A REVIEW OF RESOURCE OPTIMIZATION TECHNIQUES IN INTRUSION DETECTION SYSTEMS

UDC: 004.728.056:004.491

Authors

  • Goce Stevanoski Military Academy General Mihailo Apostolski - Skopje
  • Aleksandar Risteski Faculty of Electrical Engineering and Information Technologies, Ss. Cyril and Methodius University, Skopje
  • Mitko Bogdanoski Military Academy General Mihailo Apostolski - Skopje

Keywords:

IDS, single-objective, multi-objective, resources, optimization

Abstract

Intrusion Detection Systems (IDS) are critical components in ensuring the security of modern network infrastructures, providing real-time detection and mitigation of malicious activities. However, these systems are often challenged by limited computational resources, high false-positive rates, and inefficiencies in handling large volumes of data. Resource optimization techniques have emerged as a vital area of research aimed at enhancing the efficiency and accuracy of IDS implementations. This review systematically analyzes various resource optimization strategies employed in IDS. The paper discusses the applicability, advantages, limitations, and performance impacts of these techniques across different intrusion detection scenarios. Finally, future research directions are proposed, highlighting the potential integration of advanced machine learning methods and real-time adaptive optimization methods to further improve IDS efficiency and reliability.

Downloads

Download data is not yet available.

References

[1] Dickson, Alex/Thomas, Charly: “Improved PSO for optimizing the performance of intrusion detection systems”. Journal of Intelligent & Fuzzy Systems 38(5), 2020, pp. 6537–6547.

[2] Issa, Mustafa M./Aljanabi, Mohammed/Muhialdeen, Hawraa M.: “Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations”. Journal of Intelligent Systems 33(1), 2024, pp. 1–24.

[3] Sharma, Saurabh/Kumar, Vinod/Dutta, Kunal: “Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review”. Internet of Things and Cyber-Physical Systems 4, 2024, pp. 258–267.

[4] Al-Shurbaji, Taha et al.: “Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review”. IEEE Access 13, 2025, pp. 11792–11822.

[5] Dai, Na/Suludag, Serdar: “Performance Tradeoff in ML-Based Intrusion Detection Systems: Efficacy vs. Resource Usage”. In: IEEE (ed.): 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC). IEEE: Piscataway 2024, pp. 1030–1031.

[6] Hoseinpur, Fatemeh: Towards security and resource efficiency in fog computing networks. 2022. https://urn.fi/URN:ISBN:978-952-335-886-7

[7] Houssein, Essam H./Saad, Mohammed R./Djenouri, Youcef/Hu, Gang/Ali, Ahmed A./Shaban, Hassan: “Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges”. Cluster Computing 27(10), 2024, pp. 13643–13673.

[8] Manzoor, Muhammad F./Abid, Adnan/Farooq, Muhammad S./Azam, Nabeel A./Farooq, Umar: “Resource Allocation Techniques in Cloud Computing: A Review and Future Directions”. Elektronika ir Elektrotechnika 26(6), 2020, pp. 40–51.

[9] Manivannan, Rajesh/Senthilkumar, S.: “Intrusion Detection System for Network Security Using Novel Adaptive Recurrent Neural Network-Based Fox Optimizer Concept”. International Journal of Computational Intelligence Systems 18(1), 2025, pp. 37.

[10] Einy, Shayan/Oz, Cagatay/Navaei, Yashar D.: “Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm‐Based Feature Selection and Fast‐Learning Network”. Wireless Communications and Mobile Computing 2021(1), 2021, pp. 6648351.

[11] Ahsan, Mohammad S./Islam, Shoriful/Shatabda, Swakkhar: “A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT”. Swarm and Evolutionary Computation 96, 2025, pp. 101984.

[12] Savanović, Nikola et al.: “Intrusion Detection in Healthcare 4.0 Internet of Things Systems via Metaheuristics Optimized Machine Learning”. Sustainability 15(16), 2023, pp. 12563..

[13] Umar, Halima G. A. et al.: “Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model”. Journal of Cloud Computing 14(1), 2025, pp. 32.

[14] Olanrewaju-George, Bukola/Pranggono, Bernardi: “Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models”. Cyber Security and Applications 3, 2025, pp. 100068

[15] Chen, Yang/Chen, Shuai/Xuan, Min/Lin, Qiang/Wei, Wei: “Evolutionary Convolutional Neural Network: An Application to Intrusion Detection”. In: IEEE (ed.): 2021 13th International Conference on Advanced Computational Intelligence (ICACI). IEEE: Piscataway 2021, pp. 245–252.

[16] Stehlik, Milan/Saleh, Ahmed/Stetsko, Andriy/Matyas, Vashek: “Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks”. In: MIT Press (ed.): Advances in Artificial Life, ECAL 2013. MIT Press: Cambridge 2013, pp. 569–576.

[17] Subramani, S./Selvi, M.: “Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks”. Optik (Stuttgart) 273, 2023, pp. 170419.

[18] Fatima, Maryam/Rehman, Obaid/Rahman, Ijaz M. H./Ajmal, Anum/Park, Seong J.: “Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices”. Future Internet 16(10), 2024, pp. 368.

[19] Cong, Pham T./Van Huong, Pham/Minh, Le Q.: “A Multi-Objective Approach to Improve Hyperparameters of CNN for Network Intrusion Detection Problem”. In: IEEE (ed.): 2024 1st International Conference on Cryptography and Information Security (VCRIS). IEEE: Piscataway 2024, pp. 1–6.

[20] Latif, Sarmad/Boulila, Wadii/Koubaa, Anis/Zou, Zhigang/Ahmad, Jawad: “DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm”. Journal of Network and Computer Applications 221, 2024, pp. 103784.

[21] Aljehane, Nada O. et al.: “Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security”. Alexandria Engineering Journal 86, 2024, pp. 415–424. doi: 10.1016/j.aej.2023.11.078.

[22] Alshahrani, Ali/Clark, John A.: “On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm”. In: Springer (ed.): Advances in Intelligent Systems and Computing. Springer: Cham 2023, pp. 514–535.

[23] Kashyap, Nikhil/Kumari, Anupama C./Chhikara, Rakesh: “Multi-objective Optimization using NSGA II for service composition in IoT”. Procedia Computer Science 167, 2020, pp. 1928–1933.

[24] Singh, Shailendra P./Dhiman, Gaurav/Viriyasitavat, Wattana/Kautish, Sandeep: “A Novel Multi-Objective Optimization Based Evolutionary Algorithm for Optimize the Services of Internet of Everything”. IEEE Access 10, 2022, pp. 106798–106811.

[25] Chen, Yang/Lin, Qiang/Wei, Wei/Ji, Jichuan/Wong, Ka-Chun/Coello, Carlos A. Coello: “Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing”. Knowledge-Based Systems 244, 2022, pp. 108505.

[26] Alshahrani, Ali: Optimising IDS Configurations for IoT Networks using AI Approaches. University of Sheffield: Sheffield 2023. https://etheses.whiterose.ac.uk/id/oai_id/oai:etheses.whiterose.ac.uk:3323

Downloads

Published

2025-10-27

How to Cite

A REVIEW OF RESOURCE OPTIMIZATION TECHNIQUES IN INTRUSION DETECTION SYSTEMS: UDC: 004.728.056:004.491. (2025). ETIMA, 3(1), 311-320. https://js.ugd.edu.mk/index.php/etima/article/view/7517