Professional Documents
Culture Documents
FEDERAL UNIVERSITY OF TECHNOLOGY
FEDERAL UNIVERSITY OF TECHNOLOGY
A RESEARCH REPORT
ON
PRESENTED TO
BY
ii
CERTIFICATION
This is to certified that this research work was carried out by the Group One of
CYBER SECURITY Students, 400 Level in SCHOOL OF INFORMATION AND
COMMUNICATION TECHNOLOGY, SICT of Federal University of Technology,
Owerri.
______________________ __________________
RESEARCH INSTRUCTOR GROUP LEADER
iii
DEDICATION
This research report is dedicated to God Almighty who has sustained and kept us
alive to this moment to research and document this report for future use and also to
our family members especially to our parents, who ensure that we don’t lack
anything at our stay in Futo.
iv
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to all who have contributed to the
compilation of this report and making it a success (Cyber Security Students, 400
Level).
We will also like to thank the Dean and HODs of School of information and
Communication Technology for giving us the privilege to offer this course which
propels us to know how to write and present a reasonable report like this
Furthermore, we would express our sincere heartfelt gratitude to our Lecturer Engr
Tochukwu, whose guidance, tutelage, expertise and unwavering support were
instrumental in shaping the path of this research work. His corrections, feedbacks
and valuable suggestion played a vital role in shaping this report.
Also, I will like to thank the school authorities for aligning course like Csc 407, which
served as a guide to write a research paper, as the course gives a detailed guideline
on how to write a research paper.
v
ABSTRACT
The primary goal of this research is to design and evaluate a hybrid model that
enhances cyber threat detection capabilities beyond what standalone models can
achieve. To accomplish this, we focused on three main objectives. First, we
developed a comprehensive dataset that integrates synthetic data with real-world
telecommunication data from Nigeria, providing a robust foundation for model
training and testing. Second, we implemented and optimized a hybrid detection
model that combines the strengths of traditional ML techniques with the advanced
capabilities of TL. Third, we conducted a comparative analysis to measure the
performance of the hybrid model against traditional ML and standalone TL models,
using metrics such as accuracy, precision, recall, and F1-score.
The results were promising. The hybrid model outperformed both the traditional ML
and standalone TL models across all datasets. It achieved higher accuracy, precision,
recall, and F1-scores, demonstrating its ability to detect a wide range of cyber
threats more effectively. The hybrid approach showed particular strength in
identifying both known and unknown attacks, making it an ideal solution for the
dynamic and complex threat landscape in Nigeria's telecommunications sector.
This study showcases the effectiveness of a hybrid cyber threat detection system for
Nigeria's telecommunication sector. By leveraging the complementary strengths of
traditional ML and TL, the proposed system offers a robust and adaptable solution to
improve cybersecurity. Future research should focus on real-time implementation of
these models, further optimization, and continuous adaptation to new threats.
vi
Interdisciplinary collaboration and investment in cybersecurity infrastructure and
training will be crucial for sustaining the security of telecommunication networks in
Nigeria and beyond.
vii
TABLE OF CONTENT
viii
2.3.0. RESEARCH GAPS TO FILL
2.3.1. Limited research on the application of transfer learning in cyber threat
detection in the Nigeria telecommunication sector …………………………….
2.3.2. Need for a comprehensive hybrid approach combining transfer learning
with other techniques for enhanced cyber threat detection ………………..
CHAPTER THREE
3.0. Methodology …………………………………………………………………………………..……
3.1. Research Design …………………………………………….…………………………….….…..
3.2. Material ……………………………..………………………………………………………………..
3.3. Method to Achieve Results ………………………………………………………………..
3.4. Instrument for Data Collection
3.5. Method for Data Collection ………………………………………………………………..
3.6. Data Analysis ………………………………………………………………………………………
CHAPTER FOUR
4.0. Results and Discussions ………………………………………………………………………….
4.1. Dataset Preparation ……………………………………………………………………………….
4.2. Result Analysis and Performance Comparison ……………………………….………….
CHAPTER FIVE
5.0 Conclusions …………………………………………………………………………………………
Recommendation …………………………………………………………………………….…………….
Appendix ………………………………………………………………………………….…………..………
Reference ………………………………………………………………………………….………………….
ix