Energy-Aware AI and Machine Learning Approaches for Next-Generation IDS

Authors

  • Sharmin Ferdous, Imran Hussain, Lamia Akter, Mohammed Shafeul Hossain, Amit Banwari Gupta

Keywords:

Energy-aware Intrusion Detection Systems., Machine Learning in Cybersecurity, Resource-efficient AI Models, Low-Power IDS Architecture, Intelligent Threat Detection

Abstract

Due to the increasing trend and sophistication of cyber threats, Intrusion Detection Systems (IDS) have formed an important part of the current cybersecurity repertoire. Nevertheless, the computational vocal power claim of Artificial Intelligence (AI) and Machine Learning (ML) models employed in the next-generation IDS has its energy depleting problems, especially in edge and mobile settings. This paper is an exhaustive examination of energy-aware AI and ML methods of improving IDS performance with minimal consumption of power. A new lightweight framework hybridizing ML algorithms and adaptive power management practices has been proposed in the paper to lower the energy overhead to increase detection accuracy. With the help of benchmark datasets (CICIDS2017, NSL-KDD), we measure the performance of multiple ML models (Decision tree, Support Vector machine, Random forest, and Deep Neural Network) with the help of such metrics as energy consumption, detection accuracy, and false-positive rate. To achieve this, the proposed system will be operated on a resource scarce testbed to provide a real world scenario in terms of operational constraints. Experimental results show that some ensemble models reported up to 30 percent saving in energy consumption at a minimal manner in performance when configured with energy-wise scheduling. The paper also discusses how energy-efficient network security appliances affect critical infrastructure, Internet of Things (IoT) devices and Cloud-Native infrastructures. Model behavior and energy-performance trade-offs are illustrated using visual analytics signs (bar charts, pie charts and system diagrams). The study provides a direction to the development of intelligent sustainable IDS that is applicable in next generation network settings where robustness in security is given emphasis and energy-efficient computing. The next step is the investigation of federated learning architectures and edge-based energy optimization in order to extend scalability and efficiency further.

Downloads

Download data is not yet available.

References

Abraham, J., &Ramanatha, K. S. (2008). Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks. In M. Miri (Ed.), Wireless Sensor and Actor Networks II (WSAN 2008), IFIP (Vol. 264). Springer. https://doi.org/10.1007/978-0-387-09441-0_13

Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Bhattacharya, S., Maddikunta, P. K. R., &Gadekallu, T. R. (2021). Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions. arXiv preprint. https://doi.org/10.48550/arXiv.2106.09527

Bace, R., & Gurley, B. (2001). Intrusion detection systems. NIST Special Publication 800‑94. https://doi.org/10.6028/NIST.SP.800-94

Batiha, T., &Krömer, P. (2020). Design and analysis of efficient neural intrusion detection for wireless sensor networks. Concurrency and Computation: Practice and Experience, 33(23), e6152. https://doi.org/10.1002/cpe.6152

Bi, J., & Xu, E. (2013). A Energy‑Efficient Attack Detection Protocol for WSN. Applied Mechanics and Materials, 380–384, 2716–2719. https://doi.org/10.4028/www.scientific.net/AMM.380-384.2716

Campos, E. M., FernándezSaura, P., González‑Vidal, A., Hernández‑Ramos, J. L., Bernal Bernabe, J., Baldini, G., &Skarmeta, A. F. (2021). Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges. arXiv preprint. https://doi.org/10.48550/arXiv.2108.00974

Gowdhaman, R., &Dhanapal, R. (2021). An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing. https://doi.org/10.1007/s00500-021-06473-y

Hosseini, S., &Zade, B. M. H. (2020). New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Computer Networks, 173:107168. https://doi.org/10.1016/j.comnet.2020.107168

Lv, Z., & Wan, J. (Year unknown). Intrusion Detection in Wireless Sensor Networks Based on IPSO‑SVM Algorithm. Journal of Cyber Security and Mobility. https://doi.org/10.13052/jcsm2245-1439.13410

Manimurugan, S., Al‑Mutairi, S., Aborokbah, M. M., Chilamkurti, N., Ganesan, S., &Patan, R. (2020). Effective attack detection in Internet of Medical Things smart environment using a deep belief neural network. IEEE Access, 8, 77396–77404. https://doi.org/10.1109/ACCESS.2020.2986013

Mokhtar Mohammadi, T. A. Rashid, S. H. T. Karim, A. H. M. Aldalwie, Q. T. Tho, M. Bidaki, A. M. Rahmani, & M. Hosseinzadeh. (2021). A comprehensive survey and taxonomy of SVM‑based intrusion detection systems. Journal of Network and Computer Applications, 178, Article 102983. https://doi.org/10.1016/j.jnca.2021.102983

Maheswari, M., &Karthika, R. A. (2021). A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Personal Communications, 118(2), 1535–1557. https://doi.org/10.1007/s11277-021-08101-2

Oprea, S. V., Bâra, A. B., Puican, F. C., &Radu, I. C. (2021). Anomaly detection with machine learning algorithms and big data in electricity consumption. Sustainability, 13(19), 10963. https://doi.org/10.3390/su131910963

Otoum, S., Kantarci, B., &Mouftah, H. T. (2020). A novel ensemble method for advanced intrusion detection in wireless sensor networks. In Proceedings of IEEE ICC 2020. https://doi.org/10.1109/ICC40277.2020.9149413

Pan, J. S., Fan, F., Chu, S. C., Zhao, H. Q., & Liu, G. Y. (2021). A lightweight intelligent intrusion detection model for wireless sensor networks. Security and Communication Networks. https://doi.org/10.1155/2021/5540895

Rezvi, M. A., et al. (2021). Data mining approach to analyzing intrusion detection of wireless sensor network. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 516–523. https://doi.org/10.11591/ijeecs.v21.i1.pp516%E2%80%91523

Sedjelmaci, H., &Senouci, S. M. (2016). An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure. IET Information Security. https://doi.org/10.1049/ise2.12097

Sheeba, L., &Meenakshi, V. S. (2019). Latency and power aware reliable intrusion detection system for ensuring network security in military applications. International Journal of Recent Technology and Engineering, 8(2 Special Issue 11), 367–375. https://doi.org/10.35940/ijrte.B1057.0982S1119

Shone, N., Nair, S., Tao, Y., Javitz, H., Liu, Y., & Hamza, M. (2018). Towards an energy complexity model for deep learning classification models used in intrusion detection. Sensors, 18(11), 3500. https://doi.org/10.3390/s18113500

Shen, W., Han, G., Shu, L., Rodrigues, J., &Chilamkurti, N. (2012). A New Energy Prediction Approach for Intrusion Detection in Cluster‑Based Wireless Sensor Networks. In Green Communications and Networking (GreeNets 2011). Springer. https://doi.org/10.1007/978-3-642-33368-2_1

Wang, X., & Yi, P. (2011). Security framework for wireless communications in smart distribution grid. IEEE Transactions on Smart Grid, 2(4), 809–818. https://doi.org/10.1109/TSG.2011.2167354

Yang, T., Mu, D., & Hu, W. (2014). Energy‑efficient border intrusion detection using wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2014:46. https://doi.org/10.1186/1687-1499-2014-46

Yao, R., Wang, N., Liu, Z., Chen, P., & Sheng, X. (2021). Intrusion Detection System in the Advanced Metering Infrastructure: A Cross‑Layer Feature‑Fusion CNN‑LSTM‑Based Approach. Sensors, 21(2), 626. https://doi.org/10.3390/s21020626

Zhang, H. (2015). Distributed Intrusion Detection Model in Wireless Sensor Network. International Journal of Online and Biomedical Engineering, 11(9), 61–66. https://doi.org/10.3991/ijoe.v11i9.5067

Zhang, W., Han, D., Li, K. C., &Massetto, F. I. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374. https://doi.org/10.1007/s00500-020-04678-1

Downloads

Published

31.10.2024

How to Cite

Sharmin Ferdous. (2024). Energy-Aware AI and Machine Learning Approaches for Next-Generation IDS. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 3601 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7797

Issue

Section

Research Article