• Login
    View Item 
    •   Repository Home
    • Theses and Dissertations
    • Master's - Theses
    • School of Computing and Informatics
    • View Item
    •   Repository Home
    • Theses and Dissertations
    • Master's - Theses
    • School of Computing and Informatics
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Enhanced Security Monitoring in Internet of Things Systems Through Intrusion Detection Model

    Thumbnail
    View/Open
    Full text (2.805Mb)
    Date
    2025
    Author
    Imathiu, Joseph Gitonga
    Metadata
    Show full item record
    Abstract
    Intrusion detection systems (IDS) play a pivotal role in identifying and mitigating potential threats and vulnerabilities in IoT devices. IoT devices holds crucial data. Internet of Things (IoT) has rapidly evolved into a field that involves the interconnection and interaction of smart objects, which have embedded sensors, on-board data processing capability, and a means of communication, to provide automated services and applications. The proliferation of Internet of Things (IoT) devices usage has exponentially increased the attack surface, necessitating robust security mechanisms. This is because many IoT devices operate with limited computational resources, constrained memory, and low power capabilities, making them susceptible to security breaches. Additionally, the sheer diversity of device types, communication protocols, and deployment scenarios introduces a complex attack surface, providing malicious actors with numerous entry points to exploit. Traditional security measures have proved insufficient against sophisticated attacks targeting generally IoT ecosystems because of their high demand on resources. Therefore, this research explores on enhancing security for IoTs which are resource constraints with a model optimized for efficiency, minimizing computational overhead and energy consumption by employing an Intrusion Detection System (IDS). The model approach involves designing and developing of an IDS using machine learning algorithms for anomaly detection of the network traffic patterns to identify potential security breaches. The dataset was downloaded from Kaggle after creation of an account and cleaned to get relevant structured data for training and evaluating the model. The model training utilized pro deep neural network architecture and NSL-KDD dataset which was split into training (70%), validation (15%), and testing (15%) subsets using stratified sampling to maintain the class distribution across all subsets. The model's performance was assessed using multiple metrics like accuracy, precision, recall, F1-Score, FAR and Receiver Operating Characteristic Area Under the Curve) providing a comprehensive understanding of its capabilities. The model achieved Accuracy of 97.8%, Precision 0.976, false alarm rate of 1.54, 0.95, F1-score of 96.28% and an overall ROC AUC of 0.97. This results provided insights into the ability to correctly classify network traffic as either normal or malicious, as well as its effectiveness in detecting specific attack types in IoTs.
    URI
    http://repository.must.ac.ke/handle/123456789/1618
    Collections
    • School of Computing and Informatics [6]

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository
     

     

    Browse

    All of the RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository