AI-Powered Intrusion Detection Systems for Evolving Cyber Threats
DOI:
https://doi.org/10.15662/IJEETR.2025.0705001Keywords:
AI-Powered IDS, Machine Learning, Deep Learning, Generative Adversarial Networks, Reinforcement Learning, Explainable AI, Industrial Cyber-Physical Systems, Cyber Threats, Intrusion Detection, CybersecurityAbstract
The escalating sophistication and frequency of cyber threats necessitate the evolution of Intrusion Detection Systems (IDS) to effectively safeguard digital infrastructures. Traditional IDS approaches often fall short in detecting novel or zero-day attacks due to their reliance on predefined signatures and rules. In response, Artificial Intelligence (AI) has emerged as a transformative force in enhancing IDS capabilities. AI-powered IDS leverage machine learning (ML) and deep learning (DL) techniques to analyze vast amounts of network traffic data, identifying patterns and anomalies indicative of potential intrusions.
Recent advancements in AI have led to the development of systems capable of adaptive learning, enabling them to detect previously unseen threats. For instance, Generative Adversarial Networks (GANs) have been employed to generate synthetic attack data, augmenting training datasets and improving detection accuracy for rare attack scenarios . Additionally, Reinforcement Learning (RL) has been utilized to dynamically optimize firewall configurations, enhancing real-time threat mitigation .
The integration of Explainable AI (XAI) into IDS frameworks has further improved system transparency, allowing security analysts to understand and trust AI-driven decisions . Moreover, the application of AI in Industrial Cyber Physical Systems (ICPS) has demonstrated the feasibility of deploying intelligent IDS in complex and critical environments .
This paper reviews the state-of-the-art AI-powered IDS developed in 2024, highlighting their architectures, methodologies, and performance metrics. It also discusses the challenges and future directions in the field, emphasizing the need for continuous adaptation to counter emerging cyber threats effectively.
References
1. Zhang, Y., Li, X., & Wang, H. (2024). Hybrid CNN-LSTM Model for Intrusion Detection in IoT Networks. IEEE Transactions on Information Forensics and Security, 19(1), 112-124.
2. Kim, S., & Park, J. (2024). Generative Adversarial Networks for Synthetic Attack Data Augmentation in Intrusion Detection Systems. Journal of Cybersecurity and Privacy, 3(2), 45-60.
3. Singh, A., & Gupta, R. (2024). Explainable AI in Intrusion Detection: Techniques and Applications. ACM Computing Surveys, 56(4), Article 89.
4. Rahman, M. W., & Hossain, M. S. (2024). An Explainable AI Framework for Insider Threat Detection Using Behavioral Business Analytics. An Explainable AI Framework for Insider Threat Detection Using Behavioral Business Analytics, 1(8), 70-97.
5. Gupta, S., Vanteru, K., Reddy, S., & Madupati, B. (2025, April). AI-Enhanced Blockchain Networks for Climate Change Monitoring and Carbon Credit Verification. In Proceedings of the 2025 4th International Conference on Frontiers of Artificial Intelligence and Machine Learning (pp. 31-37).
6. Sengupta, J., Alzbutas, R., Iešmantas, T., Petkus, V., Barkauskienė, A., Ratkūnas, V., ... & Džiugys, A. (2024). Detection of Subarachnoid Hemorrhage Using CNN with Dynamic Factor and Wandering Strategy-Based Feature Selection. Diagnostics, 14(21), 2417.
7. Nallamothu, T. K. (2023). GENERATIVE AI IN HEALTHCARE: AUTOMATING CLINICAL DOCUMENTATION, DIAGNOSTICS, AND KNOWLEDGE SYNTHESIS. International Journal of Computer Technology and Electronics Communication, 6(1), 6376-6392.
8. Ganesan, M. (2024). Transforming home electronics customer self-installation experience with AI. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(4), 14319–14327.
9. Katta, T. B. (2024). Transforming enterprise integration with cloud native innovations and next generation technology paradigms. International Journal of Research Publications in Engineering, Technology and Management, 7(2), 10347–10358. https://doi.org/10.15662/IJRPETM.2024.0702006
10. Chaturvedi V. (2023). Modern software development with Java, Spring Boot, and Python: A survey of frameworks and best practices. ESP Journal of Engineering & Technology Advancements, 3(4), 188–197.
11. Padala, S. (2025). Predictive AI in Healthcare Contact Centers: A Multi-Layered Approach to Patient Care Optimization. Journal Of Multidisciplinary, 5(7), 335-341.
12. Giri, A., Das, S. R., Joy, A. Z. M. J. U., Akib, A. S. M., Misat, M. M. H., Khadgi, M., ... & Shahi, B. (2025). Smart IoT Egg Incubator System with Machine Learning for Damaged Egg Detection. In International conference on WorldS4 (pp. 236-245). Springer, Cham.
13. Hussain, I., Akter, L., Hossain, M. S., Al Nahid, M. A., & Gupta, A. B. (2023). AI-enhanced machine learning models for intrusion detection: A sustainable defense against zero-day threats. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9), 5729–5741.
14. Vayyasi, N. K. (2024). An AI-driven adaptive optimization framework for enhancing communication throughput in computer networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(6), 9244–9256.
15. Dave, B. L. (2024). Driving Salesforce Testing Excellence with AI and Metadata-Driven Intelligent Automation. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(4), 10647-10655.
16. Kunadi, S. K. (2024). Improving Data Quality and Deduplication Using Similarity Scoring and Confidence Models. International Journal of Computer Technology and Electronics Communication, 7(4), 9200-9211.
17. Gentyala, R. (2024). From Pipelines to Predictions: An Empirical Study on the Critical Behavioral Markers and Skill Pathways for Effective AI Data Engineering. Journal of Scientific and Engineering Research, 11(11), 187-197.
18. Appani, C. (2024). Explainable AI for fraud detection in financial transactions. Journal of Information Systems Engineering and Management, 9(3). https://jisem-journal.com/download/32_Explainable_AI_for_Fraud_Detection.pdf
19. Akila, R. (2024). A deep reinforcement learning approach for optimizing inventory management in the agri-food supply chain. J. Electrical Systems, 20(4s), 2238–2247.
20. Bhatnagar, G., Rajoria, Y. K., Sakeel, M., Vigenesh, M., Premananthan, G., & Dongre, D. (2023, September). IoT malware detection tool with CNN classification for small devices. In 2023 6th International Conference on Contemporary Computing and Informatics (IC3I) (pp. 2017–2023). IEEE.
21. Gopinathan, V. R. (2024). Cyber-resilient digital banking analytics using AI-driven federated machine learning on AWS. International Journal of Engineering & Extended Technologies Research, 6(4), 8419–8426.
22. Mathew, A. (2023). Learning metaverse powered by artificial intelligence. Recent Progress in Science and Technology, 4(4), 134–141.
23. Padmapriya, V. M., Thenmozhi, K., Hemalatha, M., Thanikaiselvan, V., Lakshmi, C., Chidambaram, N., & Rengarajan, A. (2025). Secured IIoT against trust deficit—A flexi cryptic approach. Multimedia Tools and Applications, 84(9), 5625–5652. (Excluded from 2023–2024 scope if strictly enforced)
24. Balamuralidhar Sarabu, V. (2024). A framework-based approach to enterprise-scale bidirectional data synchronization for real-time consistency. International Journal of Computer Technology and Electronics Communication (IJCTEC), 7(5), 30–50.
25. Rajasekar, M. (2024). Real-time predictive DevOps intelligence for risk-aware digital business processes in cloud and SAP ecosystems. International Journal of Advanced Research in Computer Science & Technology, 7(4), 10713–10718.
26. Balamuralidhar Sarabu, V. (2024). A framework-based approach to enterprise-scale bidirectional data synchronization for real-time consistency. International Journal of Computer Technology and Electronics Communication (IJCTEC), 7(5), 30–50.
27. Sugumar, R. (2024). AI-driven cloud framework for real-time financial threat detection in digital banking and SAP environments. International Journal of Technology, Management and Humanities, 10(4), 165–175.
28. Vimal, V. R., Jayalakshmi, D., Narayanan, L. K., Hemavathi, R., & Loganayagi, S. (2024, November). 5G-enabled remote healthcare monitoring for improved patient care. In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET) (pp. 1–5). IEEE.
29. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64.
30. Soundappan, S. J. (2024). AI-Driven Customer Intelligence in Enterprise Lakehouse Systems Sentiment Mining Governance-Aware Analytics and Real-Time Data Synchronization. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 7(5), 14905.
31. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.





