THE EVOLUTION OF INTRUSION DETECTION SYSTEMS: A COMPREHENSIVE REVIEW OF MODERN DATASETS, DEEP LEARNING APPROACHES, AND ARCHITECTURAL CHALLENGES
Main Article Content
Abstract
Intrusion Detection Systems (IDS) remain a critical component of cybersecurity. They are rapidly evolving to counter increasingly complex threats across various environments, such as the Internet of Things (IoT), the Industrial Internet of Things (IIoT), vehicular networks, and critical infrastructure. The objective of this work is a comprehensive analysis of the evolution of Intrusion Detection Systems (IDS) from 2020 to 2025. Grounded in contemporary research, it examines the integration of Machine Learning (ML), Deep Learning (DL), Federated Learning (FL), and novel hybrid techniques into IDS, summarizing advancements in their operational capabilities. Key trends include a significant shift toward deep learning architectures - specifically Transformers and Vision Transformers (ViT) - for enhanced pattern recognition. Additionally, the adoption of Federated Learning and fog computing-based systems is observed, aiming to preserve privacy and address challenges related to data decentralization and non-independent and identically distributed (Non-IID) data. Furthermore, there is growing emphasis on Explainable AI (XAI), attack lifecycle-based datasets, and model robustness against adversarial attacks. The results obtained. The review proposes a comprehensive multi-criteria classification of systems, enabling a thorough description and comparison of various solutions. The paper critically evaluates contemporary input datasets and conducts a comparative efficiency analysis of different intrusion detection methodologies. Analysis indicates that although algorithms achieve accuracy exceeding 98% on benchmark datasets, several critical challenges remain unresolved. These include class imbalance, the capability to detect novel and unknown threats, scalability in real-world operational environments, and ethical privacy concerns. Conclusions. This study addresses gaps in previous reviews by highlighting the lack of unified datasets, the need for model validation in real-world environments, and adaptive protection against zero-day attacks and encrypted traffic. It proposes a roadmap for the development of more robust, decentralized, and interpretable IDS.
Article Details
References
Anderson, J. (2012), “Computer security threat monitoring and surveillance”, International Journal of Intelligence Science, vol. 2, Nno. 4A, available at: https://www.scirp.org/reference/referencespapers?referenceid=613257
. Denning, D. (1987), “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, vol. 13(2), pp. 222–232, doi: https://doi.org/10.1109/TSE.1987.232894
. Gavrylenko, S. and Hornostal, O. (2023), “Application of heterogeneous ensembles in problems of computer system state identification”, Advanced Information System, vol. 7, no. 4, рр. 5–12, doi: https://doi.org/10.20998/2522-9052.2023.4.01
. Gavrylenko, S., Chelak, V. and Hornostal, O. (2022), “Construction Method Of Fuzzy Decision Trees For Identification The Computer System State”, Proceedings of the 32th International Scientific Symposium Metrology and Metrology Assurance (MMA), Sozopol, Bulgaria, pp. 1–5, doi: https://doi.org/10.1109/MMA55579.2022.9992878
. Gavrylenko, S., Poltoratskyi, V. and Nechyporenko, A. (2024), “Intrusion detection model based on improved transformer”, Advanced Information Systems, vol. 8, no. 1, pp. 94–99, doi: https://doi.org/10.20998/2522-9052.2024.1.12
. Ashraf, J., Nour, M, Khurshid, H., E., Debie, Waqas H. and Wahab, A. (2020), “A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions”, Electronics, vol. 9, article number 1197, doi: https://doi.org/10.3390/electronics9071177
. Khraisat, A. and Alazab, A. (2021), “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges”, Cybersecurity, vol. 4, article number 18, doi: https://doi.org/10.1186/s42400-021-00077-7
. Seyfollahi, A. and Ghaffari, A. (2021), “A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for IoT Applications”, Wireless Commu. and Mobile Computing, vol. 32, doi: https://doi.org/10.1155/2021/8414503
. Stavroula, B., Saer, E., Velivasaki, A. Terpsichori‐Helen. Voulkidis, A. and Zahariadis, T., (2021), “A Review of Tabular Data Synthesis Using GANs on an IDS Dataset”, Information, vol. 12, doi: https://doi.org/10.3390/info12090375
. Rabbani, M., Wang, Y., Khoshkangini, R., Jelodar, H., Zhao, R., Bagheri Baba Ahmadi, S. and Ayobi, S. (2021), “A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies”, Entropy, vol. 23(5), article number 529, doi: https://doi.org/10.3390/e23050529
. Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Bhattacharya, S., Reddy, P. and Gadekallu, T. (2021), “Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions”, Computer communication, vol. 195, no. C, pp. 346 –361, doi: https://doi.org/10.48550/arXiv.2106.09527 .
. Chelak, V., Hornostal, O., Chelak, Y. and Gavrylenko, S. (2025), “Advanced methods for classification quality assessment leveraging roc analysis and multidimensional confusion matrix”, Advanced Information Systems, vol. 9, no. 1, pp. 24–34, doi: https://doi.org/10.20998/2522-9052.2025.1.03
. Ziadoon K., Robiah, Y., Al-Bander, B., Saif, A. and Qusay, K. (2023), “Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges”, IET Networks, vol. 13, issue 5-6, pp. 339–376, doi: https://doi.org/10.48550/arXiv.2308.02805
. Genuario, F., Santoro, G., Giliberti, M., Bello, S., Zazzera, E. and Impedovo, D. (2024), “Machine learning-based methodologies for cyber-attacks and network traffic monitoring”, Electrical Engineering, vol. 5(11), article number 74,1 doi: https://doi.org/10.20944/preprints202407.0029.v1
. Akbar, K., Yasir, M., Hakim A. and Bashir, M. (2024), “From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding”, IEEE Access, doi: https://doi.org/10.1109/ACCESS.2024.3392338
. Miki, V., Bridges, R, Iannacone, R., Hollifield, M., Moriano, S., Hespeler, P., Bill, K. and Frank, C. (2024), “A comprehensive guide to CAN IDS data and introduction of the ROAD dataset”, PLOS ONE, vol. 19., e0296879, doi: https://doi.org/10.1371/journal.pone.0296879
. Fteiha, B., Zia, H., Zeyadeh, M., Hazeem, R., Obaidat, H. and Ghannam, R. (2025), “Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats”, Open Computer Science, vol. 15, doi: https://doi.org/10.1515/comp-2025-0046
. Gavrylenko, S., Hornostal, O. and Chelak, V. (2022), “Research of Methods of Identifying the Computer Systems State based on Bagging Classifiers”, 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek), pp. 1–6, doi: https://doi.org/10.1109/KhPIWeek57572.2022.9916439
. Finistrella, S., Mariani, S. and Zambonelli, F. (2025), “Multi-Agent Reinforcement Learning for Cybersecurity: Classification and survey”, Intelligent Systems with Applications, vol. 26, doi: https://doi.org/10.1016/j.iswa.2025.200495
. Latif, N., Ma, W. and Hafizm, A. (2025), “Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection”, Artificial Intelligence Review, vol. 58, article number 91, doi: https://doi.org/10.1007/s10462-024-11082-w
. Satilmiş, H., Akleylek, S. and Tok, Z. Y. (2024), “A Systematic Literature Review on Host-Based Intrusion Detection Systems”, in IEEE Access, vol. 12, pp. 27237–27266, doi: https://doi.org/10.1109/ACCESS.2024.3367004
. Poltoratskyi, V. and Gavrylenko, S. (2025), “Improved Feature Tokenizer Transformer”, 2025 IEEE 6th KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, pp. 1–7, doi: https://doi.org/10.1109/KhPIWeek61436.2025.11288603
. Semenov, S., Gavrylenko, S. and Chelak, V. (2016), “Developing parametrical criterion for registering abnormal behavior in computer and telecommunication systems on the basis of economic tests”, Actual Problems of Economics, vol. 4, pp. 451–459, doi: https://doi.org/10.15587/1729-4061.2021.233417
. Gavrylenko, S., Chelak, V. and Hornostal, O. (2020), “Research of Intelligent Data Analysis Methods for Identification of Computer System State”, Proceedings of the 30th International Scientific Symposium Metrology and Metrology Assurance (MMA), Sozopol, Bulgaria, pp. 1–5. doi: https://doi.org/10.1109/MMA49863.2020.9254252
. Gavrylenko, S., Chelak, V. and Semenov, S. (2022), “Development of Method for Identification the Computer System State based on the Decision Tree with Multi-Dimensional Nodes”, Radio Electronics, Computer Science, Control (RECSC), vol. 2, pp.113–121, doi: https://doi.org/10.15588/1607-3274-2022-2-11
. Sajad, E., Cemil, O. and Navaei, D. (2021), “The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems”, Mathematical Problems in Engineering, pp.1–10, doi: https://doi.org/10.1155/2021/6639714
. Feng, L., Zhenyu, Y., Zhaojing, Z Wang, Z., Bowen, W. and Mingzhi, W. (2023), “A Multi-Layer Intrusion Detection System for SOME/IP-Based In-Vehicle Network”, Sensors, vol. 23, doi: https://doi.org/10.3390/s23094376
. Rocha, S., Mendonça, F., Puttini, R., Nunes, Rafael and Amvame-Nze, G. (2023), “DCIDS - Distributed Container IDS”, Applied Sciences, vol. 13, article number 9301, doi: https://doi.org/10.3390/app13169301
. Semenov, S., Krupska-Klimczak, M., Czapla, R., Krzaczek, B., Gavrylenko, S., Poltorazkiy, V. and Zozulia, V. (2025), “Intrusion Detection Method Based on Preprocessing of Highly Correlated and Imbalanced Data”, Applied Sciences, vol. 15 (8), article number 4243, doi: https://doi.org/doi: https://doi.org/10.3390/app15084243
. Gavrylenko, S., Zozulia, V. and Khatsko N. (2023), “Methods for Improving the Quality of Classification on Imbalanced Data”, Proc. of the IEEE 4th KhPI Week on Advanced Technology, pp. 1–5, doi: https://doi.org/10.1109/KhPIWeek61412.2023.10312879
. Brooke, L. and Weizhi, M. (2024), “Can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection”, Computers and Security, vol. 140, doi: https://doi.org/10.1016/j.cose.2024.103777
. Ferrag, M., Friha, O., Hamouda, D., Maglaras, L. and Janicke, H. (2022), “Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning”, IEEE Access, vol. 10, pp. 40281–40306, doi: https://doi.org/10.1109/ACCESS.2022.3165809
. Sharmila, B., Nandini, B., Kavitha, S., and Anand S. (2024), “Performance Evaluation of Parametric and Non-Parametric Machine Learning Models using Statistical Analysis for RT-IoT2022 Dataset”, Journal of Scientific and Industrial Research, vol. 83, pp. 864–872. doi: https://doi.org/10.56042/jsir.v83i8.7437
. Kazi, F., Samrat, D., Mehrin, A., Risala. K. Rashid, M., Su, C. and Mazumder, R. (2025), “Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP”, Future Internet, vol. 17, article number 234. doi: https://doi.org/10.3390/fi17060234
. Dadkhah, S., Neto, E., Ferreira, R., Molokwu, R., Sadeghi, S. and Ghorbani, A. (2024), “CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT”, Internet of Things, vol. 28, article number 101351, doi: https://doi.org/10.1016/j.iot.2024.101351
. Arifin, M. et al. (2024), “A Novel Dataset for Experimentation With Intrusion Detection Systems in SCADA Networks Using IEC 60870-5-104 Standard”, IEEE Access, vol. 12, pp. 170553–170569, doi: https://doi.org/10.1109/ACCESS.2024.3473895
. Dehlaghi-Ghadim, A., Moghadam, M. H., Balador, A. and Hansson H. (2023), “Anomaly Detection Dataset for Industrial Control Systems”, IEEE Access, vol. 11, pp. 107982–107996 doi: https://doi.org/10.1109/ACCESS.2023.3320928.
. Zhibo, Z., Benjamin, T., Shabnam, K., Hemanshu, P. and Jiankun, H. (2025), “UNSW-MG24: A Heterogeneous Dataset for Cybersecurity Analysis in Realistic Microgrid Systems”, IEEE Open Journal of the Computer Societ, pp. 1–12, doi: https://doi.org/10.1109/OJCS.2025.3564266
. Marzia, Z., Dhaval, U. and Chung-Horng, L. (2023), “Validation of a Machine Learning-based IDS Design Framework using ORNL Datasets for Power System with SCADA” IEEE Access, doi: https://doi.org/10.1109/ACCESS.2023.3326751
. Didik, S., Ying-Dar, L., Miel V., Ren-Hung, H., Yuan-Cheng, L., Laurens, D., Tim, W., Bruno, V. and Filip, De T. (2024), “Improving Generalization of ML-Based IDS With Lifecycle-Based Dataset, Auto-Learning Features and Deep Learning”, IEEE Transactions on Machine Learning in Communications and Networking, vol. 2, pp. 645–662, doi: https://doi.org/10.1109/TMLCN.2024.3402158
. Li, Q., Wang, B., Wen, X. and Chen, Y. (2025), “Malicious traffic prediction model for ResNet based on Maple-IDS dataset”, PLOS One, vol. 20, doi: https://doi.org/10.1371/journal.pone.0322000
. Yusof, M., Hafiz, M., Almohammedi, A. and Shepelev, V. (2022), “Visualizing Realistic Benchmarked IDS Dataset: CIRA-CIC-DoHBrw-2020”, IEEE Access, vol. 10, pp. 94624–94642, doi: https://doi.org/10.1109/ACCESS.2022.3204690
. Herzalla, D., Lunardi W. and Andreoni, M. (2023), “TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection”, IEEE Access, vol. 99, doi: https://doi.org/10.1109/ACCESS.2023.3319213
. Chelak, V., Hornostal, O., Chelak, Y. and Gavrylenko, S. (2025), “Decision Tree Construction Method using Cuckoo Search for Computer System State Identification”, 2025 IEEE 6th KhPI Week on Advanced Technology (KhPIWeek), pp. 1–6, doi: https://doi.org/10.1109/KhPIWeek61436.2025.11288613
. Gavrylenko, S., Chelak, V. and Hornostal, O. (2021), “Ensemble Approach Based on Bagging and Boosting for Identification the Computer System State”, 2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA), Bulgaria, 2021, pp. 1–7, doi: https://doi.org/10.1109/MMA52675.2021.9610949
. Eljialy, U., Mohammed Y. and Ahmad, S. (2024). “Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning”, Tsinghua Science and Technology, vol. 29., pp. 949–959. doi: https://doi.org/10.26599/TST.2023.9010032
. Gavrylenko, S. and Hornostal, O. (2023), “Study of Methods for Improving the Meta-Algorithm of the Bagging Classifier”, Proceedings of the IEEE 4th KhPI Week on Advanced Technology (KhPIWeek), pp. 1–6, doi: https://doi.org/10.1109/KhPIWeek61412.2023.10312977
. Gavrilenko, S. and Sheverdin, I. (2021), “Exploration of the computer system identification method based on the “Isolation Forest” algorithm”, Radio Electronics, Computer Science, Control, vol. 1(56), pp. 105–116. doi: https://doi.org/10.15588/1607-3274-2021-1-11
. Ali, M., Durad, M., Usman, H., Mohsin, A., Muhammad, S., Mujlid, H. and Carsten, H. (2023), “Effective network intrusion detection us stacking-based ensemble approach”, International Journal of Information Security, vol. 22, pp. 1–18, doi: https://doi.org/10.1007/s10207-023-00718-7
. Amit, S., Jay, P., Gaurav, K., Praphula, J. and Loknath, A. (2024), “Intrusion Detection System”, Journal of Database Management, vol. 35, doi: https://doi.org/10.4018/JDM.338276
. Josy, V. and Balachandra, M. (2021), “An Efficient IDS Framework for DDoS Attacks in SDN Environment”, IEEE Access, vol. 9, pp. 69680–69699. doi: https://doi.org/10.1109/ACCESS.2021.3078065.
. Thi-Thu-Huong, L., Yustus, O. and Howon, K. (2022), “XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems”, Sustainability, vol. 14, doi: https://doi.org/10.3390/su14148707
. Doghramachi, D. and Siddeeq A. (2023), “Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques”, Computers, Materials and Continua, vol. 77, pp. 717–732. doi: https://doi.org/10.32604/cmc.2023.041186
. Sura, E., Baydogmus, K., and Onder, D. (2023), “An ensemble learning based IDS using Voting rule: VEL-IDS. PeerJ”, Computer Science, vol. 9. article number 1553, doi: https://doi.org/10.7717/peerj-cs.1553
. Mhamad, B., Rakesh, R. K., Mohammad, H., Zubair, A., Arshad, A., Syed, I. Y., Mohammad, N. A., Nikhat, P. (2024), “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model”, IEEE Access, vol. 12, pp. 8846–8874, doi: https://doi.org/10.1109/ACCESS.2024.3353055
. Aldabash, O. and Akay, M. (2024), “WS-AWRE: Intrusion Detection Using Optimized Whale Sine Feature Selection and Artificial Neural Network Weighted Random Forest Classifier”, Applied Sciences, vol. 14, doi: https://doi.org/10.3390/app14052172
. Wenfeng, X. and Yongxian, F. (2022), “Intrusion Detection Systems Based on Logarithmic Autoencoder and XGBoost”, Security and Communication Networks, vol. 7, pp. 1–8, doi: https://doi.org/10.1155/2022/9068724
. Nuaimi, T., Zaabi, S., Alyilieli, M., AlMaskari, M., Alblooshi, S., Alhabsi, F., Yusof, M. F. and Al Badawi, A. (2023), “A Comparative Evaluation of Intrusion Detection Systems on the Edge-IIoT-2022 Dataset”, Intelligent Systems with Applications, vol. 20, article number 200298,. doi: https://doi.org/10.1016/j.iswa.2023.200298
. Ridha H., S., Dong W. and Mansour A. (2024), “Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data”, Applied Sciences, vol. 14, no. 2, doi: https://doi.org/10.3390/app14020479
. Belarbi, O., Khan, Aftab, C., P. and Spyridopoulos, T. (2022), “An Intrusion Detection System based on Deep Belief Networks”, Lecture Notes in Computer Science, doi: https://doi.org/10.48550/arXiv.2207.02117
. Alshehri, M., Saidani, O., Alrayes, F., Abbasi, S. and Ahmad, J. (2024), “A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection”, IEEE Access, vol. 12, pp. 45762–45772, doi: https://doi.org/10.1109/ACCESS.2024.3380816
. Gavrylenko, S. and Poltoratskyi, V. (2024), “Detection Computer Network Intrusion Using Deep Neural Networks”, 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek), pp. 1–5, doi: https://ieeexplore.ieee.org/document/10878100
. Long, Z., Yan, H., Shen, G., Zhang, X., He, H. and Cheng, L. (2024), “A Transformer-based network intrusion detection approach for cloud security”, Journal of Cloud Computing, vol. 13, doi: https://doi.org/10.1186/s13677-023-00574-9
. Safi, U., Jawad, A., Muazzam, K., Boulila, M., Koubaa, W., Jan, A., and Ullah, S. (2023). “TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks”, Computer Network, vol. 237. article number 110072, doi: https://doi.org/10.1016/j.comnet.2023.110072
. Hyunjun, J. and Deok-Hwan, K. (2024), “Intrusion Detection Using Transformer in Controller Area Network”, IEEE Access, vol. 12, pp. 121932–121946, doi: https://doi.org/10.1109/ACCESS.2024.3452634.
. Ghadermazi, J., Hore, S., Shah, A. and Bastian, N. D. (2025), “GTAE-IDS: Graph Transformer-Based Autoencoder Framework for Real-Time Network Intrusion Detection”, IEEE Transactions on Information Forensics and Security, vol. 20, pp. 4026–4041, doi: https://doi.org/10.1109/TIFS.2025.3557741
. Safi, U., Muazzam, K., Jawad, K., Shaukat, S., Zil, H., Tahir, M., Pitropakis, N., Khan, A. and Buchanan, W. (2022), “HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles”, Sensors, vol. 2, article number 1340, doi: https://doi.org/10.3390/s22041340
. Benahmed, H., M’hamedi, M., Merzoug, M., Hadjila, M., Bekkouche, A., Etchiali, A. and Said, M. (2025), “HBiLD-IDS: An Efficient Hybrid BiLSTM-DNN Model for Real-Time Intrusion Detection in IoMT Networks”, Information, vol. 16, article number 669, doi: https://doi.org/10.3390/info16080669
. Sandeepkumar R., Prathyusha, S., Nuruzzaman, F., Whaiduzzaman, A. and Aziz S. (2024), “Deep-IDS: A Real-time Intrusion Detector for IoT Nodes using Deep Learning”, IEEE Access, doi: https://doi.org/10.1109/ACCESS.2024.3396461
. Zaccagnino, R., Guarino, A., Cirillo, A. and Lettieri, N. (2023), “Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks”, 20-th International Conference on Security and Cryptography, pp. 394–401, doi: https://doi.org/10.5220/0012085700003555
. Hai, Z., Haojie, Z., Wei, L., Di L. and Yinchun, K. (2025), “HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer”, Sensors, vol. 25, article number 1752, doi: https://doi.org/10.3390/s25061752
. Bhavsar, M., Bekele Y., Roy, K. Kelly, C. and Limbrick, D. (2024), “FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT”, IEEE Access, vol. 12, pp. 52215–52226, doi: https://doi.org/10.1109/ACCESS.2024.3386631.
. Nivaashini, M., Suganya, E., Sountharrajan, S., Prabu, M. and Bavirisetti, D. (2024), “FEDDBN-IDS: Federated Deep Belief Network-based Wireless Network Intrusion Detection System”, EURASIP Journal on Information Security, vol. 2024, article number 8, doi: https://doi.org/10.1186/s13635-024-00156-5
. Markovic, T., Leon, M., Buffoni, D., and Punnekkat, S. (2024), “Random forest with differential privacy in federated learning framework for network attack detection and classification”, Applied Intelligence, vol. 54, pp. 1-–22. doi: https://doi.org/10.1007/s10489-024-05589-6
. Rehman, T., Tariq, N., Khan, F. A. and Rehman, S. U. (2025), “FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things”, Sensors, vol. 25, article number 10, doi: https://doi.org/10.3390/s250100
. Peng, H., Wu, C. and Xiao, Y. (2025), “FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments”, Sensors, vol. 25, article number 4309, doi: https://doi.org/10.3390/s25144309
. Althunayyan, M., Javed, A. and Rana, O. (2024), “A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning”, Vehicular Comm., vol. 49, doi: https://doi.org/10.48550/arXiv.2408.08433
. Bukhari, S., Zafar, M., Abou, M., Moosavi, S., Mansoor, M., Muaaz, M. and Sanfilippo, F. (2024), “Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability”, Ad Hoc Networks, vol. 155, article number 103407, doi: https://doi.org/10.1016/j.adhoc.2024.103407
. Javeed, D., Saeed, M., Adil, M., Kumar, P. and Jolfaei, A. (2024), “A federated learning-based zero trust intrusion detection system for Internet of Things”, Ad Hoc Networks, vol. 162., doi: https://doi.org/10.1016/j.adhoc.2024.103540
. Ullah, F., Ullah, S., Srivastava, G. and Lin, J. (2024), “IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic”, Dig. Comm. and Networks, pp. 190–204. doi: https://doi.org/10.1016/j.dcan.2023.03.008
. Gul, S., Sobia, S., Sanay, M., Adeel A. and Azam, M. (2024), “WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches”, Computers, vol. 14, article number 5, doi: https://doi.org/10.3390/computers14010004
. Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D.,Chyrva, Y., Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, vol. 6(4-120), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128
. Kuchuk, H., Kalinin, Y., Dotsenko, N., Chumachenko, I. and Pakhomov, Y. (2024), “Decomposition of integrated high-density IoT data flow”, Advanced Information Systems, vol. 8, no. 3, pp. 77–84, doi: https://doi.org/10.20998/2522-9052.2024.3.09
. Kelli, V., Argyriou, V., Lagkas, T., Fragulis, G., Grigoriou, E. and Sarigiannidis, P. (2021), “IDS for Industrial Applications: A Federated Learning Approach with Active Personalization”, Sensors, vol. 21, doi: https://doi.org/10.3390/s21206743
Jia, H., Zhen, C., Sheng-Zheng, L., Hao, Z. and Hai-Xia L. (2024), “Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning”, Sensors, vol. 24., article number 4002, doi: https://doi.org/10.3390/s24124002
Fatma, A., Zakariah, M., Mohammed, M. D. and Wadii, B. (2023), “Deep Neural Decision Forest (DNDF): A Novel Approach for Enhancing Intrusion Detection Systems in Network Traffic Analysis”, vol. 23, doi: https://doi.org/10.3390/s23208362
Minxiao V., Ning, Y., Yanhui, G. and Ning, W. (2024), “Learn-IDS: Bridging Gaps between Datasets and Learning-Based Network Intrusion Detection”, Electronics, vol. 13, pp. 1072, doi: https://doi.org/10.3390/electronics13061072
Asaad, B., Habaebi, M., Elsheikh, E., Islam, Md and Eldin, S. (2023), “The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems”, Sensors, vol. 23, article number 758, doi: https://doi.org/10.3390/s23020758
Bakro, M., Kumar, R. R., Husain, M., Ashraf, Z., Ali, A. and Yaqoob, S. I. (2024), “Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model”, IEEE Access, vol. 12, pp. 8846–8874, doi: https://doi.org/10.1109/ACCESS.2024.3353055