AI-Powered Intrusion Detection and Prevention Systems for the Next Generation Network
Abstract
Keywords
Full Text:
PDFReferences
1. Noor, K., Imoize, A. L., Li, C., & Weng, C. (2025). A review of machine learning and transfer learning strategies for intrusion detection systems in 5G and beyond. Mathematics, 13(7), 1088. doi: 10.3390/math13071088
2. Xu, Z., Wu, Y., Wang, S., Gao, J., Qiu, T., Wang, Z., Wan, H., & Zhao, X. (2025). Deep learning-based Intrusion Detection Systems: a survey. arXiv (Cornell University). doi: 10.48550/arxiv.2504.07839
3. Hemalatha, S., Mahalakshmi, M., Vignesh, V., Geethalakshmi, M., Balasubramanian, D., & Anand, J. A. (2023). Deep Learning Approaches for Intrusion Detection in the Face of Emerging Cybersecurity Challenges. International Conference on Sustainable Communication Networks and Application (ICSCNA), 1522–1529. doi: 10.1109/icscna58489.2023.10370556
4. Kum, k. B., Amaechi, A., & Tonye, E. (2025). AI-Driven Intrusion Detection System for 5G Edge Networks Using Federated Learning: The case of Cameroon Regulatory, Technical & Real-World Relevance. International Journal of Research in Engineering and Science (IJRES), 13(6), 30-47.
5. Zhong, M., Lin, M., Zhang, C., & Xu, Z. (2024). A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. Computers & Security, 141, 103821. doi: 10.1016/j.cose.2024.103821
6. Bocu, R., & Iavich, M. (2022). Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks. Symmetry, 15(1), 110. doi: 10.3390/sym15010110
7. Rahman, M. M., Shakil, S. A., & Mustakim, M. R. (2024). A survey on intrusion detection systems in IoT networks. Cyber Security and Applications, 3, 100082. doi: 10.1016/j.csa.2024.100082
8. Alnasser, O., Muhtadi, J. A., Saleem, K., & Shrestha, S. (2025). Signature- and anomaly-based intrusion detection system for secure IoTs and V2G communication. Alexandria Engineering Journal, 125, 424–440. doi: 10.1016/j.aej.2025.03.068
9. Lazim, S., & Ali, Q., I. (2025). Machine Learning-Based Intrusion Detection and Prevention System for IIOT Smart Metering Networks: Challenges and Solutions. arXiv (Cornell University). doi: 10.48550/arxiv.2502.11138
10. Lo, W. W., Layeghy, S., Sarhan, M., Gallagher, M., & Portmann, M. (2022). E-GraphSAGE: A Graph Neural Network-based Intrusion Detection System for IoT. NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1–9. doi: 10.1109/noms54207.2022.9789878
11. Caville, E., Lo, W. W., Layeghy, S., & Portmann, M. (2022). Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowledge-Based Systems, 258, 110030. doi: 10.1016/j.knosys.2022.110030
12. Wang, Y., Han, Z., Du, Y., Li, J., & He, X. (2025). BS-GAT: a network intrusion detection system based on a graph neural network for edge computing. Cybersecurity, 8(1). doi: 10.1186/s42400-024-00296-8
13. Nguyen, T., & Park, M. (2025). EL-GNN: A Continual-Learning-Based Graph Neural Network for Task-Incremental Intrusion Detection Systems. Electronics, 14(14), 2756. doi: 10.3390/electronics14142756
14. KDD (1999). KDD Cup 1999 Computer network intrusion detection. Retrieved from https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Tasks
15. Canadian Institute for Cybersecurity. (n. d.). Intrusion Detection Evaluation Dataset (CIC-IDS2017). Retrieved from https://www.unb.ca/cic/datasets/ids-2017.html
16. Saikia, P., Dholaria, D., Yadav, P., Patel, V., & Roy, M. (2022b). A Hybrid CNN-LSTM model for Video Deepfake Detection by Leveraging Optical Flow Features. arXiv (Cornell University). doi: 10.48550/arxiv.2208.00788
17. Khan, S. A., Artusi, A., & Dai, H. (2022). Adversarially robust deepfake media detection using fused convolutional neural network predictions. arXiv (Cornell University). doi: 10.48550/arxiv.2102.05950
18. Garcia, S., Parmisano, A., & Erquiaga, M. J. (2021). IoT-23: A labelled dataset with malicious and benign IoT network traffic. In Zenodo (CERN European Organisation for Nuclear Research). doi: 10.5281/zenodo.4743746
19. Canadian Institute for Cybersecurity. (n. d.). DDoS evaluation dataset (CIC-DDoS2019). Retrieved from https://www.unb.ca/cic/datasets/ddos-2019.html
20. Moustafa, N. (2019). The Bot-IoT dataset. In IEEE DataPort. doi: 10.21227/r7v2-x988
21. Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., & Anwar, A. (2020). TON_IoT Telemetry Dataset: A new generation dataset of IoT and IIOT for Data-Driven Intrusion Detection Systems. IEEE Access, 8, 165130–165150. doi: 10.1109/access.2020.3022862
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Temitope Damilola Elijah, Akinsola Akintunde Samuel, Olayemi Babawole Familusi

This work is licensed under a Creative Commons Attribution 4.0 International License.



