three models. This is because it generated an accuracy of 95.3% with a precision of 94.5% and recall of 96.0%, among others. All in all, the CNN model was better than the ANN and SVM models as it outperformed them on all points. The CNN was deployed in a user-friendly security architecture based on HCI concepts to make it easy to use without compromising security. User answers indicated excellent satisfaction (4.7), responsiveness (4.8), and trust (4.9), along with a false alarm rate of 2.1%, showing the framework’s security usability and dependability. The study reveals that the CNN is able to detect threats with good accuracy. Also, it shows how user design helps generate trust and compliance. The study reveals considerable promise in the usage of CNNs in cyber-security. The researchers note that despite employing only a single dataset and the com-laxity of CNN models, the findings illustrate the significance to the future. They say it enables the opportunity to construct continuous HCI-ML convergence in cybersecurity. This can lead to the establishment of durable, trustworthy, and user-friendly digital places.

References
  • Shneiderman, B., Plaisant, C., Cohen, M., Jacobs, S., Elmqvist, N., & Diakopoulos, N. (2019). Designing the User Interface: Strategies for Effective Human-Computer Interaction (6th ed.). Pearson.
  • Johnson, A., & Lee, K. (2021). "Balancing Security and Usability in Multi-Factor Authentication Systems." Journal of Cybersecurity and Privacy, 3(2), 56–73.
  • Zhou, Y., Xie, X., & Liu, Z. (2020). "Deep Learning in Cybersecurity: Advances and Challenges." IEEE Access, 8, 72345–72365.
  • Taylor, J. (2022). "Explainable AI in Security Systems: Bridging Transparency and Trust." Proceedings of the IEEE International Symposium on Security and Privacy, 104-115.
  • Brown, D., & Green, S. (2022). "Biometric Authentication: User-Centric Design and Machine Learning Integration." International Journal of Security Science, 14(3), 211–229.
  • • White, P., Johnson, M., & Evans, R. (2023). "Rising Cyber Threats: Trends, Challenges, and Countermeasures." Cyber Defense Quarterly, 19(1), 34–49.
  • Smith, J., Brown, T., & Adams, P. (2022). "Adaptive Security Interfaces: The Role of HCI in Cyber Defense." Human-Computer Interaction Journal, 38(4), 569–587.
  • Moustafa, N., & Slay, J. (2019). "UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection." IEEE Transactions on Information Forensics and Security, 8(2), 221–234.
  • Cortes, C., & Vapnik, V. (1995). "Support-Vector Networks." Machine Learning, 20(3), 273–297.
  • Goodfellow, I., Bengio, Y., & Courville, A. (2019). Deep Learning. MIT Press.
  • LeCun, Y., Bottou, L., Orr, G. B., & Müller, K. R. (1998). "Efficient BackProp." In G. B. Orr & K. R. Müller (Eds.), Neural Networks: Tricks of the Trade. Springer.
  • Kohavi, R. (1995). "A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection." Proceedings of the 14th International Joint Conference on Artificial Intelligence, 1137–1143.
  • Powers, D. M. (2011). "Evaluation: From Precision, Recall, and F-Measure to ROC, Informedness, Markedness & Correlation." Journal of Machine Learning Technologies, 2(1), 37–63.
  • Chicco, D., & Jurman, G. (2020). "The Advantages of the Matthews Correlation Coefficient (MCC) over F1 Score and Accuracy in Binary Classification Evaluation." BMC Genomics, 21, Article 6.
  • Bradley, A. P. (1997). "The Use of the Area Under the ROC Curve in the Evaluation of Machine Learning Algorithms." Pattern Recognition, 30(7), 1145–1159.
  • Field, A. (2018). Discovering Statistics Using IBM SPSS Statistics (5th ed.). SAGE Publications.
  • Hunter, J. D. (2007). "Matplotlib: A 2D Graphics Environment." Computing in Science & Engineering, 9(3), 90–95.
  • Abadi, M., et al. (2016). "TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems." arXiv preprint arXiv:1603.04467.
  • Pedregosa, F., et al. (2011). "Scikit-learn: Machine Learning in Python." Journal of Machine Learning Research, 12, 2825–2830.
  • Voigt, P., & Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer.
  • Gunning, D. (2017). "Explainable Artificial Intelligence (XAI)." DARPA Program Description Document.
  • Waskom, M. L. (2021). "Seaborn: Statistical Data Visualization." Journal of Open Source Software, 6(60), 3021.
  • Zhou, Y., Xie, X., & Liu, Z. (2020). "Machine Learning for Zero-Day Threat Detection in Cybersecurity." IEEE Access, 8, 90398–90414.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Human-Computer Interaction Cybersecurity Machine Learning Convolutional Neural Networks User-Centric Design Threat Detection UNSW-NB15 Dataset

Powered by PhDFocusTM