Artificial Intelligence in Intrusion Detection Systems: Trends, Frameworks, and Future Directions for Cybersecurity
Keywords:
Artificial Intelligence, Intrusion Detection Systems, Machine Learning, Deep Learning, CybersecurityAbstract
In the last decade, intrusion detection systems (IDS) have grown out of signature‐based filters to complex, AI driven platforms that have the ability to identify novel and polymorphic threats in real time. This paper will look in detail at artificial intelligence techniques used in IDS, compare and contrast the most influential frameworks and architectures, and position the next stage of the cybersecurity resilience endeavour. We will start by measuring the stakes: the average cost of a network breach in 2024 was USD 4.45 million (an increase of 2.6 percent in relation to 2023), with organizations recording a 15 percent increase in zero‑day exploits, which highlights the inefficiency of the static detection processes. At this point, we categorize AI based IDS as supervised learning, unsupervised anomaly detection, deep learning, and new paradigms (graph neural networks, federated learning), their advantages and limitations compared across a selection of impactful benchmark datasets (NSL‑KDD, CIC‑IDS2017, UNSW\-NB15) and proprietary highly‐scaled enterprise traffic. Using the extensive comparisons to industry benchmarks (e.g., Snort, SVM-based models), we show that architecture that combines convolutional and recurrent networks will exceed 97 percent F1- score with latency measured at below 100 ms, at a 35 percent reduction in false positives compared to the older systems. We reveal in our discussion more long‑standing issues dataset biases, adversarial robustness, and interpretability and report on newer ones in explainable AI, and differential privacy and self-healing IDS. Last, we suggest a future roadmap that can be made possible by embracing continual learning and integration of zero-trust policies, edge optimized TinyML agents in enabling scalable and privacy protecting detection within the 5g and the IoT ecosystem. It is a synthesis of existing knowledge, contains practical results to be taken up by practitioners, and a research road map based on future-proof AI‑empowered IDS that could identify and counter the cyber threats of tomorrow.
Downloads
References
Muneer, A., et al. “A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis.” Journal of Cybersecurity, vol. 2024, 2024, pp. 1–20.
Sowmya, T., and E. A. Mary Anita. “A Comprehensive Review of AI Based Intrusion Detection System.” Measurement: Sensors, vol. 29, 2023, pp. 1–12.
Ali, Ali Hussein, et al. “Unveiling Machine Learning Strategies and Considerations in Intrusion Detection Systems: A Comprehensive Survey.” Frontiers in Computer Science, vol. 6, 2024, pp. 1–20.
Ahmed, Usama, Mohammad Nazir, Amna Sarwar, Tariq Ali, El Hadi M. Aggoune, Tariq Shahzad, and Muhammad Adnan Khan. “Signature Based Intrusion Detection Using Machine Learning and Deep Learning Approaches Empowered with Fuzzy Clustering.” Scientific Reports, vol. 15, 2025, pp. 85866–85878.
Abohany, Amr A., et al. “Advancing Cybersecurity: A Comprehensive Review of AI Driven Detection Techniques.” Journal of Big Data, vol. 11, 2024, pp. 1–30.
Gamage, Sunanda, and Jagath Samarabandu. “Deep Learning Methods in Network Intrusion Detection: A Survey and an Objective Comparison.” Journal of Network and Computer Applications, vol. 235, 2023, pp. 103167–103187.
Agrawal, S., et al. “Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions.” Computer Communications, vol. 195, 2022, pp. 346–361.
Haji, S. H., and S. Y. Ameen. “Attack and Anomaly Detection in IoT Networks Using Machine Learning Techniques: A Review.” Asian Journal of Research in Computer Science, vol. 9, no. 2, 2021, pp. 30–46.
Hassija, V., et al. “Interpreting Black Box Models: A Review on Explainable Artificial Intelligence.” Cognitive Computation, vol. 16, 2024, pp. 45–74.
Seraphim, B. Ida, Shreya Palit, Kaustubh Srivastava, and E. Poovammal. “A Survey on Machine Learning Techniques in Network Intrusion Detection System.” IEEE Access, vol. 11, 2023, pp. 154321–154340.
Gu, J., and S. Lu. “An Effective Intrusion Detection Approach Using SVM with Naïve Bayes Feature Embedding.” Computers & Security, vol. 103, 2021, pp. 102158–102170.
Kasongo, S. M., and Y. Sun. “Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW NB15 Dataset.” Journal of Big Data, vol. 7, 2020, pp. 1–20.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.