Modern computer networks, particularly those sup- porting Internet of Things (IoT), cloud, and edge environments, are increasingly exposed to sophisticated cyber-attacks such as zero-day exploits and stealthy intrusion techniques. Traditional Intrusion Detection Systems (IDS) primarily rely on signature- based or rule-based mechanisms, which limits their effective- ness against evolving threats. Recent advancements in Artificial Intelligence (AI) and Deep Learning (DL) have enabled IDS to automatically learn complex patterns from network traffic, significantly improving detection capability.
This review paper presents a comprehensive survey of AI-driven IDS frameworks, focusing on deep learning, self- supervised learning, graph-based models, and hybrid approaches. Particular attention is given to recent trends addressing key limitations of existing systems, including lack of robustness to adversarial attacks and limited explainability of model decisions. Techniques such as adversarial training and Explainable Artificial Intelligence (XAI) are reviewed for their role in improving system reliability and analyst trust. The paper highlights challenges such as dataset imbalance, adversarial vulnerability, and scalability issues, and discusses future research directions for developing adaptive, reliable, and transparent intrusion detection systems suitable for modern network environments.
Introduction
The growing complexity of modern digital networks—driven by cloud computing, IoT, and 5G—has increased both the volume of network traffic and the sophistication of cyberattacks. Intrusion Detection Systems (IDS) are essential for identifying malicious activities, but traditional signature- and rule-based IDS are limited to known threats and struggle with zero-day and evolving attacks.
To overcome these limitations, researchers have increasingly applied Artificial Intelligence (AI) and Machine Learning (ML). Early ML-based IDS models such as Decision Trees, Support Vector Machines, and Random Forests improved detection accuracy but depended heavily on manual feature engineering and faced challenges with high-dimensional data, class imbalance, and scalability. Deep learning approaches have significantly advanced IDS by enabling automatic feature extraction and learning complex patterns directly from raw network data.
Recent research highlights the evolution toward deep learning, self-supervised, and hybrid IDS architectures. Models combining Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) such as LSTMs effectively capture spatial and temporal traffic patterns. To address data imbalance and limited labeled data, self- and semi-supervised methods have been introduced. Security concerns related to adversarial attacks have led to the development of robust and adversarially trained IDS models, while lightweight architectures target resource-constrained IoT environments.
Conclusion
This review surveyed recent advancements in AI-driven Intrusion Detection Systems, focusing on deep learning, self-supervised learning, explainability, and adversarial robustness. Deep learning architectures such as CNNs, RNNs, Autoen- coders, and Graph Neural Networks have significantly en- hanced IDS performance by learning complex traffic repre- sentations.
Despite notable progress, challenges remain in address- ing dataset imbalance, adversarial vulnerability, computational overhead, and privacy concerns. Future research should ex- plore federated and privacy-preserving IDS models, scalable architectures for IoT environments, and interpretable AI tech- niques for real-world deployment. Overall, AI-driven IDS represent a crucial step toward intelligent, adaptive, and trust- worthy cybersecurity defense systems.
References
[1] A. Kumar and S. Yadav, “Evaluation of Machine Learning Algorithms for Intrusion Detection System,” 2021.
[2] R. Singh and A. Gupta, “AI-Driven Intrusion Detection Systems: Lever- aging Deep Learning for Network Security,” IEEE Access, 2022.
[3] K. Mehta and D. Sharma, “A Comparative Study on AI-IDS Artificial Intelligence-Based Intrusion Detection System,” International Journal of Computer Applications, 2023.
[4] H. Patel and R. Reddy, “A Comprehensive Review of AI-Based Intrusion Detection Systems,” Computers Security, 2023.
[5] M. Khan et al., “DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic,” IEEE Access, 2022.
[6] Y. Zhang et al., “SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection,” Expert Systems with Applications, 2023.
[7] J. Lee and K. Park, “ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection,” Computers Security, 2024.
[8] T. Rahman and P. Sharma, “EIDM: Deep Learning Model for IoT Intrusion Detection Systems,” Sensors, 2024.
[9] A. Sinha and N. Patel, “Explainable AI and Random Forest Based Reliable Intrusion Detection System,” IEEE Transactions on Information Forensics and Security, 2022.
[10] M. Nak?p and E. Gelenbe, “Online Self-Supervised Deep Learning for Intrusion Detection Systems,” arXiv preprint arXiv:2303.11245, 2023.
[11] H. Xu and W. Lin, “E-GraphSAGE: A Graph Neural Network Based Intrusion Detection System for IoT,” arXiv preprint arXiv:2106.11705, 2021.
[12] E. Caville et al., “Anomal-E: A Self-Supervised Network Intrusion Detection System Based on Graph Neural Networks,” arXiv preprint arXiv:2206.01783, 2022.
[13] R. Thomas and A. Banerjee, “Adversarial Robust and Explainable Net- work Intrusion Detection Systems Based on Deep Learning,” Computers Security, 2023.
[14] M. Qureshi and B. Singh, “Enhancing Network Intrusion Detection Performance Using Generative Adversarial Networks,” IEEE Access, 2023.
[15] J. Zhao et al., “CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data,” Infor- mation Sciences, 2024.
[16] L. Wang and S. Kim, “Network-Based Intrusion Detection Using Deep Learning Technique,” Scientific Reports, Nature Publishing Group, 2025.
[17] V. Roy and S. Das, “Machine Learning-Based Network Intrusion Detec- tion for Big and Imbalanced Data Using Oversampling, Stacking Feature Embedding and Feature Extraction,” Future Generation Computer Sys- tems, 2023.
[18] T. Kumar et al., “A Systematic Literature Review of Methods and Datasets for Anomaly-Based Network Intrusion Detection,” IEEE Ac- cess, 2021.
[19] R. Singh and K. Jain, “Optimized IoT Intrusion Detection Using Machine Learning Technique,” Wireless Networks, 2023.
[20] C. Huang et al., “An Adaptable Deep Learning-Based Intrusion De- tection System to Zero-Day Attacks,” arXiv preprint arXiv:2109.14523, 2021.