A Comprehensive Review on Energy Efficient Intrusion Detection System Based on Machine Learning and Deep Learning Technique

Abstract

With the rapid expansion of network-based applications, intrusion detection systems (IDS) have become essential for safeguarding sensitive data and ensuring system reliability. However, traditional IDS models often face challenges related to high computational cost and energy consumption, especially in resource-constrained environments. This paper presents a comprehensive review of energy-efficient IDS approaches based on machine learning and deep learning techniques. It covers various methods, including CNN, LSTM, auto encoders, optimization algorithms, and hybrid models, highlighting how they improve detection accuracy while reducing computational overhead. The review also analyzes datasets, performance metrics, and energy optimization strategies such as pruning, quantization, and knowledge distillation. By categorizing existing research and identifying gaps, this work aims to provide insights into designing scalable, low-latency, and energy-aware IDS solutions for modern networks. The findings serve as a foundation for future advancements in sustainable and intelligent cyber security systems.

Country : India

1 Rahul Senthiya2 Prof. Nitesh Gupta

  1. M. Tech. Scholar, CSE, NIIST, India
  2. AP, CSE, NIIST, India

IRJIET, Volume 9, Issue 9, September 2025 pp. 49-53

doi.org/10.47001/IRJIET/2025.909008

References

  1. Hafiz Gulfam Ahmad Umar, et. al. “Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model” Journal of Cloud Computing (2025), https://doi.org/10.1186/s13677-025-00762-9, Springer.
  2. Selvam Ravindran and Velliangiri Sarveshwaran “Deep Learning Towards Intrusion Detection System (IDS): Applications, Challenges and Opportunities” Journal of Mobile Multimedia, Vol. 19 5, 12991330.: 10.13052/jmm1550-4646.195, 8 2023 River Publishers.
  3. Dr. Sandeep Kumar Hegde et. al. “Energy Efficient Intrusion Detection System (IDS) and Feature Selection for IoT using DNN Model” International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(16s), 306–319.
  4. Christian Callegari et. al. “A Real Time Deep Learning Approach for Based Detecting Network Attacks” https://doi.org/10.1016/j.bdr.2024.100446, Elsevier, 2024.
  5. Yutong Wei, et. Al. “A review of deep learning based intrusion detection systems” Highlights in Science, Engineering and Technology AICT 2023 Volume 56 (2023).
  6. Surafel Mehari Atnafu, et. Al. “Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers” Indian Journal of Artificial Intelligence and Neural Networking (IJAINN) ISSN: 2582-7626 (Online), Volume-1 Issue-2, April 2021.
  7. Dániel László Vajda1 et al “Machine learning-based real-time anomaly detection using data pre-processing in the telemetry of server farms” https://doi.org/10.1038/s41598-024-72982-z.
  8. Sydney Mambwe Kasongo “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework” https://doi.org/10.1016/j.comcom.2022.12.010 Elsevier, 2022.
  9. Maloy Jyoti Goswami “AI-Based Anomaly Detection for Real-Time Cyber security” https://ijrrt.com, 2024.
  10. Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, F. Ahmad, Network intrusion detection system: A systematic study of machine learning and deep learning approaches, Trans. Emerg. Telecommun. Technol. 32 (1) (2021).
  11. R. Vinayakumar, M. Alazab, K.P. Soman, P. Poornachandran, A. Al-Nemrat, S. Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access 7 (2019) 41525–41550.
  12. Z. Chkirbene, A. Erbad, R. Hamila, A. Mohamed, M. Guizani, M. Hamdi, TIDCS: A dynamic intrusion detection and classification system based feature selection, IEEE Access 8 (2020).
  13. E. Alpaydin, Introduction to Machine Learning, MIT Press, 2020.
  14. M. Botvinick, S. Ritter, J.X. Wang, Z. Kurth-Nelson, C. Blundell, D. Hassabis, Reinforcement learning, fast and slow, Trends Cogn. Sci. 23 (5) (2019) 408–422.
  15. S. Raschka, V. Mirjalili, Python Machine Learning, Packt Publishing Ltd, 2017.
  16. Y. LeCun, Y. Bengio, G. Hinton, Deep learning, Nature 521 (7553) (2015) 436–444.
  17. Y. Wang, W. Liao, Y. Chang, Gated recurrent unit network-based short-term photovoltaic forecasting, Energies 11 (8) (2018) 2163.
  18. T. Chen, C. Guestrin, XGBoost: A scalable tree boosting system, in: Proceedings of the 22nd ACM Sigkdd Int Conf. on KDD, 2016, pp. 785–794.
  19. G. Meena, R.R. Choudhary, A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA, in: Int. Conf. on Comput. Commun. Electron., IEEE, 2017, pp. 553–558.
  20. A.F.. Jahwar and S.. Y. Ameen, "A Review on Cybersecurity based on Machine Learning and Deep Learning Algorithms", jscdm, vol. 2, no. 2, pp. 14 -25, Oct. 2021.
  21. A.L. Buczak and E. Guven, "A Survey of datas Mining and Machine Learning Methods for Cyber Security Intrusion Detection," in IEEE Communications Surveys & amp; Tutorials, vol. 18, no. 2, pp. 1153-1176, Second quarter 2016, doi: 10.1109/COMST.2015.2494502.
  22. http://nsl.cs.unb.ca/NSL-KDD/, November 2014.
  23. Samdanis, K. & Taleb, T. The road beyond 5G: A vision and insight of the key technologies. IEEE Network 34, 135–141. https://doi.org/10.1109/MNET.001.1900228 (2020).