Uloko, Felix Oshiorenoya
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Isolation Forest–Based Intrusion Detection for Cyber-Physical Systems Oise, Godfrey Perfectson; Konyeha, Susan; Uloko, Felix Oshiorenoya; Pius, Kevin Chinedu; Eferoba–Idio, Enovwo; Edobor, Michael Uyiosa; Mintah, Evans; Ukpebor, Osahon; Sokoya, Oludare; Jessa, Tejiri
Scientific Journal of Engineering Research Vol. 2 No. 2 (2026): June
Publisher : PT. Teknologi Futuristik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64539/sjer.v2i2.2026.434

Abstract

Cyber-physical engineering systems (CPES) form the backbone of critical infrastructures such as power generation, industrial automation, and water treatment facilities. Because cyber intrusions in these environments can directly disrupt physical processes, reliable intrusion detection mechanisms are essential for maintaining operational safety and system resilience. However, many existing intrusion detection approaches rely on supervised learning techniques that require large volumes of labeled attack data, which are rarely available in real industrial environments. In addition, advanced detection methods often introduce significant computational overhead, limiting their practicality for deployment in resource-constrained cyber-physical systems. To address these challenges, this study proposes a one-class anomaly detection framework based on the Isolation Forest algorithm for monitoring cyber-physical engineering systems. The proposed approach learns the statistical distribution of normal operational behavior using multivariate sensor, actuator, and control signals, and identifies deviations from this learned pattern as potential cyber intrusions. The framework is evaluated using the Hardware-in-the-Loop–based Augmented Industrial Control System (HAI) Security Dataset, which provides realistic industrial process measurements under both normal and attack scenarios. Experimental results show that the model achieves overall accuracy (0.89) and strong performance in identifying normal operational states (F1-score = 0.94). However, attack detection shows moderate recall (0.48) but low precision (0.04) due to class imbalance and overlapping anomaly score distributions. These findings indicate that Isolation Forest serves as a computationally efficient baseline anomaly detection mechanism for real-time CPS monitoring, while highlighting the need for hybrid and temporally aware detection strategies to improve attack discrimination in industrial cyber-physical environments.
Energy-Efficient Federated Learning with Temporal Convolutional Networks for Intrusion Detection Oise, Godfrey Perfectson; Uloko, Felix Oshiorenoya; Pius, Kevin Chinedu; Oshasha, Roli Lydia; Osemwegie, Eric Edeigue; Obrorindo, Immunhierokene Clinton
Methods in Science and Technology Studies Vol. 2 No. 1 (2026): June Article in Process
Publisher : PT. Teknologi Futuristik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64539/msts.v2i1.2026.462

Abstract

The rapid proliferation of Internet of Things (IoT) devices has significantly increased the attack surface of modern network infrastructures, necessitating intelligent and scalable intrusion detection systems. Federated Learning (FL) has emerged as a promising paradigm for distributed model training without centralized data sharing; however, challenges such as energy efficiency, data heterogeneity, and privacy preservation remain inadequately addressed. Existing studies often emphasize optimization objectives theoretically without validating them under realistic constraints. This paper proposes an energy-aware federated learning framework integrating Temporal Convolutional Networks (TCNs) for intrusion detection using distributed network traffic data. The framework incorporates differential privacy for secure model updates and a conceptual energy-aware client participation strategy. Experiments are conducted on the UNSW-NB15 dataset under a controlled setting with fixed client participation and communication parameters. The results demonstrate that the proposed model achieves improved classification accuracy and stable convergence behavior across communication rounds while operating under a fixed energy budget. However, energy consumption remains constant due to controlled experimental conditions, indicating that the study evaluates performance under energy constraints rather than dynamic energy optimization. The findings highlight the effectiveness of TCN-based federated models for intrusion detection in resource-constrained environments. Future work will focus on dynamic energy modeling, heterogeneous client environments, and comprehensive multi-objective evaluation.