The development and implementation of anomaly-based man-in-the- middle intrusion detection system with an improved ensemble modelling scheme in domain name server and edgecomputing

dc.contributor.advisorVelempini, M.
dc.contributor.authorMoila, Ramahlapane Lerato
dc.date.accessioned2025-09-05T06:39:26Z
dc.date.available2025-09-05T06:39:26Z
dc.date.issued2025
dc.descriptionThesis (Ph.D. (Computer Science)) -- University of Limpopo, 2025en_US
dc.description.abstractTechnology is evolving at a rapid pace and its role in adding value to businesses around the world has come sharply into focus. Due to this rapid growth of devices, the centralised cloud is now experiencing significant difficulties in protecting large volumes of digital data. It has also become expensive to manage and maintain data accuracy. Mobile Edge Computing has become a promising solution with innovative data management, cost effectiveness, reliability, and uninterrupted connectivity. While the technology has transformed how data is handled and processed, it remains susceptible to security attacks such as Man-in-the-Middle (MitM) attacks. These attacks can cause severe consequences, as the attacker can intercept communications between any two parties without their knowledge, compromising and disrupting sensitive data, card credentials, and passwords. This study aims to develop an anomaly-based intrusion detection scheme using ensemble modelling to combat MitM attacks. The scheme is designed to address false positives and improve accuracy. The proposed Ensemble Cuckoo was trained on Kaggle platform using Python as a programming language. We used the Cuckoo Search Algorithm to optimise the ensemble model (random forest). The scheme was compared to the Support Vector Machine (SVM) and the Local Outlier Factor (LOF) algorithms. To evaluate the effectiveness of the proposed Ensemble Cuckoo, this study utilised the F1-score, Precision, Recall and Accuracy metrics. The simulation results indicate that the proposed Ensemble Cuckoo outperformed the algorithms it was compared against, achieving detection accuracy of 99.9%, showing a good improvement in terms of minimising false positives. The results were validated using Bayesian Dynamic Stackelberg Game Theory, which simulates the interactions between the defender and the attacker. Despite its effectiveness, the study acknowledges certain limitations, including the need for refinement in real-time processing and challenges related to scaling in large, and distributed networks. Future research could focus on extending the application of the proposed Ensemble Cuckoo, paving the way for broader adoption and deployment in real-world scenarios.en_US
dc.description.sponsorshipUniversity of Limpopo and MICSETA bursaryen_US
dc.format.extentxii, 119 leavesen_US
dc.identifier.urihttp://hdl.handle.net/10386/5029
dc.language.isoenen_US
dc.relation.requiresPDFen_US
dc.subjectCuckoo Search Algorithmen_US
dc.subjectMan-in-the-middle attacksen_US
dc.subjectMobile edge computingen_US
dc.subjectDetection accuracyen_US
dc.subjectEnsemble modellingen_US
dc.subjectSupport vector machineen_US
dc.subjectLocal outlier factoren_US
dc.subjectBayesian dynamic Stackelberg game theoryen_US
dc.subject.lcshComputersen_US
dc.subject.lcshEdge computingen_US
dc.subject.lcshComputer simulationen_US
dc.subject.lcshModelingen_US
dc.subject.lcshIntrusion detection systems (Computer security)en_US
dc.titleThe development and implementation of anomaly-based man-in-the- middle intrusion detection system with an improved ensemble modelling scheme in domain name server and edgecomputingen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
moila_rl_2025.pdf
Size:
3.8 MB
Format:
Adobe Portable Document Format
Description:
Thesis

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed upon to submission
Description: