International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 7, Issue 4 (July-August 2025) Submit your research before last 3 days of August to publish your research paper in the issue of July-August.

Intrusion Detection Systems for IoT Networks: A Comprehensive Review and Conceptual Framework

Author(s) Dr. Asma Shaikh, Dr. Praveen B M, Dr. Suhel Sayyad
Country India
Abstract The rapid expansion of Internet of Things (IoT) devices has significantly heightened the risk of cyber-attacks, necessitating robust security measures such as Intrusion Detection Systems (IDS). Traditional IDS approaches often struggle to process the vast amounts of data generated by IoT networks. Recent advancements in deep learning, particularly Convolutional Neural Networks (CNNs), have demonstrated potential in enhancing security by automatically detecting complex patterns in data. This study aims to explore and analyze CNN-based and hybrid deep learning methods for IDS in IoT networks.
Design/Methodology/Approach: This paper conducts a comprehensive review of IDS techniques for IoT networks, focusing on deep learning-based approaches published between 2017 and 2025. The analysis includes methods such as edge computing, transfer learning, lightweight models, and federated learning to improve detection accuracy and efficiency while addressing the resource constraints of IoT devices.
Findings/Result: The study highlights that deep learning-based IDS can effectively detect both known and unknown threats with high accuracy and low false-positive rates. However, challenges such as high computational costs, interpretability of models, and real-time processing limitations remain. The review identifies key factors influencing IDS performance and proposes potential improvements for future research.
Keywords IoT, Machine Learning, Intrusion Detection System, Attacks
Field Computer > Network / Security
Published In Volume 7, Issue 4, July-August 2025
Published On 2025-08-13
DOI https://doi.org/10.36948/ijfmr.2025.v07i04.53626
Short DOI https://doi.org/g9w7hd

Share this