Claim Missing Document
Check
Articles

Found 5 Documents
Search

A Comprehensive Approach to Protocols and Security in Internet of Things Technology Ntayagabiri, Jean Pierre; Bentaleb, Youssef; Ndikumagenge, Jeremie; EL Makhtoum, Hind
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11660

Abstract

The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. This article comprehensively analyzes the primary vulnerabilities and risks associated with IoT, exploring innovative strategies and effective solutions to strengthen its security framework. The article highlights the critical role of secure device authentication, data encryption, regular updates, and continuous monitoring by addressing the intricacies of communication protocols and emphasizing the need for standardization. Ultimately, this work advocates for a holistic approach to IoT security, where robust, adaptable solutions are developed to safeguard against the evolving landscape of cyber threats.
A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification Ntayagabiri, Jean Pierre; Bentaleb, Youssef; Ndikumagenge, Jeremie; El Makhtoum, Hind
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11901

Abstract

The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate Naive Bayes, Artificial Neural Networks (ANN), Logistic Regression (LR), k-NN, XGBoost, Random Forest (RF), LightGBM, GRU, LSTM, and CNN algorithms based on some performance metrics. The comparative test results show superior performance to the traditional ensemble approach, with RF achieving 99.29% accuracy and leading precision (82.30%), followed closely by XGBoost with 99.26% accuracy and 79.60% precision. Deep learning approaches also demonstrate strong capabilities, with CNN achieving 98.33% accuracy and 71.18% precision, though these metrics indicate ongoing challenges with class imbalance. The analysis of confusion matrices reveals varying success across different attack types, with some algorithms showing perfect detection rates for certain attacks while struggling with others. The study highlights a crucial distinction in IoT security: while high precision remains important, the potentially catastrophic impact of missed attacks necessitates equal attention to recall metrics, as evidenced by the varying recall rates across algorithms (RF: 72.19%, XGBoost: 71.69%, CNN: 64.72%). These findings provide vital insights for developing balanced, context-aware intrusion detection systems for IoT environments, emphasizing the need to consider performance metrics and practical deployment constraints.
OMIC: A Bagging-Based Ensemble Learning Framework for Large-Scale IoT Intrusion Detection Ntayagabiri, Jean Pierre; Bentaleb, Youssef; Ndikumagenge, Jeremie; El Makhtoum, Hind
Journal of Future Artificial Intelligence and Technologies Vol. 1 No. 4 (2025): March 2025
Publisher : Future Techno Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/faith.3048-3719-63

Abstract

The research focuses on developing an Optimized Multiclass Intrusion Classifier (OMIC), an advanced framework for large-scale network intrusion detection in IoT environments. Traditional intrusion detection systems face significant challenges with increasing network complexity, attack sophistication, and the exponential growth of IoT devices, particularly in handling class imbalance, computational efficiency, and real-time processing of massive data volumes. OMIC introduces a novel ensemble approach combining LightGBM and XGBoost classifiers with a memory-optimized processing pipeline to address these limitations. The framework implements sophisticated data handling techniques, including dynamic chunk-based processing, adaptive sampling methods, and cost-sensitive learning to manage class imbalance. Experimental evaluation using the comprehensive CICIoT2023 dataset, comprising over 1 million records and 33 distinct attack types, demonstrates OMIC's exceptional performance with an overall accuracy of 99.26%. The framework achieves perfect precision, recall, and F1-scores for most DDoS and DoS attack categories, significantly outperforming traditional machine learning and deep learning approaches. While excelling in most attack categories, OMIC shows limitations in detecting certain web-based attacks and reconnaissance activities, suggesting areas for future enhancement. The framework's superior performance in handling large-scale data while maintaining high detection accuracy positions it as a significant advancement in IoT network security, offering practical solutions for real-world deployments.
Explainable Bayesian Network Recommender for Personalized University Program Selection Kikunda, Philippe Boribo; Ndikumagenge, Jérémie; Ndayisaba, Longin; Nsabimana, Thierry
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12720

Abstract

In a context where students face increasingly complex academic choices, this work proposes a recommendation system based on Bayesian networks to guide new baccalaureate holders in their university choices. Using a dataset containing variables such as secondary school section, gender, type of school, percentage obtained, age, and first-year honors, we have constructed a probabilistic model capturing the dependencies between these characteristics and the option chosen. The data is collected at the Catholic University of Bukavu, the Official University of Bukavu, and the Higher Institute of Education of Bukavu, preprocessed and then used to learn the structure via the hill-climbing algorithm with the BIC score using R's bnlearn tool. The model enables us to estimate the probability that a candidate will choose a given stream, depending on their profile. The approach has been validated using metrics such as BIC, cross-validation, and bootstrap and offers a good compromise between interpretability and predictive performance. The results highlight the potential of Bayesian networks in constructing explainable recommendation systems in the field of academic guidance. The system produces orientation probability maps for each candidate, which can be used by enrollment service advisers, as well as an ordered list of options relevant to the candidate's profile. With a remarkable performance on a test sample of precision@k=0.85, recall@k=0.61, ndcg=0.8, and Map=0.88, it constitutes an effective lever for reducing the risk of being misdirected in universities in South-Kivu, in the Democratic Republic of Congo
Predicting First-Year Student Performance with SMOTE-Enhanced Stacking Ensemble and Association Rule Mining for University Success Profiling Kikunda, Philippe Boribo; Kasongo, Issa Tasho; Nsabimana, Thierry; Ndikumagenge, Jérémie; Ndayisaba, Longin; Mushengezi, Elie Zihindula; Kala, Jules Raymond
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14043

Abstract

This study examines the application of Educational Data Mining (EDM) to predict the academic per-formance of first-year students at the Catholic University of Bukavu and the Higher Institute of Edu-cation (ISP) in the Democratic Republic of Congo. The primary objective is to develop a model that can identify at-risk students early, providing the university with a tool to enhance student support and academic guidance. To address the challenges posed by data imbalance (where successful cases outnumber failures), the study adopts a hybrid methodological approach. First, the SMOTE algorithm was applied to balance the dataset. Then, a stacking classification model was developed to combine the predictive power of multiple algorithms. The variables used for prediction include the National Exam score (PEx), the secondary school track (Humanities), and the type of prior institution (public, private, or religious-affiliated schools), as well as age and sex. The results demonstrate that this approach is highly effective. The model is not only capable of predicting success or failure but also of forecasting students' performance levels (e.g., honors or distinctions). Moreover, the use of the Apriori association rule mining algorithm allowed the identification of faculty-specific success profiles, transforming prediction into an interpretable decision-support tool. This research makes several significant contributions. Practically, it provides the University of Bukavu with a tool for student orientation and early risk detection. Methodologically, it illustrates the effectiveness of a combined approach to EDM in an African context. However, the study acknowledges certain limitations, including the non-public nature of the data and the geographical specificity of the sample. It therefore proposes avenues for future research, such as the integration of Explainable AI (XAI) techniques for more refined and transparent analysis of the results.