Research Article

Strengthening U.S. Critical Infrastructure Resilience Through NIST-Aligned Cybersecurity Governance and AI-Driven Threat Detection

Authors

  • Md Humayun Kabir Westcliff University, Irvine, United States
  • Md Razib MBA (Digital and Strategic Marketing), Westcliff University, Irvine, United States
  • Yasin Arafat Doctor of Management, International American University, Los Angeles, United States
  • Ruhul Amin Md Rashed MBA in Management Information Systems, International American University, Los Angeles, United States
  • Zakarya Jesan University of Northern Iowa, Iowa, United States

Abstract

U.S. critical infrastructure operators face a persistent gap between high-level cybersecurity frameworks and day-to-day measurable execution, especially under ransomware-driven threat progression. This paper presents an applied, program-to-analytics approach that operationalizes NIST-aligned resilience into auditable actions and metrics while providing a transparent baseline for AI/ML-based threat detection. First, we map five intrusion stages—Initial Access, Privilege Escalation, Lateral Movement, Exfiltration, and Impact—to NIST CSF 2.0 functions and NIST SP 800-53 control-family domains, then define a minimal set of operational metrics (e.g., MFA coverage, patch compliance, MTTD, MTTR, backup restore success, and RTO/RPO achievement) that can be sourced from enterprise systems of record. Second, we implement a sparse-friendly preprocessing and modeling pipeline and evaluate two baseline classifiers on the UNSW-NB15 benchmark dataset (UNSW_NB15_training-set.csv; 175,341 rows; 45 columns) using an 80/20 stratified split (seed=42) and a fixed decision threshold of 0.5. XGBoost achieves ROC-AUC 0.993 and average precision 0.997, with F1 0.969 (TN=10,279; FP=921; FN=575; TP=23,294). Logistic regression (saga) achieves ROC-AUC 0.984 and average precision 0.992, with F1 0.954 (TN=9,230; FP=1,970; FN=281; TP=23,588). The results illustrate baseline tradeoffs under a fixed policy and show how model outputs can be governed through CSF-aligned resilience metrics rather than unsupported deployment claims.

Article information

Journal

Journal of Computer Science and Technology Studies

Volume (Issue)

7 (6)

Pages

1120-1134

Published

2025-06-20

How to Cite

Md Humayun Kabir, Md Razib, Yasin Arafat, Ruhul Amin Md Rashed, & Zakarya Jesan. (2025). Strengthening U.S. Critical Infrastructure Resilience Through NIST-Aligned Cybersecurity Governance and AI-Driven Threat Detection. Journal of Computer Science and Technology Studies, 7(6), 1120-1134. https://doi.org/10.32996/jcsts.2025.7.6.134

Downloads

Views

54

Downloads

9

Keywords:

Critical infrastructure resilience; ransomware; nation-state threats; NIST Cybersecurity Framework (CSF) 2.0; NIST SP 800-53 Rev. 5; intrusion detection; UNSW-NB15; XGBoost