<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>School of Computing and Informatics</title>
<link href="http://repository.must.ac.ke/handle/123456789/1446" rel="alternate"/>
<subtitle/>
<id>http://repository.must.ac.ke/handle/123456789/1446</id>
<updated>2026-05-05T13:01:59Z</updated>
<dc:date>2026-05-05T13:01:59Z</dc:date>
<entry>
<title>Enhanced Security Monitoring in Internet of Things Systems Through Intrusion Detection Model</title>
<link href="http://repository.must.ac.ke/handle/123456789/1618" rel="alternate"/>
<author>
<name>Imathiu, Joseph Gitonga</name>
</author>
<id>http://repository.must.ac.ke/handle/123456789/1618</id>
<updated>2026-04-29T08:06:23Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">Enhanced Security Monitoring in Internet of Things Systems Through Intrusion Detection Model
Imathiu, Joseph Gitonga
Intrusion detection systems (IDS) play a pivotal role in identifying and mitigating potential &#13;
threats and vulnerabilities in IoT devices. IoT devices holds crucial data. Internet of Things &#13;
(IoT) has rapidly evolved into a field that involves the interconnection and interaction of &#13;
smart objects, which have embedded sensors, on-board data processing capability, and a &#13;
means of communication, to provide automated services and applications. The &#13;
proliferation of Internet of Things (IoT) devices usage has exponentially increased the &#13;
attack surface, necessitating robust security mechanisms. This is because many IoT &#13;
devices operate with limited computational resources, constrained memory, and low&#13;
power capabilities, making them susceptible to security breaches. Additionally, the sheer &#13;
diversity of device types, communication protocols, and deployment scenarios introduces &#13;
a complex attack surface, providing malicious actors with numerous entry points to &#13;
exploit. Traditional security measures have proved insufficient against sophisticated &#13;
attacks targeting generally IoT ecosystems because of their high demand on resources. &#13;
Therefore, this research explores on enhancing security for IoTs which are resource &#13;
constraints with a model optimized for efficiency, minimizing computational overhead and &#13;
energy consumption by employing an Intrusion Detection System (IDS). The model &#13;
approach involves designing and developing of an IDS using machine learning algorithms &#13;
for anomaly detection of the network traffic patterns to identify potential security breaches. &#13;
The dataset was downloaded from Kaggle after creation of an account and cleaned to get &#13;
relevant structured data for training and evaluating the model. The model training utilized &#13;
pro deep neural network architecture and NSL-KDD dataset which was split into training &#13;
(70%), validation (15%), and testing (15%) subsets using stratified sampling to maintain &#13;
the class distribution across all subsets. The model's performance was assessed using &#13;
multiple metrics like accuracy, precision, recall, F1-Score, FAR and Receiver Operating &#13;
Characteristic Area Under the Curve) providing a comprehensive understanding of its &#13;
capabilities. The model achieved Accuracy of 97.8%, Precision 0.976, false alarm rate of &#13;
1.54, 0.95, F1-score of 96.28% and an overall ROC AUC of 0.97. This results provided &#13;
insights into the ability to correctly classify network traffic as either normal or malicious, &#13;
as well as its effectiveness in detecting specific attack types in IoTs.
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Hybrid Ensemble Boosting Model for  Enhanced Blood Donor Retention</title>
<link href="http://repository.must.ac.ke/handle/123456789/1617" rel="alternate"/>
<author>
<name>Kiarie, Nahashon</name>
</author>
<id>http://repository.must.ac.ke/handle/123456789/1617</id>
<updated>2026-04-29T07:58:56Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">A Hybrid Ensemble Boosting Model for  Enhanced Blood Donor Retention
Kiarie, Nahashon
Blood donor retention is critical for maintaining a stable and reliable blood supply, yet &#13;
predicting donor retention remains a complex challenge. Previous attempts to develop blood &#13;
donor retention models relied on single algorithms and achieved relatively low prediction &#13;
accuracy limiting their practical application for donor retention. The Light Gradient Boosting &#13;
Machine (Light GBM) algorithm employs leaf-wise growth strategy, excels in loss reduction &#13;
and hence improves accuracy. However, this may lead to potential overfitting, on the other &#13;
hand, the Extreme Gradient Boosting(XGBoost) algorithm incorporates a robust mechanism &#13;
for combating overfitting, such as the regularization parameter, column sampling, and weight &#13;
reduction on new trees but employs a level-wise growth strategy, which is sometimes &#13;
computationally intensive. This study developed a hybrid ensemble gradient boosting model &#13;
based on XGBoost and Light GBM. The ensemble model leverages on the high accuracy of &#13;
Light GBM while mitigating overfitting through and the overfitting prevention strategies of &#13;
XGBoost. The data was obtained from the Kenya blood banks with 5000 records and nine &#13;
features. The base models were trained in parallel, a weighted ensemble model was created &#13;
by assigning weights to the respective prediction results of each model, the ensemble model &#13;
was then evaluated and the accuracy compared with the accuracy achieved by the individual &#13;
algorithms. Bayesian hyperparameter optimization was implemented on the base learners in &#13;
order to find the best combination of hyperparameters and further improve the performance &#13;
of the model. The ensemble model achieved a performance accuracy of 99.00% and F1 score &#13;
of 99.00%. This study enables blood agencies to accurately predict blood donor retention, &#13;
thereby reducing the need for constant donor recruitment efforts and saving both time and &#13;
costs. Additionally, it will provide insights for targeted retention strategies, ensuring a steady &#13;
blood supply, ultimately saving lives and improving healthcare systems.
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Stateful Firewall Packet Analysis Framework for Mitigating Session Fixation Attacks</title>
<link href="http://repository.must.ac.ke/handle/123456789/1596" rel="alternate"/>
<author>
<name>Kailanya, Eunice</name>
</author>
<id>http://repository.must.ac.ke/handle/123456789/1596</id>
<updated>2026-04-23T07:24:54Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">A Stateful Firewall Packet Analysis Framework for Mitigating Session Fixation Attacks
Kailanya, Eunice
Protecting the networks against web attacks has become increasingly critical. As network&#13;
attacks continue to evolve in complexity and sophistication, stateful firewall solutions have&#13;
proven to be insufficient in defending against session fixation attacks. Session fixation&#13;
attacks pose a significant threat to web security by exploiting vulnerabilities in session&#13;
management to hijack authenticated user sessions. Existing stateful firewall models can&#13;
filter attacks such as denial of service, distributed denial of service, man-in-the-middle,&#13;
malware, ransomware and spamming. However, they are unable to filter session fixation&#13;
attacks due to their filtering mechanisms. The aim of this study was to develop a stateful&#13;
firewall packet analysis model that operates in network layer to detect and filter session&#13;
fixation attack. By maintaining state information across network sessions, the model&#13;
analyzed packet sequences and patterns to identify anomalies indicative of session fixation&#13;
attempts. Gradient booster classifier algorithm was incorporated into the model to enhance&#13;
accuracy in analyzing the packet. Virtual machine simulation experiment was performed to&#13;
evaluate the accuracy of the model using Cross-Site Scripting (XSS) datasets vulnerable to&#13;
session fixation attacks alongside normal user traffic. The model detection rate, false&#13;
positive and false negative metrics was measured to assess the accuracy of the model. The&#13;
experimental results demonstrated that the model effectively detected and mitigated session&#13;
fixation attacks by analyzing session parameters and maintaining session state consistency.&#13;
Experimental evaluation validated the high model detection accuracy level of 98.5 % with&#13;
minimal false positives. By tracking the state of each session and analyzing packet-level&#13;
data the model is capable of detecting suspicious patterns associated with session fixation&#13;
attempts. The adoption and integration of the model into the network security framework not&#13;
only strengthens protection at the application layer but also reduces the risk of session&#13;
hijacking
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Hybrid recommender model for career pathway selection in Competency-Based Education</title>
<link href="http://repository.must.ac.ke/handle/123456789/1475" rel="alternate"/>
<author>
<name>Micheni, Fridah Kainyu</name>
</author>
<id>http://repository.must.ac.ke/handle/123456789/1475</id>
<updated>2025-04-15T08:16:40Z</updated>
<published>2024-01-01T00:00:00Z</published>
<summary type="text">A Hybrid recommender model for career pathway selection in Competency-Based Education
Micheni, Fridah Kainyu
This study addresses the problem of inadequate guidance for learners in Competency-Based Education (CBE) when selecting career pathways, as current models often overlook important factors such as academic performance, personal interests, extracurricular activities, and career goals. In CBE, learners follow personalized, flexible learning paths based on their prior knowledge and skills, but career pathway decisions are frequently influenced by parents, teachers, and career counselors, missing the critical elements that help learners make informed choices. While recommender models are widely used in education for course selection and career advising, they have typically failed to integrate these diverse factors comprehensively. To address this gap, the study developed a hybrid recommender model designed to enhance career pathway selection in CBE. Using a mixed-method research design, data was collected through an online survey of 1,487 teachers from junior secondary schools in Meru County, focusing on factors influencing career pathway decisions. Analysis done in SPSS revealed that academic performance, personal interests, extracurricular activities, career goals, and job market trends are crucial to these decisions. Based on these insights, a CBE senior school dataset was created, and a hybrid recommender model was developed using hybrid filtering, deep neural networks, and random forest algorithms, combined through a stacking ensemble method. The model was validated using k-fold cross-validation and achieved an accuracy of 90.06% when applied to STEM career pathway tracks. These findings suggest that the hybrid model is effective in guiding learners toward appropriate STEM career pathway tracks in CBE. Future work could explore more advanced algorithms and expand the model to include additional career pathways.
</summary>
<dc:date>2024-01-01T00:00:00Z</dc:date>
</entry>
</feed>
