Cybersecurity Through AI-Powered, Distributed Intrusion Detection And Prevention Systems

Authors

  • Naresh Kalimuthu Independent Researcher. Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V6I3P114

Keywords:

Intrusion Detection System (IDS), Artificial Intelligence (AI), Machine Learning, Federated Learning (FL), Distributed Systems, Cybersecurity, Anomaly Detection, Adversarial Attacks

Abstract

The growing sophistication of zero-day attacks has rendered traditional Intrusion Detection and Prevention Systems (IDPS) almost ineffective in enterprise networks. In this paper, we explore the transition to AI-based distributed IDPS, focusing particularly on Federated Learning (FL) as a core architecture. This approach provides enhanced, adaptive threat detection with built-in privacy protections. However, implementing this method in practice presents several challenges. This work addresses three key issues: the balance between scalability and computational overhead, privacy concerns in FL, and the vulnerability of AI to adversarial attacks. We incorporate cutting-edge solutions and draw on real-world examples to argue that only a multi-layered strategy combining architectural, cryptographic, and model-hardening measures can fully unlock the potential of these next-generation security systems

References

[1] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, "Federated learning for cyber security: A comprehensive survey," IEEE Transactions on Neural Networks and Learning Systems [Online]. Available: https://arxiv.org/pdf/2108.00974

[2] Y. Li, Y. Chen, N. Li, and W. Lou, "A survey of privacy-preserving federated learning," ACM Computing Surveys, vol. 54, no. 6, pp. 1-36, 2021. [Online]. Available: https://scispace.com/pdf/a-survey-of-secure-computation-using-trusted-execution-2iwby4n5.pdf

[3] Belenguer, Aitor & Navaridas, Javier & Pascual Saiz, Jose Antonio. (2022). A review of Federated Learning in Intrusion Detection Systems for IoT. 10.48550/arXiv.2204.12443.

[4] Guembe, B., Misra, S., & Azeta, A. (2024). Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey. Applied Artificial Intelligence, 38(1). https://doi.org/10.1080/08839514.2024.2410504

[5] Tarrah R. Glass-Vanderlan, Michael D. Iannacone, Maria S. Vincent, Qian (Guenevere) Chen, and Robert A. Bridges. 2018. A Survey of Intrusion Detection Systems Leveraging Host Data. ACM Comput. Surv. 9, 4, Article 39 (March 2018), 39 pages. Available: https://www.osti.gov/servlets/purl/1965280

[6] Liang, Warren. (2023). Adversarial Attacks and Defense Mechanisms in AI-Based IDS for V2X. Available: https://www.researchgate.net/publication/389089055_Adversarial_Attacks_and_Defense_Mechanisms_in_AI-Based_IDS_for_V2X

[7] Albulayhi, K., Smadi, A. A., Sheldon, F. T., & Abercrombie, R. K. (2021). IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors, 21(19), 6432. https://doi.org/10.3390/s21196432

[8] H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, "Communication-Efficient Learning of Deep Networks from Decentralized Data," in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 2017. [Online]. Available: https://arxiv.org/abs/1602.05629

[9] Sowmya, T. & e a, Mary. (2023). A comprehensive review of AI based intrusion detection system. Measurement: Sensors. 28. 100827. 10.1016/j.measen.2023.100827.

[10] M. Z. Alom, T. Taha, C. Yakopcic, S. Westberg, P. Sidike, M. S. Nasrin, B. C. Van Esesn, A. A. S. Awwal, and V. K. Asari, "A State-of-the-Art Survey on Deep Learning Theory and Architectures," Electronics, vol. 8, no. 3, p. 292, 2019. [Online]. Available: https://www.mdpi.com/2079-9292/8/3/292

[11] S. Agrawal, S. Sarkar, et al., "Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions," Computer Communications, vol. 160, pp. 415-425, 2021. [Online]. Available: https://www.semanticscholar.org/paper/Federated-Learning-for-Intrusion-Detection-System%3A-Agrawal-Sarkar/91b0acc50ff0b115ed4ce4010d0a471dac95d537

[12] L. N. R. Mudunuri, V. M. Aragani, and P. K. Maroju, "Enhancing Cybersecurity in Banking: Best Practices and Solutions for Securing the Digital Supply Chain," Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 929-936, Sep. 2024.

Downloads

Published

2025-09-10

Issue

Section

Articles

How to Cite

1.
Kalimuthu N. Cybersecurity Through AI-Powered, Distributed Intrusion Detection And Prevention Systems. IJERET [Internet]. 2025 Sep. 10 [cited 2025 Oct. 28];6(3):123-8. Available from: https://ijeret.org/index.php/ijeret/article/view/296