Cyberbullying Detection Using Machine Learning:A Comprehensive Review

Authors

  • Dr. Ashwini Kumar Jha Author
  • Avinash Songa Department of Computer Science and Engineering, Parul University, Vadodara, Gujarat, India Author
  • Vishnu Ulliboyina Author
  • Pavan Kumar Chadaram Author
  • Rohith Purushottam Naidu Author

Keywords:

Cyberbullying Detection, Machine Learning, Natural Language Processing, Online Harassment Detection, , Text Classification, Deep Learning, Automated Content Moderation

Abstract

 The rapid growth of social media platforms and online communication technologies has increased the scale of digital interactions while simultaneously introducing serious challenges related to harmful online behavior such as cyberbullying. Cyberbullying involves the use of digital platforms to harass, threaten, or humiliate individuals, often causing significant psychological and emotional harm. With the massive volume of user-generated content shared across social networking sites, detecting such harmful behavior through manual moderation has become increasingly difficult. As a result, machine learning techniques have emerged as an effective approach for automatically identifying cyberbullying in online environments. This study applies a systematic literature review (SLR) approach to examine research published over the past decade (2015–2025) on cyberbullying detection using machine learning methods. The review analyzes existing studies to understand commonly used algorithms, datasets, feature extraction techniques, and evaluation strategies applied in cyberbullying detection systems. It also highlights the role of natural language processing and deep learning approaches in improving the identification of abusive online content. In addition, the study discusses key challenges associated with cyberbullying detection, including contextual language understanding, sarcasm interpretation, dataset imbalance, and multilingual communication. This comprehensive analysis aims to provide researchers and practitioners with a clearer understanding of current developments and potential future directions in automated cyberbullying detection for safer online environments.

Downloads

Download data is not yet available.

References

1. Edosomwan, S.; Prakasan, S.K.; Kouame, D.; Watson, J.; Seymour, T. The history of social media and its impact on business. J. Appl. Manag. Entrep. 2011, 16, 79–91.

2. Bauman, S. Cyberbullying: What Counselors Need to Know; John Wiley & Sons: Hoboken, NJ, USA, 2014.

3. Pereira-Kohatsu, J.C.; Quijano-Sánchez, L.; Liberatore, F.; Camacho-Collados, M. Detecting and Monitoring Hate Speech in Twitter. Sensors 2019, 19, 4654. [CrossRef]

4. Miller, K. Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law’s limited available redress. S. Cal. Interdisc. Law J. 2016, 26, 379.

5. Price, M.; Dalgleish, J. Cyberbullying: Experiences, impacts and coping strategies as described by australian young people. Youth Stud. Aust. 2010, 29, 51.

6. Smith, P.K. Cyberbullying and Cyber Aggression. In Handbook of School Violence and School Safety; Informa UK Limited: Colchester, UK, 2015.

7. Sampasa-Kanyinga, H.; Roumeliotis, P.; Xu, H. Associations between Cyberbullying and School Bullying Victimization and Suicidal Ideation, Plans and Attempts among Canadian Schoolchildren. PLoS ONE 2014, 9, e102145. [CrossRef]

8. Davidson, T.; Warmsley, D.; Macy, M.; Weber, I. Automated Hate Speech Detection and the Problem of Offensive Language. arXiv 2017, arXiv:1703.04009.

9. Mc Guckin, C.; Corcoran, L. (Eds.) Cyberbullying: Where Are We Now? A Cross-National Understanding; MDPI: Wuhan, China, 2017.

10. Vaillancourt, T.; Faris, R.; Mishna, F. Cyberbullying in Children and Youth: Implications for Health and Clinical Practice. Can. J. Psychiatry 2016, 62, 368–373. [CrossRef]

11. Görzig, A.; Ólafsson, K. What Makes a Bully a Cyberbully? Unravelling the Characteristics of Cyberbullies across Twenty-Five European Countries. J. Child. Media 2013, 7, 9–27. [CrossRef]

12. Salton, G.; Buckley, C. Term-wsevening approaches in automatic text retrieval. Inf. Process. Manag. 1988, 24, 513–523.

13. Liu, Q.; Wang, J.; Zhang, D.; Yang, Y.; Wang, N. Text Features Extraction based on TF-IDF Associating Semantic. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2018; pp. 2338–2343.

14. Pennington, J.; Socher, R.; Manning, C. Glove: Global Vectors for Word Representation. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, 25–29 October 2014.

15. Goldberg, Y.; Levy, O. word2vec Explained: Deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv 2014, arXiv:1402.3722.

16. Li, J.; Huang, G.; Fan, C.; Sun, Z.; Zhu, H. Key word extraction for short text via word2vec, doc2vec, and textrank. Turk. J. Electr. Eng. Comput. Sci. 2019, 27, 1794–1805. [CrossRef]

17. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.-C.; Hanzo, L. Machine Learning Paradigms for Next-Generation Wireless Networks. IEEE Wirel. Commun. 2016, 24, 98–105. [CrossRef]

18. Medhat, W.; Hassan, A.; Korashy, H. Sentiment analysis algorithms and applications: A survey. Ain Shams Eng. J. 2014, 5, 1093–1113. [CrossRef]

19. Al-Garadi, M.A.; Hussain, M.R.; Khan, N.; Murtaza, G.; Nweke, H.F.; Ali, I.; Mujtaba, G.; Chiroma, H.; Khattak, H.A.; Gani, A. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges. IEEE Access 2019, 7, 70701–70718. [CrossRef]

20. Maalouf, M. Logistic regression in data analysis: An overview. Int. J. Data Anal. Tech. Strat. 2011, 3, 281–299. [CrossRef]

21. R. M. Kowalski, S. P. Limber and A. McCord, “A developmental approach to cyberbullying: Prevalence and protective factors,” Aggression and Violent Behavior, vol. 45, pp. 20–32, 2019.

22. Hosmer, D.W.; Lemeshow, S.; Sturdivant, R.X. Applied Logistic Regression; Wiley: Hoboken, NJ, USA, 2013; Volume 398

23. G. Allsopp, J. Rosenthal, J. Blythe and J. S. Taggar, “Defining and measuring denigration of general practice in medical education,” Education for Primary Care, vol. 31, no. 4, pp. 205–209, 2020.

24. Chavan, V.S.; Shylaja, S.S. Machine learning approach for detection of cyber-aggressive comments by peers on social media networks. In Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, 10–13 August 2015; Institute of Electrical and Electronics Engineers (IEEE): New York, NY, USA, 2015; pp. 2354–2358.

25. E. Villar-Rodriguez, J. D. Ser, S. Gil-Lopez, M. N. Bilbao and S. Salcedo-Sanz, “A Meta-heuristic learning approach for the non-intrusive detection of impersonation attacks in social networks,”International Journal of Bio-Inspired Computation, vol. 10, no. 2, pp. 109–118, 2017.

26. A. Cassiman, “Spiders on the world wide web: Cyber trickery and gender fraud among youth in an Accra zongo,” Social Anthropology, vol. 27, no. 3, pp. 486–500, 2019.

27. K. Williams, C. Cheung and W. Choi, “Cyberostracism: Effects of Being Ignored over the Internet,” Journal of Personality and Social Psychology, vol. 79, no. 5, pp. 748–762, 2000.

28. D. Álvarez-García, J. C. Núñez, A. Barreiro-Collazo and T. García, “Validation of the cybervictimization questionnaire (CYVIC) for adolescents,” Computers in Human Behavior, vol. 70, pp. 270–281, 2017.

29. A.Sanchez-Medina, I. Galvan-Sanchez and M. Fernandez-Monro, “Applying artificial intelligence to explore sexual cyberbullying behaviour,” Heliyon, vol. 6, no. 1, pp. 1–9, 2020.

30.A. Perera and P. Fernandol, “Accurate cyberbullying detection and prevention on social media,” Procedia Computer Science, vol. 181, pp. 605–611, 2021.

31.E. Zinoviyeva, W. Karl Hardle and S. Lessmann, “Antisocial online behavior detection using deep learning. Decision Support Systems, vol. 138, no. 1, pp. 1–9, 2020.

32.R. Zhao and K. Mao, “Cyberbullying detection based on semantic-enhanced marginalized denoising autoencoder,” IEEE Transactions on Affective Computing, vol. 8, no. 3, pp. 328–329, 2016.

33.L. Thun, P. The and C. Cheng, “CyberAid: Are your children safe from cyberbullying?,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 7, pp. 4099–4108, 2022.

34.M. Lopez-Vizcaino, F. Novoa, V. Carneiro and F. Cacheida, “Early detection of cyberbullying on social media networks,” Future Generation Computer Systems,” vol. 118, pp. 219–229, 2021.

35.M. Al-garadi, K. Varatham and S. Ravana, “Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network,” Computers in Human Behavior, vol. 63, pp. 433–443, 2016.

36.O. Gencoglu, “Cyberbullying detection with fairness constraints,” IEEE Internet Computing, vol. 25, no. 1, pp. 20–29, 2020.

37.Z. Meng, S. Tian and L. Yu, “Regional bullying text recognition based on two-branch parallel neural networks,” Automatic Control and Computer Sciences, vol. 54, no. 4, pp. 323–334, 2020.

38.J. Hani, M. Nashaat, M. Ahmed, Z. Emad, E. Amer et al., “Social media cyberbullying detection using machine learning,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 5, pp. 703–707, 2019.

39.T. Ahmed, S. Ivan, M. Kabir, H. Mahmud and K. Hasan, “Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying,”Social Network Analysis and Mining, vol. 12, no. 1, pp. 1–17, 2022.

40.V. Balakrishnan, Sh. Khan and H. Arabnia, “Improving Cyberbullying Detection using Twitter Users’ Psychological Features and Machine Learning,” Computers and Security, vol. 90, no. 1, pp. 1–11, 2019.

41.Y. Silva, D. Hall and C. Rich, “BullyBlocker: Toward an interdisciplinary approach to identify cyberbullying,” Social Network Analysis and Mining, vol. 8, no. 1, 1–15, 2018.

42. A. K. Jha, “Sensing and Supervising through IoT,” International Journal of Computer Applications, vol. 152, no. 9, pp. 7–9, 2016. ISSN: 0975-8887. DOI: 10.5120/ijca2016911723.

43. A. K. Jha, M. P. Patel, and T. D. Pawar, “Fog offloading: Review, research opportunity and challenges,” in Proc. 2019 Int. Conf. Smart Syst. Invent. Technol. (ICSSIT), 2019, pp. 1224–1227. DOI: 10.1109/ICSSIT46314.2019.8987905.

44.A. K. Jha, M. P. Patel, and T. D. Pawar, “A proposed model of computation offloading in fog environment,” Sambodhi (UGC Care Journal), vol. 43, no. 03(IV), pp. 1–6, Nov.–Dec. 2020. ISSN: 2249-6661.

45.A. K. Jha and T. Pawar, “Computation Offloading for Smart Healthcare Applications,” in IoT Applications for Healthcare Systems. Cham: Springer, 2022, pp. 121–136. DOI: 10.1007/978-3-030-91096-9_7.

46. A. K. Jha, M. P. Patel, and T. D. Pawar, “Computation offloading using K-nearest neighbour time critical optimisation algorithm in fog computing,” International Journal of Wireless and Mobile Computing, vol. 23, no. 3–4, pp. 281–292, 2022. ISSN: 1741-1084 (Print), 1741-1092 (Online). DOI: 10.1504/IJWMC.2022.127593.

47. A. K. Jha, M. P. Patel, and T. D. Pawar, “Extended hybrid cluster algorithm for computation offloading in fog computing,” International Journal on Technical and Physical Problems of Engineering (IJTPE), issue 51, vol. 14, no. 2, pp. 176–182, Jun. 2022.

48. M. Patel, A. Mehta, A. K. Jha, A. Patel, and A. Nayak, “A deep reinforcement prediction model for live VM migration in fog,” International Journal on Technical and Physical Problems of Engineering (IJTPE), issue 58, vol. 16, no. 1, pp. 277–283, Mar. 2024.

49. V. Soni and A. Jha, “IoT Botnet Attacks Detection Using Deep Learning Approaches: A Review,” IET Conference Proceedings, vol. 2025, no. 7, pp. 253–260, 2025.

50. R. Shankar, I. Kumar, M. Kashyap, A. K. Jha, and B. P. Chaudhary, “A Review on NOMA scheme for emerging 6G wireless networks: State of the Art, Key Schemes, Future scope and Security Issues,” Radioelectronics and Communications Systems, vol. 68, no. 5, pp. 271–284, 2025. DOI: 10.3103/S0735272725010017.

51. M. S. Shaikh, A. K. Jha, B. R. Soni, R. N. K. Patel, and D. P. M., “Flying Edge Intelligence: UAV-Driven Edge Computing for Autonomous Precision Farming,” in Proc. 2025 Int. Conf. Emerging Technol. Eng. Appl. (ICETEA), 2025, pp. 1–6. DOI: 10.1109/ICETEA64585.2025.11099749.

52. A. K. Jha, A. Khatri, K. Kanda, A. Haider, and R. Shah, “A review of security, privacy, and authentication mechanisms in social media web applications,” PUXplore Multidisciplinary Journal of Engineering, vol. 2, no. 1, Mar. 2026, doi: 10.62373/3n8bxz70.

53. Ali, S. I., Kale, G. P., Shaikh, M. S., Ponnusamy, S., & Chouhan, P. S. (2024). AI Applications and Digital Twin Technology Have the Ability to Completely Transform the Future. In S. Ponnusamy, M. Assaf, J. Antari, S. Singh, & S. Kalyanaraman (Eds.), Harnessing AI and Digital Twin Technologies in Businesses (pp. 26-39). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-3234-4.ch003

54. Karunambiga, K., Ali, S. I., Esteban, A. P., & Pascual, M. (2023). Marketing policy in service enterprises using deep learning models. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 239-243.

55. Ali, S. I., Ravuri, H. K., Lakshmi, V. T., Ramya, A., Lavanya, K., & Bahade, S. (2024). The role of nanomaterials in the development of high-performance batteries. Nanotechnology Perceptions, 20(S11), 1125–1140. https://www.nano-ntp.com

56. Ali, S. I., Salunke, B. A., Salunke, S., Chouhan, P. S., & Shahane, S. (2026). Decentralized Smart Grids With AI and Blockchain: Enabling Peer-to-Peer Energy Trading and Energy Equity. In E. Babulak (Ed.), Advancing Energy Production and Distribution With Blockchain and AI (pp. 163-200). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3373-6996-9.ch006

57. Ali, S. I. (2026). Reinforcement Learning for Autonomous Optimization in Intelligent Engineering. In E. Babulak (Ed.), AI-Driven Approaches for Fully Automated Smart Engineering (pp. 313-344). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3373-4839-1.ch011

58. Ali, S. I., Kalaivaani, P. T., Ambigaipriya, S., & Rafeeq, M. D. (2023). Evaluation of AI model performance. In Toward artificial general intelligence: Deep learning, neural networks, generative AI (p. 125). Walter de Gruyter GmbH & Co. KG.

59. Ali, S. I., Jadhav, J., Arunkumar, R., & Kanagavalli, N. (2022). A smart resource utilization algorithm for high-speed 5G communication networks based on cloud servers. ICTACT Journal on Communication Technology, 13(??), 2800. https://doi.org/10.21917/ijct.2022.0414

60. Ali, S. I. (2026). Algorithmic Justice: Navigating AI's Role in Cybersecurity and Legal Transformation. In J. Luftman & A. Tomer (Eds.), Moral and Legal Aspects of Artificial Intelligence: Machine Bias and Rule of Law (pp. 229-264). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3373-3114-0.ch007

61. Ali, S. I., Dubey, A., Salunke, S., Salunke, B. A., & Chopkar, P. N. (2026). Advancing Energy Production and Distribution With Blockchain and AI: Towards Intelligent, Secure, and Sustainable Power Ecosystems. In E. Babulak (Ed.), Advancing Energy Production and Distribution With Blockchain and AI (pp. 83-112). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3373-6996-9.ch004

62. Agal, S., Raulji, K. & Odedra, N.D. A machine learning approach to risk based asset allocation in portfolio optimization. Sci Rep 15, 42263 (2025). https://doi.org/10.1038/s41598-025-26337-x

63. Sanjay Agal, Krishna Raulji, Nikunj Bhavsar and Pooja Bhatt. “Spatiotemporal Graph Networks for Relational Reasoning in Campus Infrastructure Management”. International Journal of Advanced Computer Science and Applications (ijacsa) 16.10 (2025). http://dx.doi.org/10.14569/IJACSA.2025.0161085

Downloads

Published

24-03-2026

Data Availability Statement

This paper is a review of existing research studies on cyberbullying detection using machine learning. No new dataset was created; the study analyzes publicly available research and datasets.

How to Cite

Cyberbullying Detection Using Machine Learning:A Comprehensive Review. (2026). PUXplore Multidisciplinary Journal of Engineering, 2(1). https://puxplore.paruluniversity.ac.in/index.php/PXMJE/article/view/59