AI-Powered Intrusion Detection and Prevention Systems for the Next Generation Network

Temitope Damilola Elijah, Akinsola Akintunde Samuel, Olayemi Babawole Familusi

Abstract

The rapid evolution of next-generation networks (NGNs), driven by 5G, IoT, edge computing, and software-defined networking, has introduced new opportunities alongside complex security challenges. Traditional intrusion detection and prevention systems (IDS), built on signature-based and anomaly-based methods, struggle to cope with the scale, heterogeneity, and dynamic threat landscape of NGNs. In response, artificial intelligence (AI) has emerged as a powerful enabler of modern IDPS. This review surveys AI-powered approaches, beginning with classical machine learning methods such as decision trees, support vector machines, and random forests, and then examining deep learning architectures including convolutional neural networks (CNNs), recurrent neural networks (RNNs), long short-term memory networks (LSTMs), and autoencoders. It further analyses hybrid frameworks that integrate ensemble learning, federated learning, and meta-learning, as well as specialised methods tailored for SDN, IoT, edge, and cloud/5G environments. Benchmark datasets, including NSL-KDD, CICIDS2017, UNSW-NB15, Bot-IoT, IoT-23, and TON_IoT, are reviewed, highlighting their contributions and limitations. The paper identifies key challenges, including dataset scarcity, generalisation gaps, computational overhead, adversarial robustness, explainability, and privacy. Future directions emphasise the need for realistic NGN datasets, lightweight yet accurate architectures, privacy-preserving and federated frameworks, and integrated detection and prevention mechanisms. Overall, AI-powered IDPS demonstrate significant potential to secure NGNs, but realising this vision will require advances that balance accuracy, efficiency, interpretability, and resilience.



Keywords


Artificial intelligence; Intrusion detection and prevention systems (IDPS); Next generation networks (NGNs); Deep learning

Full Text:

PDF


References


1. Noor, K., Imoize, A. L., Li, C., & Weng, C. (2025). A review of machine learning and transfer learning strategies for intrusion detection systems in 5G and beyond. Mathematics, 13(7), 1088. doi: 10.3390/math13071088

2. Xu, Z., Wu, Y., Wang, S., Gao, J., Qiu, T., Wang, Z., Wan, H., & Zhao, X. (2025). Deep learning-based Intrusion Detection Systems: a survey. arXiv (Cornell University). doi: 10.48550/arxiv.2504.07839

3. Hemalatha, S., Mahalakshmi, M., Vignesh, V., Geethalakshmi, M., Balasubramanian, D., & Anand, J. A. (2023). Deep Learning Approaches for Intrusion Detection in the Face of Emerging Cybersecurity Challenges. International Conference on Sustainable Communication Networks and Application (ICSCNA), 1522–1529. doi: 10.1109/icscna58489.2023.10370556

4. Kum, k. B., Amaechi, A., & Tonye, E. (2025). AI-Driven Intrusion Detection System for 5G Edge Networks Using Federated Learning: The case of Cameroon Regulatory, Technical & Real-World Relevance. International Journal of Research in Engineering and Science (IJRES), 13(6), 30-47.

5. Zhong, M., Lin, M., Zhang, C., & Xu, Z. (2024). A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. Computers & Security, 141, 103821. doi: 10.1016/j.cose.2024.103821

6. Bocu, R., & Iavich, M. (2022). Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks. Symmetry, 15(1), 110. doi: 10.3390/sym15010110

7. Rahman, M. M., Shakil, S. A., & Mustakim, M. R. (2024). A survey on intrusion detection systems in IoT networks. Cyber Security and Applications, 3, 100082. doi: 10.1016/j.csa.2024.100082

8. Alnasser, O., Muhtadi, J. A., Saleem, K., & Shrestha, S. (2025). Signature- and anomaly-based intrusion detection system for secure IoTs and V2G communication. Alexandria Engineering Journal, 125, 424–440. doi: 10.1016/j.aej.2025.03.068

9. Lazim, S., & Ali, Q., I. (2025). Machine Learning-Based Intrusion Detection and Prevention System for IIOT Smart Metering Networks: Challenges and Solutions. arXiv (Cornell University). doi: 10.48550/arxiv.2502.11138

10. Lo, W. W., Layeghy, S., Sarhan, M., Gallagher, M., & Portmann, M. (2022). E-GraphSAGE: A Graph Neural Network-based Intrusion Detection System for IoT. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1–9. doi: 10.1109/noms54207.2022.9789878

11. Caville, E., Lo, W. W., Layeghy, S., & Portmann, M. (2022). Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowledge-Based Systems, 258, 110030. doi: 10.1016/j.knosys.2022.110030

12. Wang, Y., Han, Z., Du, Y., Li, J., & He, X. (2025). BS-GAT: a network intrusion detection system based on a graph neural network for edge computing. Cybersecurity, 8(1). doi: 10.1186/s42400-024-00296-8

13. Nguyen, T., & Park, M. (2025). EL-GNN: A Continual-Learning-Based Graph Neural Network for Task-Incremental Intrusion Detection Systems. Electronics, 14(14), 2756. doi: 10.3390/electronics14142756

14. KDD (1999). KDD Cup 1999 Computer network intrusion detection. Retrieved from https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Tasks

15. Canadian Institute for Cybersecurity. (n. d.). Intrusion Detection Evaluation Dataset (CIC-IDS2017). Retrieved from https://www.unb.ca/cic/datasets/ids-2017.html

16. Saikia, P., Dholaria, D., Yadav, P., Patel, V., & Roy, M. (2022b). A Hybrid CNN-LSTM model for Video Deepfake Detection by Leveraging Optical Flow Features. arXiv (Cornell University). doi: 10.48550/arxiv.2208.00788

17. Khan, S. A., Artusi, A., & Dai, H. (2022). Adversarially robust deepfake media detection using fused convolutional neural network predictions. arXiv (Cornell University). doi: 10.48550/arxiv.2102.05950

18. Garcia, S., Parmisano, A., & Erquiaga, M. J. (2021). IoT-23: A labelled dataset with malicious and benign IoT network traffic. In Zenodo (CERN European Organisation for Nuclear Research). doi: 10.5281/zenodo.4743746

19. Canadian Institute for Cybersecurity. (n. d.). DDoS evaluation dataset (CIC-DDoS2019). Retrieved from https://www.unb.ca/cic/datasets/ddos-2019.html

20. Moustafa, N. (2019). The Bot-IoT dataset. In IEEE DataPort. doi: 10.21227/r7v2-x988

21. Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., & Anwar, A. (2020). TON_IoT Telemetry Dataset: A new generation dataset of IoT and IIOT for Data-Driven Intrusion Detection Systems. IEEE Access, 8, 165130–165150. doi: 10.1109/access.2020.3022862


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2025 Temitope Damilola Elijah, Akinsola Akintunde Samuel, Olayemi Babawole Familusi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.