Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble

Authors

  • Paul Avweresuo Onoma Federal University of Petroleum Resources Effurun
  • Joy Agboi Delta State University Abraka
  • Victor Ochuko Geteloma Federal University of Petroleum Resources Effurun
  • Asuobite ThankGod Max-Egba Federal University of Petroleum Resources Effurun
  • Andrew Okonji Eboka Federal College of Education (Technical) Asaba
  • Arnold Adimabua Ojugo Federal University of Petroleum Resources Effurun
  • Christopher Chukwufunaya Odiakaoase Dennis Osadebay University Asaba
  • Eferhire Valentine Ugbotu Dennis Osadebay University Asaba
  • Tabitha Chukwudi Aghaunor Robert Morris University
  • Amaka Patience Binitie University of Salford

DOI:

https://doi.org/10.59247/jfsc.v3i1.279

Keywords:

Anomaly Detection, Intrusion, Machine Learning, Boosting Ensemble, Tree-based Algorithms

Abstract

The eased accessibility, mobility, and portability of smartphones have caused the consequent rise in the proliferation of users' vulnerability to a variety of phishing attacks. Some users are more vulnerable due to factors like personality behavioral traits, media presence, and other factors. Our study seeks to reveal cues utilized by successful attacks by identifying web content as genuine and malicious data. We explore a sentiment-based extreme gradient boost learner with data collected over social platforms, scraped using the Python Google Scrapper. Our results show AdaBoost yields a prediction accuracy of 0.9989 to correctly classify 2148 cases with incorrectly classified 25 cases. The result shows the tree-based AdaBoost ensemble can effectively identify phishing cues and efficiently classify phishing lures against unsuspecting users from access to malicious content.

References

A. A. Ojugo et al., “Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 1–11, 2023, https://doi.org/10.33633/jcta.v1i2.9259.

F. O. Aghware et al., “BloFoPASS: A blockchain food palliatives tracer support system for resolving welfare distribution crisis in Nigeria,” Int. J. Informatics Commun. Technol., vol. 13, no. 2, p. 178, Aug. 2024, https://doi.org/10.11591/ijict.v13i2.pp178-187.

H. Tingfei, C. Guangquan, and H. Kuihua, “Using Variational Auto Encoding in Credit Card Fraud Detection,” IEEE Access, vol. 8, pp. 149841–149853, 2020, https://doi.org/10.1109/ACCESS.2020.3015600.

A. Kiran, S. W. Prakash, B. A. Kumar, Likhitha, T. Sameeratmaja and U. S. S. R. Charan, "Intrusion Detection System Using Machine Learning," 2023 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-4, 2023, https://doi.org/10.1109/ICCCI56745.2023.10128363.

A. A. Ojugo and D. A. Oyemade, “Boyer moore string-match framework for a hybrid short message service spam filtering technique,” IAES Int. J. Artif. Intell., vol. 10, no. 3, pp. 519–527, 2021, https://doi.org/10.11591/ijai.v10.i3.pp519-527.

R. R. Atuduhor et al., “StreamBoostE: A Hybrid Boosting-Collaborative Filter Scheme for Adaptive User-Item Recommender for Streaming Services,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 10, no. 2, pp. 89–106, 2024, https://doi.org/10.22624/AIMS/V10N2P8.

G. Sasikala et al., “An Innovative Sensing Machine Learning Technique to Detect Credit Card Frauds in Wireless Communications,” Wirel. Commun. Mob. Comput., vol. 2022, pp. 1–12, 2022, https://doi.org/10.1155/2022/2439205.

S. V. S. . Lakshimi and S. D. Kavila, “Machine Learning for Credit Card Fraud Detection System,” Int. J. Appl. Eng. Res., vol. 15, no. 24, pp. 16819–16824, 2018, https://doi.org/10.1007/978-981-33-6893-4_20.

A. M. Ifioko et al., “CoDuBoTeSS: A Pilot Study to Eradicate Counterfeit Drugs via a Blockchain Tracer Support System on the Nigerian Frontier,” J. Behav. Informatics, Digit. Humanit. Dev. Res., vol. 10, no. 2, pp. 53–74, 2024, https://doi.org/10.22624/AIMS/BIJ/V10N1P6.

B. O. Malasowe, F. O. Aghware, M. D. Okpor, B. E. Edim, R. E. Ako, and A. A. Ojugo, “Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment ( EdTech ),” J. Sci. Technol. Res., vol. 6, no. 2, pp. 293–311, 2024, https://doi.org/10.5281/zenodo.12617068.

S. N. Okofu et al., “Pilot Study on Consumer Preference, Intentions and Trust on Purchasing-Pattern for Online Virtual Shops,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 7, pp. 804–811, 2024, https://doi.org/10.14569/IJACSA.2024.0150780.

B. O. Malasowe et al., “Quest for Empirical Solution to Runoff Prediction in Nigeria via Random Forest Ensemble: Pilot Study,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 10, no. 1, pp. 73–90, Mar. 2024, https://doi.org/10.22624/AIMS/BHI/V10N1P8.

D. R. I. M. Setiadi, A. R. Muslikh, S. W. Iriananda, W. Warto, J. Gondohanindijo, and A. A. Ojugo, “Outlier Detection Using Gaussian Mixture Model Clustering to Optimize XGBoost for Credit Approval Prediction,” J. Comput. Theor. Appl., vol. 2, no. 2, pp. 244–255, 2024, https://doi.org/10.62411/jcta.11638.

N. Vaughan, "Swapping algorithm and meta-heuristic solutions for combinatorial optimization n-queens problem," 2015 Science and Information Conference (SAI), pp. 102-104, 2015, https://doi.org/10.1109/SAI.2015.7237132.

A. Algarni, Y. Xu, and T. Chan, “An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook,” Eur. J. Inf. Syst., vol. 26, no. 6, pp. 661–687, 2017, https://doi.org/10.1057/s41303-017-0057-y.

R. E. Ako et al., “Pilot Study on Fibromyalgia Disorder Detection via XGBoosted Stacked-Learning with SMOTE-Tomek Data Balancing Approach,” NIPES - J. Sci. Technol. Res., vol. 7, no. 1, pp. 12–22, 2025, https://doi.org/10.37933/nipes/7.1.2025.2.

A. Basit, M. Zafar, A. R. Javed and Z. Jalil, "A Novel Ensemble Machine Learning Method to Detect Phishing Attack," 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-5, 2020, https://doi.org/10.1109/INMIC50486.2020.9318210.

S. O. Dawodu, A. Omotosho, J. A. Odunayo, O. A. Abimbola, and S. K. Ewuga, “Cybersecurity Risk Assessment in Banking: Methodologies and Best Practices,” Comput. Sci. IT Res. J., vol. 4, no. 3, pp. 220–243, 2023, https://doi.org/10.51594/csitrj.v4i3.659.

Y. Srivastava, P. Khanna and S. Kumar, "Estimation of Gestational Diabetes Mellitus using Azure AI Services," 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 321-326, 2019, https://doi.org/10.1109/AICAI.2019.8701307.

J. Yao, C. Wang, C. Hu, and X. Huang, “Chinese Spam Detection Using a Hybrid BiGRU-CNN Network with Joint Textual and Phonetic Embedding,” Electronics, vol. 11, no. 15, p. 2418, Aug. 2022, https://doi.org/10.3390/electronics11152418.

P. O. Ejeh et al., “Counterfeit Drugs Detection in the Nigeria Pharma-Chain via Enhanced Blockchain-based Mobile Authentication Service,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 12, no. 2, pp. 25–44, 2024, https://doi.org/10.22624/AIMS/MATHS/V12N2P3.

D. A. Oyemade and A. A. Ojugo, “A property oriented pandemic surviving trading model,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 9, no. 5, pp. 7397–7404, 2020, https://doi.org/10.30534/ijatcse/2020/71952020.

E. R. Altman, “Synthesizing Credit Card Transactions,” In Proceedings of the Second ACM International Conference on AI in Finance, pp. 1-9, 2021, https://doi.org/10.1145/3490354.3494378.

V. Umarani, A. Julian, and J. Deepa, “Sentiment Analysis using various Machine Learning and Deep Learning Techniques,” J. Niger. Soc. Phys. Sci., vol. 3, no. 4, pp. 385–394, 2021, https://doi.org/10.46481/jnsps.2021.308.

M. I. Akazue et al., “FiMoDeAL: pilot study on shortest path heuristics in wireless sensor network for fire detection and alert ensemble,” Bull. Electr. Eng. Informatics, vol. 13, no. 5, pp. 3534–3543, 2024, https://doi.org/10.11591/eei.v13i5.8084.

N. R. Pratama, D. R. I. M. Setiadi, I. Harkespan, and A. A. Ojugo, “Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models,” J. Comput. Theor. Appl., vol. 2, no. 3, pp. 427–440, 2025, https://doi.org/10.62411/jcta.12255.

L. R. Zuama, D. R. I. M. Setiadi, A. Susanto, S. Santosa, and A. A. Ojugo, “High-Performance Face Spoofing Detection using Feature Fusion of FaceNet and Tuned DenseNet201,” J. Futur. Artif. Intell. Technol., vol. 1, no. 4, pp. 385–400, 2025, https://doi.org/10.62411/faith.3048-3719-62.

M. D. Okpor et al., “Pilot Study on Enhanced Detection of Cues over Malicious Sites Using Data Balancing on the Random Forest Ensemble,” J. Futur. Artif. Intell. Technol., vol. 1, no. 2, pp. 109–123, 2024, https://doi.org/10.62411/faith.2024-14.

I. Benchaji, S. Douzi, B. El Ouahidi, and J. Jaafari, “Enhanced credit card fraud detection based on attention mechanism and LSTM deep model,” J. Big Data, vol. 8, no. 1, p. 151, Dec. 2021, https://doi.org/10.1186/s40537-021-00541-8.

F. O. Aghware, R. E. Yoro, P. O. Ejeh, C. C. Odiakaose, F. U. Emordi, and A. A. Ojugo, “DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 6, pp. 94–100, 2023, https://doi.org/10.14569/IJACSA.2023.0140610.

D. Varmedja, M. Karanovic, S. Sladojevic, M. Arsenovic, and A. Anderla, “Credit Card Fraud Detection - Machine Learning methods,” in 2019 18th International Symposium INFOTEH-JAHORINA (INFOTEH), pp. 1–5, 2019, https://doi.org/10.1109/INFOTEH.2019.8717766.

C. Li, N. Ding, H. Dong, and Y. Zhai, “Application of Credit Card Fraud Detection Based on CS-SVM,” Int. J. Mach. Learn. Comput., vol. 11, no. 1, pp. 34–39, 2021, https://doi.org/10.18178/ijmlc.2021.11.1.1011.

V. O. Geteloma et al., “Enhanced data augmentation for predicting consumer churn rate with monetization and retention strategies : a pilot study,” Appl. Eng. Technol., vol. 3, no. 1, pp. 35–51, 2024, https://doi.org/10.31763/aet.v3i1.1408.

S. E. Brizimor et al., “WiSeCart: Sensor-based Smart-Cart with Self-Payment Mode to Improve Shopping Experience and Inventory Management,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 10, no. 1, pp. 53–74, 2024, https://doi.org/10.22624/AIMS/SIJ/V10N1P7.

T. Muralidharan and N. Nissim, “Improving malicious email detection through novel designated deep-learning architectures utilizing entire email,” Neural Networks, vol. 157, pp. 257-279, 2023, https://doi.org/10.1016/j.neunet.2022.09.002.

A. A. Ojugo and O. D. Otakore, “Forging An Optimized Bayesian Network Model With Selected Parameters For Detection of The Coronavirus In Delta State of Nigeria,” J. Appl. Sci. Eng. Technol. Educ., vol. 3, no. 1, pp. 37–45, Apr. 2021, https://doi.org/10.35877/454RI.asci2163.

F. Jáñez-Martino, E. Fidalgo, S. González-Martínez, and J. Velasco-Mata, “Classification of Spam Emails through Hierarchical Clustering and Supervised Learning,” Natl. Cybersecurity Inst., vol. 24, pp. 1–4, 2020, https://doi.org/10.48550/arXiv.2005.08773.

M. Kuradusenge et al., “Crop yield prediction using machine learning models: Case of Irish potato and maize,” Agriculture, vol. 13, no. 1, p. 225, 2023, https://doi.org/10.3390/agriculture13010225.

K. A. Egbe, A. Ike, and F. Egbe, “Knowledge and burden of hepatitis B virus in Nasarawa State, Nigeria,” Scientific African, vol. 22, p. e01938, 2023, https://doi.org/10.1016/j.sciaf.2023.e01938.

A. A. Ojugo and A. O. Eboka, “Extending Campus Network Via Intranet and IP-Telephony For Better Performance and Service Delivery: Meeting Organizational Goals,” J. Appl. Sci. Eng. Technol. Educ., vol. 1, no. 2, pp. 94–104, 2019, https://doi.org/10.35877/454RI.asci12100.

A. A. Ojugo et al., “Dependable Community-Cloud Framework for Smartphones,” Am. J. Networks Commun., vol. 4, no. 4, p. 95, 2015, https://doi.org/10.11648/j.ajnc.20150404.13.

N. M. Shahani, X. Zheng, C. Liu, F. U. Hassan, and P. Li, “Developing an XGBoost Regression Model for Predicting Young’s Modulus of Intact Sedimentary Rocks for the Stability of Surface and Subsurface Structures,” Front. Earth Sci., vol. 9, 2021, https://doi.org/10.3389/feart.2021.761990.

E. Ileberi, Y. Sun, and Z. Wang, “A machine learning based credit card fraud detection using the GA algorithm for feature selection,” Journal of Big Data, vol. 9, no. 1, p. 24, 2022, https://doi.org/10.1186/s40537-022-00573-8.

K. Muhamada, D. R. Ignatius, M. Setiadi, U. Sudibyo, B. Widjajanto, and A. A. Ojugo, “Exploring Machine Learning and Deep Learning Techniques for Occluded Face Recognition: A Comprehensive Survey and Comparative Analysis,” J. Futur. Artif. Intell. Technol., vol. 1, no. 2, pp. 160–173, 2024, https://doi.org/10.62411/faith.2024-30.

F. Omoruwou, A. A. Ojugo, and S. E. Ilodigwe, “Strategic Feature Selection for Enhanced Scorch Prediction in Flexible Polyurethane Form Manufacturing,” J. Comput. Theor. Appl., vol. 1, no. 3, pp. 346–357, 2024, https://doi.org/10.62411/jcta.9539.

S. Hemalatha, T. Kavitha, T. M. Saravanan, K. Chitra and N. Dinesh, "Forecasting Crop Using Machine Learning Model," 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 783-788, 2022, https://doi.org/10.1109/ICESC54411.2022.9885377.

[47] D. A. Al-Qudah, A. M. Al-Zoubi, P. A. Castillo-Valdivieso, and H. Faris, “Sentiment analysis for e-payment service providers using evolutionary extreme gradient boosting,” IEEE Access, vol. 8, pp. 189930–189944, 2020, https://doi.org/10.1109/ACCESS.2020.3032216.

T. Edirisooriya and E. Jayatunga, “Comparative Study of Face Detection Methods for Robust Face Recognition Systems,” 5th SLAAI - Int. Conf. Artif. Intell. 17th Annu. Sess. SLAAI-ICAI 2021, no. December, 2021, https://doi.org/10.1109/SLAAI-ICAI54477.2021.9664689.

A. A. Ojugo, C. O. Obruche, and A. O. Eboka, “Quest For Convergence Solution Using Hybrid Genetic Algorithm Trained Neural Network Model For Metamorphic Malware Detection,” ARRUS J. Eng. Technol., vol. 2, no. 1, pp. 12–23, 2021, https://doi.org/10.35877/jetech613.

M. G. Kibria and M. Sevkli, “Application of Deep Learning for Credit Card Approval: A Comparison with Two Machine Learning Techniques,” Int. J. Mach. Learn. Comput., vol. 11, no. 4, pp. 286–290, 2021, https://doi.org/10.18178/ijmlc.2021.11.4.1049.

A. P. Binitie et al., “Stacked Learning Anomaly Detection Scheme with Data Augmentation for Spatiotemporal Traffic Flow,” J. Fuzzy Syst. Control, vol. 2, no. 3, pp. 203–214, 2024, https://doi.org/10.59247/jfsc.v2i3.267.

A. Satpathi et al., “Comparative Analysis of Statistical and Machine Learning Techniques for Rice Yield Forecasting for Chhattisgarh, India,” Sustainability, vol. 15, no. 3, p. 2786, 2023, https://doi.org/10.3390/su15032786.

A. Bahl et al., “Recursive feature elimination in random forest classification supports nanomaterial grouping,” NanoImpact, vol. 15, p. 100179, 2019, https://doi.org/10.1016/j.impact.2019.100179.

A. Razaque et al., “Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms,” Appl. Sci., vol. 13, no. 1, p. 57, 2022, https://doi.org/10.3390/app13010057.

A. A. Ojugo, C. O. Obruche, and A. O. Eboka, “Empirical Evaluation for Intelligent Predictive Models in Prediction of Potential Cancer Problematic Cases In Nigeria,” ARRUS J. Math. Appl. Sci., vol. 1, no. 2, pp. 110–120, 2021, https://doi.org/10.35877/mathscience614.

B. P. Bhuyan, R. Tomar, T. P. Singh, and A. R. Cherif, “Crop Type Prediction: A Statistical and Machine Learning Approach,” Sustainability, vol. 15, no. 1, p. 481, Dec. 2022, https://doi.org/10.3390/su15010481.

E. U. Omede, A. E. Edje, M. I. Akazue, H. Utomwen, and A. A. Ojugo, “IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System,” J. Comput. Theor. Appl., vol. 1, no. 3, pp. 273–283, Feb. 2024, https://doi.org/10.62411/jcta.9541.

M. D. Okpor et al., “Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles,” J. Fuzzy Syst. Control, vol. 2, no. 2, pp. 117–128, 2024, https://doi.org/10.59247/jfsc.v2i2.213.

B. O. Malasowe, M. I. Akazue, A. E. Okpako, F. O. Aghware, D. V. Ojie, and A. A. Ojugo, “Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 8, pp. 135–142, 2023, https://doi.org/10.14569/IJACSA.2023.0140816.

A. A. Ojugo, E. Ugboh, C. C. Onochie, A. O. Eboka, M. O. Yerokun, and I. J. Iyawa, “Effects of Formative Test and Attitudinal Types on Students’ Achievement in Mathematics in Nigeria,” African Educ. Res. J., vol. 1, no. 2, pp. 113–117, 2013, https://eric.ed.gov/?id=EJ1216962.

D. R. I. M. Setiadi, K. Nugroho, A. R. Muslikh, S. W. Iriananda, and A. A. Ojugo, “Integrating SMOTE-Tomek and Fusion Learning with XGBoost Meta-Learner for Robust Diabetes Recognition,” J. Futur. Artif. Intell. Technol., vol. 1, no. 1, pp. 23–38, 2024, https://doi.org/10.62411/faith.2024-11.

J. K. Oladele et al., “BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange,” J. Comput. Theor. Appl., vol. 1, no. 3, pp. 231–242, 2024, https://doi.org/10.62411/jcta.9509.

M. Srividya, S. Mohanavalli, and N. Bhalaji, “Behavioral Modeling for Mental Health using Machine Learning Algorithms,” J. Med. Syst., vol. 42, no. 5, 2018, https://doi.org/10.1007/s10916-018-0934-5.

N. C. Ashioba et al., “Empirical Evidence for Rainfall Runoff in Southern Nigeria Using a Hybrid Ensemble Machine Learning Approach,” J. Adv. Math. Comput. Sci., vol. 12, no. 1, pp. 73–86, 2024, https://doi.org/10.22624/AIMS/MATHS/V12N1P6.

C. Ren et al., “Short-Term Traffic Flow Prediction: A Method of Combined Deep Learnings,” J. Adv. Transp., vol. 2021, pp. 1–15, 2021, https://doi.org/10.1155/2021/9928073.

J. Femila Roseline, G. Naidu, V. Samuthira Pandi, S. Alamelu alias Rajasree, and D. N. Mageswari, “Autonomous credit card fraud detection using machine learning approach☆,” Comput. Electr. Eng., vol. 102, p. 108132, 2022, https://doi.org/10.1016/j.compeleceng.2022.108132.

A. Ali et al., “Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review,” Appl. Sci., vol. 12, no. 19, p. 9637, 2022, https://doi.org/10.3390/app12199637.

N. Rtayli and N. Enneya, “Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization,” J. Inf. Secur. Appl., vol. 55, p. 102596, 2020, https://doi.org/10.1016/j.jisa.2020.102596.

A. A. Ojugo and A. O. Eboka, “Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm based approach,” Int. J. Informatics Commun. Technol., vol. 8, no. 3, p. 128, 2019 https://doi.org/10.11591/ijict.v8i3.pp128-138.

V. O. Geteloma et al., “AQuaMoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system,” Appl. Eng. Technol., vol. 3, no. 2, pp. 86–101, 2024, https://doi.org/10.31763/aet.v3i2.1536.

F. Salahdine, Z. El Mrabet and N. Kaabouch, "Phishing Attacks Detection A Machine Learning-Based Approach," 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0250-0255, 2021, https://doi.org/10.1109/UEMCON53757.2021.9666627.

F. U. Emordi et al., “TiSPHiMME: Time Series Profile Hidden Markov Ensemble in Resolving Item Location on Shelf Placement in Basket Analysis,” Digit. Innov. Contemp. Res. Sci., vol. 12, no. 1, pp. 33–48, 2024, https://doi.org/10.22624/AIMS/DIGITAL/V11N4P3.

A. A. Ojugo and A. O. Eboka, “Empirical Evidence of Socially-Engineered Attack Menace Among Undergraduate Smartphone Users in Selected Universities in Nigeria,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 10, no. 3, pp. 2103–2108, 2021, https://doi.org/10.30534/ijatcse/2021/861032021.

A. M. Almeshal, A. I. Almazrouee, M. R. Alenizi, and S. N. Alhajeri, “Forecasting the spread of COVID-19 in Kuwait using compartmental and logistic regression models,” Applied Sciences, vol. 10, no. 10, p. 3402, 2020, https://doi.org/10.3390/app10103402.

A. A. Ojugo and A. O. Eboka, “Empirical Bayesian network to improve service delivery and performance dependability on a campus network,” IAES Int. J. Artif. Intell., vol. 10, no. 3, p. 623, 2021, https://doi.org/10.11591/ijai.v10.i3.pp623-635.

L. Shen, Y. Bao, N. Hasan, Y. Huang, X. Zhou, and C. Deng, “Intelligent crude oil price probability forecasting: Deep learning models and industry applications,” Computers in Industry, vol. 163, p. 104150, 2024, https://doi.org/10.1016/j.compind.2024.104150.

K. Deepika, M. P. S. Nagenddra, M. V. Ganesh, and N. Naresh, “Implementation of Credit Card Fraud Detection Using Random Forest Algorithm,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 3, pp. 797–804, 2022, https://doi.org/10.22214/ijraset.2022.40702.

A. A. Ojugo, P. O. Ejeh, C. C. Odiakaose, A. O. Eboka, and F. U. Emordi, “Improved distribution and food safety for beef processing and management using a blockchain-tracer support framework,” Int. J. Informatics Commun. Technol., vol. 12, no. 3, p. 205, 2023, https://doi.org/10.11591/ijict.v12i3.pp205-213.

L. De Kimpe, M. Walrave, W. Hardyns, L. Pauwels, and K. Ponnet, “You’ve got mail! Explaining individual differences in becoming a phishing target,” Telemat. Informatics, vol. 35, no. 5, pp. 1277–1287, 2018, https://doi.org/10.1016/j.tele.2018.02.009.

L. Loh et al., “An ensembling architecture incorporating machine learning models and genetic algorithm optimization for forex trading,” FinTech, vol. 1, no. 2, pp. 100-124, 2022, https://doi.org/10.3390/fintech1020008.

A. A. Ojugo et al., “Forging a learner-centric blended-learning framework via an adaptive content-based architecture,” Sci. Inf. Technol. Lett., vol. 4, no. 1, pp. 40–53, 2023, https://doi.org/10.31763/sitech.v4i1.1186.

A. A. Ojugo and O. D. Otakore, “Computational solution of networks versus cluster grouping for social network contact recommender system,” Int. J. Informatics Commun. Technol., vol. 9, no. 3, p. 185, 2020, https://doi.org/10.11591/ijict.v9i3.pp185-194.

A. A. Ojugo and I. P. Okobah, “Quest for an intelligent convergence solution for the well-known David, Fletcher and Powell quadratic function using supervised models,” Open Access J. Sci., vol. 2, no. 1, pp. 53–59, 2018, https://doi.org/10.15406/oajs.2018.02.00044.

A. A. Ojugo et al., “Evidence of Students’ Academic Performance at the Federal College of Education Asaba Nigeria: Mining Education Data,” Knowl. Eng. Data Sci., vol. 6, no. 2, pp. 145–156, 2023, https://doi.org/10.17977/um018v6i22023p145-156.

E. A. Otorokpo et al., “DaBO-BoostE: Enhanced Data Balancing via Oversampling Technique for a Boosting Ensemble in Card-Fraud Detection,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 12, no. 2, pp. 45–66, 2024, https://doi.org/10.22624/AIMS/MATHS/V12N2P4.

A. A. Ojugo and O. Nwankwo, “Tree-classification Algorithm to Ease User Detection of Predatory Hijacked Journals: Empirical Analysis of Journal Metrics Rankings,” Int. J. Eng. Manuf., vol. 11, no. 4, pp. 1–9, 2021, https://doi.org/10.5815/ijem.2021.04.01.

F. Jáñez-Martino, R. Alaiz-Rodríguez, V. González-Castro, E. Fidalgo, and E. Alegre, “A review of spam email detection: analysis of spammer strategies and the dataset shift problem,” Artif. Intell. Rev., vol. 56, no. 2, pp. 1145-1173, 2023, https://doi.org/10.1007/s10462-022-10195-4.

A. A. Ojugo and O. D. Otakore, “Investigating The Unexpected Price Plummet And Volatility Rise In Energy Market: A Comparative Study of Machine Learning Approaches,” Quant. Econ. Manag. Stud., vol. 1, no. 3, pp. 219–229, 2020, https://doi.org/10.35877/454RI.qems12119.

A. Jayatilaka, N. A. G. Arachchilage, and M. A. Babar, “Falling for Phishing: An Empirical Investigation into People’s Email Response Behaviors,” arXiv preprint arXiv:2108.04766, 2021, https://doi.org/10.48550/arXiv.2108.04766.

A. A. Ojugo and A. O. Eboka, “Assessing Users Satisfaction and Experience on Academic Websites: A Case of Selected Nigerian Universities Websites,” Int. J. Inf. Technol. Comput. Sci., vol. 10, no. 10, pp. 53–61, 2018, https://doi.org/10.5815/ijitcs.2018.10.07.

K. Afifah, I. N. Yulita, and I. Sarathan, “Sentiment Analysis on Telemedicine App Reviews using XGBoost Classifier,” 2021 Int. Conf. Artif. Intell. Big Data Anal., pp. 22–27, 2022, https://doi.org/10.1109/ICAIBDA53487.2021.9689735.

F. O. Aghware et al., “Effects of Data Balancing in Diabetes Mellitus Detection : A Comparative XGBoost and Random Forest Learning Approach,” NIPES - J. Sci. Technol. Res., vol. 7, no. 1, pp. 1–11, 2025, https://doi.org/10.37933/nipes/7.1.2025.1.

D. A. Obasuyi et al., “NiCuSBlockIoT: Sensor-based Cargo Assets Management and Traceability Blockchain Support for Nigerian Custom Services,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 15, no. 2, pp. 45–64, 2024, https://doi.org/10.22624/AIMS/CISDI/V15N2P4.

A. N. Safriandono, D. R. I. M. Setiadi, A. Dahlan, F. Z. Rahmanti, I. S. Wibisono, and A. A. Ojugo, “Analyzing Quantum Feature Engineering and Balancing Strategies Effect on Liver Disease Classification,” J. Futur. Artif. Intell. Technol., vol. 1, no. 1, pp. 51–63, 2024, https://doi.org/10.62411/faith.2024-12.

A. A. Ojugo and O. Nwankwo, “Multi-Agent Bayesian Framework For Parametric Selection In The Detection And Diagnosis of Tuberculosis Contagion In Nigeria,” JINAV J. Inf. Vis., vol. 2, no. 2, pp. 69–76, 2021, https://doi.org/10.35877/454RI.jinav375.

A. A. Ojugo and A. O. Eboka, “Modeling the Computational Solution of Market Basket Associative Rule Mining Approaches Using Deep Neural Network,” Digit. Technol., vol. 3, no. 1, pp. 1–8, 2018, https://doi.org/10.11591/ijict.v8i3.pp128-138.

R. G. Bhati, “A Survey on Sentiment Analysis Algorithms and Datasets,” Rev. Comput. Eng. Res., vol. 6, no. 2, pp. 84–91, 2019, https://doi.org/10.18488/journal.76.2019.62.84.91.

A. R. Muslikh, D. R. I. M. Setiadi, and A. A. Ojugo, “Rice disease recognition using transfer xception convolution neural network,” J. Tek. Inform., vol. 4, no. 6, pp. 1541–1547, 2023, https://doi.org/10.52436/1.jutif.2023.4.6.1529.

U. R. Wemembu, E. O. Okonta, A. A. Ojugo, and I. L. Okonta, “A Framework for Effective Software Monitoring in Project Management,” West African J. Ind. Acad. Res., vol. 10, no. 1, pp. 102–115, 2014, https://www.ajol.info/index.php/wajiar/article/view/105798.

S. Paliwal, A. K. Mishra, R. K. Mishra, N. Nawaz, and M. Senthilkumar, “XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation,” Comput. Mater. Contin., vol. 72, no. 3, pp. 5345–5362, 2022, https://doi.org/10.32604/cmc.2022.025858.

S. Carta, G. Fenu, D. R. Recupero, and R. Saia, “Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model,” Journal of Information Security and Applications, vol. 46, pp. 13-22, 2019, https://doi.org/10.1016/j.jisa.2019.02.007.

E. O. Okonta, A. A. Ojugo, U. R. Wemembu, and D. Ajani, “Embedding Quality Function Deployment In Software Development: A Novel Approach,” West African J. Ind. Acad. Res., vol. 6, no. 1, pp. 50–64, 2013, https://www.ajol.info/index.php/wajiar/article/view/87437.

C. Bentéjac, A. Csörgő, and G. Martínez-Muñoz, “A Comparative Analysis of XGBoost,” Artificial Intelligence Review, 54, 1937-1967, 2021, https://doi.org/10.1007/s10462-020-09896-5.

H. J. V. L and D. Rajan, "Enhancing Customer Experience and Sales Performance in a Retail Store Using Association Rule Mining and Market Basket Analysis," 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1-5, 2023, https://doi.org/10.1109/ICCCNT56998.2023.10307411.

C. C. Odiakaose et al., “Hypertension Detection via Tree-Based Stack Ensemble with SMOTE-Tomek Data Balance and XGBoost Meta-Learner,” J. Futur. Artif. Intell. Technol., vol. 1, no. 3, pp. 269–283, 2024, https://doi.org/10.62411/faith.3048-3719-43.

C. C. Odiakaose et al., “Hybrid Genetic Algorithm Trained Bayesian Ensemble for Short Messages Spam Detection,” J. Adv. Math. Comput. Sci., vol. 12, no. 1, pp. 37–52, 2024, https://doi.org/10.22624/AIMS/MATHS/V12N1P4.

E. O. Okonta, U. R. Wemembu, A. A. Ojugo, and D. Ajani, “Deploying Java Platform to Design A Framework of Protective Shield for Anti– Reversing Engineering,” West African J. Ind. Acad. Res., vol. 10, no. 1, pp. 50–64, 2014, https://www.ajol.info/index.php/wajiar/article/view/105790.

B. O. Malasowe, D. V. Ojie, A. A. Ojugo, and M. D. Okpor, “Co-infection prevalence of Covid-19 underlying tuberculosis disease using a susceptible infect clustering Bayes Network,” Dutse J. Pure Appl. Sci., vol. 10, no. 2a, pp. 80–94, 2024, https://doi.org/10.4314/dujopas.v10i2a.8.

R. Gangula, C. Sudha, K. Sreeveda, R. Bonagiri, B. C and S. Saturi, "Prediction and Prognosis of Diabetes Using Logistic Regression," 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon), pp. 1-7, 2022, https://doi.org/10.1109/NKCon56289.2022.10126692.

A. A. Ojugo and E. O. Ekurume, “Deep Learning Network Anomaly-Based Intrusion Detection Ensemble For Predictive Intelligence To Curb Malicious Connections: An Empirical Evidence,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 10, no. 3, pp. 2090–2102, 2021, https://doi.org/10.30534/ijatcse/2021/851032021.

B. O. Malasowe, A. E. Okpako, M. D. Okpor, P. O. Ejeh, A. A. Ojugo, and R. E. Ako, “FePARM: The Frequency-Patterned Associative Rule Mining Framework on Consumer Purchasing-Pattern for Online Shops,” Adv. Multidiscip. Sci. Res. J. Publ., vol. 15, no. 2, pp. 15–28, 2024, https://doi.org/10.22624/AIMS/CISDI/V15N2P2-1.

C. Shorten and T. M. Khoshgoftaar, “A survey on Image Data Augmentation for Deep Learning,” J. Big Data, vol. 6, no. 1, 2019, https://doi.org/10.1186/s40537-019-0197-0.

A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. Iyawa, and R. E. Yoro, “Cryptography: Salvaging Exploitations against Data Integrity,” Am. J. Networks Commun., vol. 2, no. 2, p. 47, 2013, https://doi.org/10.11648/j.ajnc.20130202.14.

M. Begum H., D. A. Janeera and A. Kumar. A.G, "Internet of Things based Wild Animal Infringement Identification, Diversion and Alert System," 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 801-805, 2020, https://doi.org/10.1109/ICICT48043.2020.9112433.

R. E. Ako et al., “Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost,” J. Comput. Theor. Appl., vol. 2, no. 1, pp. 86–101, 2024, https://doi.org/10.62411/jcta.10562.

F. O. Aghware et al., “Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection,” J. Comput. Theor. Appl., vol. 1, no. 4, pp. 407–420, 2024, https://doi.org/10.62411/jcta.10323.

D. Nguyen et al., “Adaptive Evaluation of LQR Control using Particle Swarm Optimization for Pendubot,” J. Fuzzy Syst. Control, vol. 2, no. 2, pp. 58–66, 2024, https://doi.org/10.59247/jfsc.v2i2.203.

S. A. Chowdhury and S. Aziz, "Financing Renewable Energy and Fossil Fuel Power Plants in Bangladesh: A Comparative Analysis," 2024 7th International Conference on Development in Renewable Energy Technology (ICDRET), pp. 1-6, 2024, https://doi.org/10.1109/ICDRET60388.2024.10503983.

Z. Zhu, J. Peng, K. Liu, and X. Zhang, “A game-based resource pricing and allocation mechanism for profit maximization in cloud computing. Soft Computing, vol. 24, pp. 4191-4203, 2020, https://doi.org/10.1007/s00500-019-04183-0.

A. A. Ojugo, R. E. Yoro, A. O. Eboka, M. O. Yerokun, C. N. Anujeonye, and F. N. Efozia, “Predicting Behavioural Evolution on a Graph-Based Model,” Adv. Networks, vol. 3, no. 2, p. 8, 2015, https://doi.org/10.11648/j.net.20150302.11.

A. Panthakkan, N. Valappil, M. Appathil, S. Verma, W. Mansoor and H. Al-Ahmad, "Performance Comparison of Credit Card Fraud Detection System using Machine Learning," 2022 5th International Conference on Signal Processing and Information Security (ICSPIS), pp. 17-21, 2022, https://doi.org/10.1109/ICSPIS57063.2022.10002517.

M. S. Bhadriraju and K. Dasari, "SSDP DDoS Attacks Detection using Naïve Bayes Classifiers with Wrapper Feature Selection Methods," 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON), pp. 1-5, 2024, https://doi.org/10.1109/DELCON64804.2024.10866135.

M. I. Akazue et al., “Handling Transactional Data Features via Associative Rule Mining for Mobile Online Shopping Platforms,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 3, pp. 530–538, 2024, https://doi.org/10.14569/IJACSA.2024.0150354.

M. Rele and D. Patil, "Intrusive Detection Techniques Utilizing Machine Learning, Deep Learning, and Anomaly-based Approaches," 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), pp. 88-93, 2023, https://doi.org/10.1109/ICoCICs58778.2023.10276955.

C. Zoremsanga and J. Hussain, "Particle Swarm Optimized Deep Learning Models for Rainfall Prediction: A Case Study in Aizawl, Mizoram," in IEEE Access, vol. 12, pp. 57172-57184, 2024, https://doi.org/10.1109/ACCESS.2024.3390781.

O. B. Chibuzo and D. O. Isiaka, “Design and Implementation of Secure Browser for Computer-Based Tests,” Int. J. Innov. Sci. Res. Technol., vol. 5, no. 8, pp. 1347–1356, 2020, https://doi.org/10.38124/IJISRT20AUG526.

A. A. Ojugo et al., “CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 37–47, 2023, https://doi.org/10.33633/jcta.v1i2.9355.

A. A. Ojugo, P. O. Ejeh, C. C. Odiakaose, A. O. Eboka, and F. U. Emordi, “Predicting rainfall runoff in Southern Nigeria using a fused hybrid deep learning ensemble,” Int. J. Informatics Commun. Technol., vol. 13, no. 1, p. 108, 2024, https://doi.org/10.11591/ijict.v13i1.pp108-115.

A. A. Ojugo and O. D. Otakore, “Seeking Intelligent Convergence for Asymptotic Stability Features of the Prey / Predator Retarded Equation Model Using Supervised Models,” Comput. Inf. Syst. Dev. Informatics Allied Res. J., vol. 9, no. 2, pp. 13–26, 2018, https://doi.org/10.15406/oajs.2018.02.00044.

A. A. Ojugo and R. E. Yoro, “Migration Pattern As Threshold Parameter In The Propagation of The Covid-19 Epidemic Using An Actor-Based Model for SI-Social Graph,” JINAV J. Inf. Vis., vol. 2, no. 2, pp. 93–105, 2021, https://doi.org/10.35877/454RI.jinav379.

A. A. Ojugo and A. O. Eboka, “An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks,” J. Appl. Sci. Eng. Technol. Educ., vol. 2, no. 1, pp. 18–27, 2020, https://doi.org/10.35877/454RI.asci2192.

A. O. Eboka et al., “Pilot study on deploying a wireless sensor-based virtual-key access and lock system for home and industrial frontiers,” Int. J. Informatics Commun. Technol., vol. 14, no. 1, p. 287, 2025, https://doi.org/10.11591/ijict.v14i1.pp287-297.

D. R. I. M. Setiadi, A. Susanto, K. Nugroho, A. R. Muslikh, A. A. Ojugo, and H. Gan, “Rice yield forecasting using hybrid quantum deep learning model,” MDPI Comput., vol. 13, no. 191, pp. 1–18, 2024, https://doi.org/10.3390/computers13080191.

S. Xuan, G. Liu, Z. Li, L. Zheng, S. Wang, and C. Jiang, “Random forest for credit card fraud detection,” in 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), pp. 1–6, 2018, https://doi.org/10.1109/ICNSC.2018.8361343.

Downloads

Published

2025-03-18

How to Cite

[1]
P. A. Onoma, “Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble”, J Fuzzy Syst Control, vol. 3, no. 1, pp. 90–97, Mar. 2025.

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)