International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 187 - Number 44 |
Year of Publication: 2025 |
Authors: Simon Atadoga, Timothy Oyebola Ige, Rona Oneshiorona Sado, Abimbola Oludayo Ojenike, Confidence Adimchi Chinonyere, Emedem Sandra Ebubechukwu, Victor Oyiboka |
![]() |
Simon Atadoga, Timothy Oyebola Ige, Rona Oneshiorona Sado, Abimbola Oludayo Ojenike, Confidence Adimchi Chinonyere, Emedem Sandra Ebubechukwu, Victor Oyiboka . Investigating the Application of Artificial Intelligence (AI) and Machine Learning (ML) Techniques to Enhance Cybersecurity for Internet of Things (IoT) Devices, Prevent Data Breaches, and Safeguard User Privacy. International Journal of Computer Applications. 187, 44 ( Sep 2025), 7-17. DOI=10.5120/ijca2025925730
The rapid expansion of the Internet of Things (IoT) ecosystem has provided a tremendous attack surface, and therefore, IoT devices are highly vulnerable to advanced cyberattacks, data breaches, and privacy invasions. Rule-based intrusion detection systems are mostly ineffective in dealing with high-dimensional and heterogeneous traffic streams that IoT environments produce. To fill in these gaps, this research examines the systematic use of Artificial Intelligence (AI) and Machine Learning (ML) methods towards IoT security augmentation, malicious activity detection, blocking of data leakage, and safeguarding of user privacy. A strict methodology, quantitative experimental approach was adopted, leveraging the Australian Centre for Cyber Security's TON_IoT20 dataset of actual network traffic, attack behaviours (i.e., DDoS, data injection, password based intrusions), and normal run log data from various IoT devices such as smart plugs, cameras, and thermostats. Data preprocessing steps involved removal of duplicates, handling of missing values by imputation, feature encoding, and scaling, followed by a 70/15/15 stratified split for training, validation, and test. Three standard ML models, Random Forest (RF), Extreme Gradient Boosting (XGBoost), and a Deep Neural Network (DNN) were used in Python under a controlled Ubuntu environment and trained on the pre-processed data. Model performance was measured by accuracy, precision, recall, F1-score, and ROC-AUC values, with further analysis by means of confusion matrices and McNemar's significance testing. The results indicate that XGBoost performed better, with 98.9% accuracy, 98.6% precision, 99.0% recall, an F1-score of 98.8%, and an ROC-AUC value of 0.996, with very low values of false positives and false negatives. Statistical testing established that the improvement of XGBoost relative to RF and DNN was significant (p < 0.05). In addition, XGBoost provided competitive training time and the quickest inference time, indicating its real-time suitability for IoT intrusion detection applications. All of these results underscore the promise of incorporating AI/ML solutions based on XGBoost in IoT security platforms to improve active threat detection, reduce false alarms, and offer improved privacy protection controls. The research provides an experimentally validated reference model towards further studies and real-world applications of AI-driven intrusion detection systems in real-time IoT environments.