Show simple item record

dc.contributor.advisor Velempini, M.
dc.contributor.author Moila, Ramahlapane Lerato
dc.date.accessioned 2025-09-05T06:39:26Z
dc.date.available 2025-09-05T06:39:26Z
dc.date.issued 2025
dc.identifier.uri http://hdl.handle.net/10386/5029
dc.description Thesis (Ph.D. (Computer Science)) -- University of Limpopo, 2025 en_US
dc.description.abstract Technology is evolving at a rapid pace and its role in adding value to businesses around the world has come sharply into focus. Due to this rapid growth of devices, the centralised cloud is now experiencing significant difficulties in protecting large volumes of digital data. It has also become expensive to manage and maintain data accuracy. Mobile Edge Computing has become a promising solution with innovative data management, cost effectiveness, reliability, and uninterrupted connectivity. While the technology has transformed how data is handled and processed, it remains susceptible to security attacks such as Man-in-the-Middle (MitM) attacks. These attacks can cause severe consequences, as the attacker can intercept communications between any two parties without their knowledge, compromising and disrupting sensitive data, card credentials, and passwords. This study aims to develop an anomaly-based intrusion detection scheme using ensemble modelling to combat MitM attacks. The scheme is designed to address false positives and improve accuracy. The proposed Ensemble Cuckoo was trained on Kaggle platform using Python as a programming language. We used the Cuckoo Search Algorithm to optimise the ensemble model (random forest). The scheme was compared to the Support Vector Machine (SVM) and the Local Outlier Factor (LOF) algorithms. To evaluate the effectiveness of the proposed Ensemble Cuckoo, this study utilised the F1-score, Precision, Recall and Accuracy metrics. The simulation results indicate that the proposed Ensemble Cuckoo outperformed the algorithms it was compared against, achieving detection accuracy of 99.9%, showing a good improvement in terms of minimising false positives. The results were validated using Bayesian Dynamic Stackelberg Game Theory, which simulates the interactions between the defender and the attacker. Despite its effectiveness, the study acknowledges certain limitations, including the need for refinement in real-time processing and challenges related to scaling in large, and distributed networks. Future research could focus on extending the application of the proposed Ensemble Cuckoo, paving the way for broader adoption and deployment in real-world scenarios. en_US
dc.description.sponsorship University of Limpopo and MICSETA bursary en_US
dc.format.extent xii, 119 leaves en_US
dc.language.iso en en_US
dc.relation.requires PDF en_US
dc.subject Cuckoo Search Algorithm en_US
dc.subject Man-in-the-middle attacks en_US
dc.subject Mobile edge computing en_US
dc.subject Detection accuracy en_US
dc.subject Ensemble modelling en_US
dc.subject Support vector machine en_US
dc.subject Local outlier factor en_US
dc.subject Bayesian dynamic Stackelberg game theory en_US
dc.subject.lcsh Computers en_US
dc.subject.lcsh Edge computing en_US
dc.subject.lcsh Computer simulation en_US
dc.subject.lcsh Modeling en_US
dc.subject.lcsh Intrusion detection systems (Computer security) en_US
dc.title The development and implementation of anomaly-based man-in-the- middle intrusion detection system with an improved ensemble modelling scheme in domain name server and edgecomputing en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULSpace


Browse

My Account