A Review of AI and Dataset-Driven Approaches for Intrusion Detection Systems
DOI:
https://doi.org/10.65204/djes.v3i1.422Keywords:
IDS Machine learning Cyber threats Deep learning DatasetAbstract
The increasing complexity of cyber threats has underscored the constraints of conventional Intrusion Detection Systems (IDS) and the need to have more flexible and intelligent security systems. The growth of artificial intelligence (AI) has made automated threat response, real-time analysis, and learning in the field of intrusion detection a focus. The review paper related to AI-driven IDS published between 2023 and 2025 have been examined, and efforts have focused on the hybrid metaheuristic model, machine learning, and deep learning. Well-known datasets, including CICIDS2017, CICIDS2018, UNSW-NB15, and NSL-KDD, have been tested on their appropriateness in measuring the performance of a system. It is reported that hybrid deep learning metaheuristic structures have a higher detection efficiency and flexibility than fifteen modern models, but these are reported to be highly computational. The future research direction is presented, including the explanation of AI to enhance transparency, the creation of lightweight IDS that can be implemented in the conditions of the IoT, and the enhancement of adversarial attack resistance. Overall, AI-based IDS may be deemed as a serious breakthrough in intelligent, scalable, and resilient network security.
References
P. Parkar and A. Bilimoria, “A survey on cyber security IDS using ML methods,” in 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, 2021, pp. 352–360.
N. S. Musa, N. M. Mirza, S. H. Rafique, A. M. Abdallah, and T. Murugan, “machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks—current research solutions,” IEEE Access, vol. 12, pp. 17982–18011, 2024.
M. Eswaran, S. Hamsanandhini, and K. I. Lakshmi, “Survey of cyber security approaches for attack detection and prevention,” Turkish J. Comput. Math. Educ., vol. 12, no. 2, pp. 3436–3441, 2021.
J. Alsamiri and K. Alsubhi, “Internet of things cyber attacks detection using machine learning,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 12, 2019.
W. Ahmad, A. Rasool, A. R. Javed, T. Baker, and Z. Jalil, “Cyber security in iot-based cloud computing: A comprehensive survey,” Electronics, vol. 11, no. 1, p. 16, 2021.
K. Morovat and B. Panda, “A survey of artificial intelligence in cybersecurity,” in 2020 International conference on computational science and computational intelligence (CSCI), IEEE, 2020, pp. 109–115.
J. Li, “Cyber security meets artificial intelligence: a survey,” Front. Inf. Technol. Electron. Eng., vol. 19, no. 12, pp. 1462–1474, 2018.
N. B. Dokur, “Artificial Intelligence (AI) applications in cyber security,” Comput. Eng. MEF Univ. Istanbul, Turkey. URL https//www. Res. net/publication/367253331, 2023.
T. Thomas, A. P. Vijayaraghavan, and S. Emmanuel, Machine learning approaches in cyber security analytics. Springer, 2019.
K. Barik, S. Misra, K. Konar, L. Fernandez-Sanz, and M. Koyuncu, “Cybersecurity deep: approaches, attacks dataset, and comparative study,” Appl. Artif. Intell., vol. 36, no. 1, p. 2055399, 2022.
“A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection,” Indones. J. Electr. Eng. Comput. Sci, vol. 23, no. 2, pp. 1146–1158, 2021.
H. Zhang, X. Yu, P. Ren, C. Luo, and G. Min, “Deep adversarial learning in intrusion detection: A data augmentation enhanced framework,” arXiv Prepr. arXiv1901.07949, 2019.
G. S. Kuntla, X. Tian, and Z. Li, “Security and privacy in machine learning: A survey.,” Issues Inf. Syst., vol. 22, no. 3, 2021.
J. G. Carbonell, R. S. Michalski, and T. M. Mitchell, “An overview of machine learning,” Mach. Learn., pp. 3–23, 1983.
J. Peng, E. C. Jury, P. Dönnes, and C. Ciurtin, “Machine learning techniques for personalised medicine approaches in immune-mediated chronic inflammatory diseases: applications and challenges,” Front. Pharmacol., vol. 12, p. 720694, 2021.
R. Muhamedyev, “Machine learning methods: An overview,” Comput. Model. new Technol., vol. 19, no. 6, pp. 14–29, 2015.
I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” J. Big data, vol. 7, no. 1, p. 41, 2020.
A. Shrestha and A. Mahmood, “Review of deep learning algorithms and architectures,” IEEE access, vol. 7, pp. 53040–53065, 2019.
F. Pourafshin, “Big data mining in internet of things using fusion of deep features,” Int J Sci Res Eng Trends, vol. 7, no. 2, pp. 1089–1093, 2021.
A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” J. Big Data, vol. 11, no. 1, p. 105, 2024.
M. Abdel-Basset, L. Abdel-Fatah, and A. K. Sangaiah, “Metaheuristic algorithms: A comprehensive review,” Comput. Intell. Multimed. big data cloud with Eng. Appl., pp. 185–231, 2018.
A. H. Gandomi, X.-S. Yang, S. Talatahari, and A. H. Alavi, “Metaheuristic algorithms,” Metaheuristic Appl. Struct. infrastructures, pp. 1–24, 2013.
I. H. Hassan, A. Mohammed, and M. A. Masama, “Metaheuristic algorithms in network intrusion detection,” Compr. metaheuristics, pp. 95–129, 2023.
A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “An evaluation framework for intrusion detection dataset,” in 2016 International conference on information science and security (ICISS), IEEE, 2016, pp. 1–6.
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in 2009 IEEE symposium on computational intelligence for security and defense applications, Ieee, 2009, pp. 1–6.
T. Eldos, M. K. Siddiqui, and A. Kanan, “On the KDD’99 dataset: Statistical analysis for feature selection,” J. Data Min. Knowl. Discov., vol. 3, no. 3, p. 88, 2012.
L. Dhanabal and S. P. Shantharajah, “A study on NSL-KDD dataset for intrusion detection system based on classification algorithms,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 4, no. 6, pp. 446–452, 2015.
M. Jiang et al., “Text classification based on deep belief network and softmax regression,” Neural Comput. Appl., vol. 29, no. 1, pp. 61–70, 2018.
S. Meftah, T. Rachidi, and N. Assem, “Network based intrusion detection using the UNSW-NB15 dataset,” Int. J. Comput. Digit. Syst., vol. 8, no. 5, pp. 478–487, 2019.
L. P. Dias, J. de J. F. Cerqueira, K. D. R. Assis, and R. C. Almeida, “Using artificial neural network in intrusion detection systems to computer networks,” in 2017 9th Computer Science and Electronic Engineering (CEEC), IEEE, 2017, pp. 145–150.
D. Stiawan, M. Y. Bin Idris, A. M. Bamhdi, and R. Budiarto, “CICIDS-2017 dataset feature analysis with information gain for anomaly detection,” IEEE Access, vol. 8, pp. 132911–132921, 2020.
I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, “A detailed analysis of the cicids2017 data set,” in International conference on information systems security and privacy, Springer, 2018, pp. 172–188.
A. Boukhamla and J. C. Gaviro, “CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed,” Int. J. Inf. Comput. Secur., vol. 16, no. 1–2, pp. 20–32, 2021.
M. Cantone, C. Marocco, and A. Bria, “Generalization Challenges in Network Intrusion Detection: A Study on CIC-IDS2017 and CSE-CIC-IDS2018 Datasets,” in 1st INTERNATIONAL PhD SYMPOSIUM ON ENGINEERING AND SPORT SCIENCE, 2024, p. 185.
M. Gopalsamy, “Predictive cyber attack detection in cloud environments with machine learning from the CICIDS 2018 dataset,” in IJSART, 2024, pp. 36–46.
B. I. Farhan and A. D. Jasim, “Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset,” Indones. J. Electr. Eng. Comput. Sci., vol. 26, no. 2, pp. 1165–1172, 2022.
G. Guo, X. Pan, H. Liu, F. Li, L. Pei, and K. Hu, “An IoT intrusion detection system based on TON IoT network dataset,” in 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), IEEE, 2023, pp. 333–338.
N. Moustafa, M. Keshky, E. Debiez, and H. Janicke, “Federated TON_IoT Windows datasets for evaluating AI-based security applications,” in 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, 2020, pp. 848–855.
D. Aggarwal, D. Sharma, and A. B. Saxena, “Role of AI in cyber security through Anomaly detection and Predictive analysis,” J. Informatics Educ. Res., vol. 3, no. 2, pp. 1846–1849, 2023.
M. M. Asiri et al., “Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model.,” Comput. Syst. Sci. Eng., vol. 45, no. 2, pp. 1679–1694, 2023.
J. H. An, Z. Wang, and I. Joe, “A CNN-based automatic vulnerability detection,” EURASIP J. Wirel. Commun. Netw., vol. 2023, no. 1, p. 41, 2023.
G. Lucky, F. Jjunju, and A. Marshall, “A lightweight decision-tree algorithm for detecting DDoS flooding attacks,” in 2020 IEEE 20th international conference on software quality, reliability and security companion (QRS-C), IEEE, 2020, pp. 382–389.
S. Soliman, W. Oudah, and A. Aljuhani, “Deep learning-based intrusion detection approach for securing industrial Internet of Things,” Alexandria Eng. J., vol. 81, pp. 371–383, 2023.
K. Psychogyios, A. Papadakis, S. Bourou, N. Nikolaou, A. Maniatis, and T. Zahariadis, “Deep learning for intrusion detection systems (IDSs) in time series data,” Futur. Internet, vol. 16, no. 3, p. 73, 2024.
S. Atawneh and H. Aljehani, “Phishing email detection model using deep learning,” Electronics, vol. 12, no. 20, p. 4261, 2023.
S. Asiri, Y. Xiao, S. Alzahrani, and T. Li, “PhishingRTDS: A real-time detection system for phishing attacks using a Deep Learning model,” Comput. Secur., vol. 141, p. 103843, 2024.
S. Zavrak and S. Yilmaz, “Email spam detection using hierarchical attention hybrid deep learning method,” Expert Syst. Appl., vol. 233, p. 120977, 2023.
U. A. Butt, R. Amin, H. Aldabbas, S. Mohan, B. Alouffi, and A. Ahmadian, “Cloud-based email phishing attack using machine and deep learning algorithm,” Complex Intell. Syst., vol. 9, no. 3, pp. 3043–3070, 2023.
A. Awajan, “A novel deep learning-based intrusion detection system for IOT networks,” Computers, vol. 12, no. 2, p. 34, 2023.
S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Comput. Commun., vol. 199, pp. 113–125, 2023.
D. A. Hammood, L. H. M. Alzayadi, M. S. Mahmoud, and M. M. Abd Zaid, “Efficient Hybrid Intrusion Detection Approach based on BPR-GWO for Network Traffic Classification and Improved Network Security.,” Int. J. Intell. Eng. Syst., vol. 18, no. 8, 2025.
Z. N. Hussein, D. A. Hammood, and Z. Q. Al-Abbasi, “DeepCyber-IDS: A Deep Learning Based Intrusion Detection System,” in 2025 VI International Conference on Neural Networks and Neurotechnologies (NeuroNT), IEEE, 2025, pp. 62–65.
M.-H. Yang, “AI-Driven Cybersecurity: Intrusion Detection Using Deep Learning,” Multidiscip. Innov. Res. Anal., vol. 3, no. 4, pp. 1–14, 2022.
M. Goswami, “Enhancing Network Security with AI-Driven Intrusion Detection Systems,” Volume.
A. Aldweesh, A. Derhab, and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Syst., vol. 189, p. 105124, 2020.
M. Markevych and M. Dawson, “A review of enhancing intrusion detection systems for cybersecurity using artificial intelligence (ai),” in International conference knowledge-based organization, 2023, pp. 30–37.
A. Raza, A. K. S. Ali, and A. A. Hussain, “AI-DRIVEN APPROACHES TO CYBER AND INFORMATION SECURITY: MACHINE LEARNING ALGORITHMS FOR THREAT PREDICTION AND ANOMALY DETECTION,” Spectr. Eng. Sci., vol. 2, no. 4, pp. 565–573, 2024.
J. P. Kushwaha, S. Bhadauria, and S. Tapaswi, “Unveiling IoT ecosystem security: A review of intelligent IDS, trends, challenges, and future directions,” Comput. Electr. Eng., vol. 128, p. 110626, 2025.
M. S. R. S. Raja, “The Rise of AI-Driven Network Intrusion Detection Systems: Innovations, Challenges, and Future Directions,” Int. J. AI, BigData, Comput. Manag. Stud., vol. 1, no. 1, pp. 1–10, 2025.