A simulation-based comparative study of Bayesian VAR forecasting accuracy under heteroscedasticity
DOI:
https://doi.org/10.64497/jssci.45Keywords:
Bayesian VAR, heteroscedasticity, forecast accuracy, hierarchical shrinkage, SSVS, simulation, macroeconomic forecasting.Abstract
This study evaluates the robustness of Bayesian Vector Autoregression (BVAR) models under heteroscedasticity, with the objective of identifying the most reliable approach for forecasting macroeconomic and financial variables in volatile environments. Four BVAR variants were examined: Minnesota prior (BVAR1), Normal-Wishart prior (BVAR2), Stochastic Search Variable Selection (BVAR3), and Hierarchical Shrinkage with SSVS (BVAR4). A Monte Carlo simulation was designed using data generated from VAR processes with heteroscedastic disturbances modeled through ARCH, GARCH, and time-varying covariance structures. Forecast accuracy was assessed using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) across varying levels of variance (low, medium, and large) and sample sizes. Results show that BVAR4 consistently achieved superior accuracy under low and medium heteroscedasticity, particularly with larger samples. Under extreme heteroscedasticity, forecast precision declined for all models, with BVAR3 occasionally rivaling BVAR4. The findings suggest that shrinkage-based BVARs with adaptive selection mechanisms are more robust in environments with mild to moderate volatility. For highly turbulent conditions, however, diagnostic testing, variance-stabilizing transformations, and heteroscedasticity-robust estimation are recommended to improve reliability. These results provide evidence-based guidance for policymakers and practitioners seeking dependable tools for forecasting in uncertain economic contexts.
Downloads
References
[1] Delwar, C. & Jain, S.C., (2019). "Analysis and classification of SQL injection vulnerabilities and attacks on web applications,” International Conference on Advances in Engineering and Technology Research (ICAETR), pp.1- 6.
[2] Han, S.; Xie, M.; & S. Kumar (2021). SQL injection:Types, methodology, attack queries and prevention, 3rd Int.Conf. Computer. Sustainable Global Dev.(INDIACom) pp. 2872–2876.
[3] Slatalla. D. & Himanshu. G. (2020). SQL Filtering: An Effective Technique to prevent SQL Injection Attack, in International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 312 – 317.
[4] Bing .Z., & Chitsutha. S. (2021). “Machine Learning for SQL Injection Prevention on Server- Side Scripting”, in InternationalComputer Science and Engineering Conference (ICSEC),pp. 1-6.
[5] Son, S.; McKinley, K.S.; Shmatikov, V. Diglossia: Detecting code injection attacks with precision and efficiency. Proc. ACM Conf. Comput. Commun. Secur. 2018, 2, 1181–1191. [Google Scholar] [CrossRef]
[6] Devakunchari R. & Valliyammai C. (2022). A top web security vulnerability SQL injection attack”, Seventh International Conference on Advanced Computing (ICoAC).
[7] Delwar.D, (2018). “Advanced Automated SQL Injection Attacks and Defensive Mechanisms”, in Annual Connecticut Conference on Industrial Electronics,Technology & Automation (CT-IETA),pp. 1-6.
[8]. Fonseca.F, & Tarique M., (2019). Detection of SQL injection attacks: A machine learning approach, Int. Conf. Electr. Comput. Technol. Appl. (ICECTA) pp. 1- 6. DOI: https://doi.org/10.1109/ICECTA48151.2019.8959617
[9] Schneider. K, (2021). Based approach for detection of injection attacks, Proc. 2nd IEEE Int. Conf . Intelligent Knowledge. Econ. ICCIKE, pp. 378-383. DOI: https://doi.org/10.1109/ICCIKE51210.2021.9410675
[10] Jovanovic J., & Yukovetskyi O. S. (2021). “SQL Injection Prevention System”, IEEE International Conference Radio Electronics & Communications.
[11] Halfond H., & ThosarS., (2016). “Detection of SQL injection and XSS attacks in three tier web applications”,International Conference on Computing Communication Control and automation (IC-CUBEA).
[12] Huang H,& Srinivas A. (2023). “An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection”, International Conference on Trust, Security and Privacy in Computing
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ossai Tobias Chukwudi, Monday Osagie Adenomon, Emmanuel Chaku Shammah, Nweze Nwaeze Obini

This work is licensed under a Creative Commons Attribution 4.0 International License.
- Abstract 287
- PDF 127

