SYSTEMATIC LITERATURE REVIEW: VALIDATION METHODS FOR MACHINE LEARNING MODELS IN IOT CYBERSECURITY

Evaluating Current Validation Practices and Future Directions

Authors

  • Janet Maluki United states International University-Africa
  • Jimmy Macharia United States International University-Africa,
  • Dalton Ndirangu United States International University-Africa (USIU-Africa)

DOI:

https://doi.org/10.58216/kjri.v15i02.595

Keywords:

Machine Learning, Internet of Things, Cybersecurity, Validation Practices, Dataset, Intrusion Detection

Abstract

Machine learning (ML) has emerged as a critical enabler of cybersecurity in Internet of Things (IoT) environments, offering adaptive and scalable mechanisms for detecting evolving threats. However, the reliability and deployment readiness of ML-based cybersecurity models depend heavily on the rigor and contextual relevance of their validation approaches. This study presents a systematic literature review (SLR) examining validation techniques applied in ML-driven IoT cybersecurity research, synthesizing findings from 54 peer-reviewed articles published between 2018 and 2024 across IEEE Xplore, SpringerLink, ScienceDirect, and ACM Digital Library. The review spans various application domains, including intrusion detection, malware classification, threat prediction, and adversarial defense.

The findings reveal a strong reliance on traditional techniques such as k-fold cross-validation and hold-out methods, which fall short in addressing IoT-specific challenges, namely class imbalance, temporal drift, adversarial manipulation, and operational heterogeneity. More robust validation methods, including temporal, cross-dataset, and hybrid strategies, remain underutilized in existing literature. To address these gaps, the study proposes a domain-aligned validation framework that integrates time-aware, robustness-focused, and deployment-oriented evaluation strategies. The review offers a structured taxonomy of validation practices and provides actionable insights for improving the empirical rigor of ML-based cybersecurity systems. Beneficiaries include researchers, IoT developers, cybersecurity practitioners, and policymakers aiming to advance trustworthy and context-resilient ML solutions.

Downloads

Download data is not yet available.

Author Biographies

Jimmy Macharia , United States International University-Africa,

Prof. Jimmy K.N. Macharia is a Professor of Information Systems at USIU-Africa with over 27 years of experience in teaching, research, and ICT consultancy. He holds a PhD from North-West University, South Africa. His research focuses on ICT integration in education, digital employability, and ICT4D, with over 50 scholarly publications. He has led major digital transformation projects and contributed to national ICT policy, including the Kenya Digital Economy Blueprint.

Dalton Ndirangu, United States International University-Africa (USIU-Africa)

Dr. Dalton Ndirangu is a faculty member in the School of Science and Technology at United States International University-Africa (USIU-Africa). His research interests c machine Learning, data analytics, and emerging technologies. He is actively involved in postgraduate supervision, research mentorship, and interdisciplinary ICT projects.

Downloads

Published

2025-09-17

How to Cite

Maluki, J., Macharia , J., & Ndirangu, D. (2025). SYSTEMATIC LITERATURE REVIEW: VALIDATION METHODS FOR MACHINE LEARNING MODELS IN IOT CYBERSECURITY : Evaluating Current Validation Practices and Future Directions. Kabarak Journal of Research & Innovation, 15(03), 16–36. https://doi.org/10.58216/kjri.v15i02.595

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.