
metric is commonly used, it can be misleading in im-
balanced settings; our model achieves an outstanding
accuracy of 99.94%, striking a balance between pre-
cision and robustness that outperforms existing meth-
ods. Furthermore, our approach is novel in its empha-
sis on practical deployment. Unlike prior work, our
model introduces a lightweight architecture explicitly
designed for edge environments, ensuring scalability
and efficiency. We are the first to deploy an intrusion
detection model on a Jetson Nano, achieving excep-
tionally low inference times of 0.185 ms for binary
classification and 0.187 ms for multiclass classifica-
tion.
Table 5: Comparison of Techniques and Performance Met-
rics.
Authors Techniques Accuracy F1 Edge
Alshehri et al. SA-DCNN 99.95% 99.53% No
Douiba et al. GB & DT 100% 99.50% No
Ferrag et al. DT, RF, SVM,
KNN, DNN
94.67 99% No
Ullah et al. MAGRU 99.97% 99.64% No
Our
Approach
DT, XGB,
LGBM, LDA,
TabNet, LSTM
99.94% 99.94% Yes
This capability demonstrates our model’s suit-
ability for real-world IIoT applications, where low-
latency and resource efficiency are paramount. These
contributions collectively establish our method as a
robust, high-performance, and deployable solution
that addresses the critical challenges faced by state-
of-the-art intrusion detection systems.
5 CONCLUSION
Our Intrusion Detection System (IDS) achieved a
99.94% F1 score on the Edge-IIoT dataset, over-
coming significant data imbalance. This success
is attributed to our autoencoder-based methodology,
which enhances feature learning and detection ac-
curacy while being lightweight for edge inference,
making it suitable for real-world IoT environments.
Pretraining the autoencoder enabled efficient knowl-
edge transfer, further boosting performance. Look-
ing ahead, we plan to expand our research by test-
ing the model on additional datasets and diverse IoT
settings, integrating advanced machine learning algo-
rithms, and refining feature extraction techniques to
detect more sophisticated attacks. We also aim to im-
prove the model’s robustness and scalability for real-
time deployment in large-scale IoT networks.
REFERENCES
Abdulkareem, S. A., Foh, C. H., Carrez, F., and Moessner,
K. (2024). A lightweight sel for attack detection in
iot/iiot networks. Journal of Network and Computer
Applications, 230:103980.
Alani, M. M. (2023). An explainable efficient flow-based
industrial iot intrusion detection system. Computers
and Electrical Engineering, 108:108732.
Alshehri, M. S., Saidani, O., Alrayes, F. S., Abbasi, S. F.,
and Ahmad, J. (2024). A self-attention-based deep
convolutional neural networks for iiot networks intru-
sion detection. IEEE Access.
Buczak, A. L. and Guven, E. (2015). A survey of data min-
ing and machine learning methods for cyber security
intrusion detection. IEEE Communications surveys &
tutorials, 18(2):1153–1176.
Douiba, M., Benkirane, S., Guezzaz, A., and Azrour, M.
(2023). An improved anomaly detection model for iot
security using decision tree and gradient boosting. The
Journal of Supercomputing, 79(3):3392–3411.
Elrawy, M. F., Awad, A. I., and Hamed, H. F. (2018). In-
trusion detection systems for iot-based smart environ-
ments: a survey. Journal of Cloud Computing, 7(1):1–
20.
Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., and
Janicke, H. (2022). Edge-iiotset: A new comprehen-
sive realistic cyber security dataset of iot and iiot ap-
plications for centralized and federated learning. IEEE
Access, 10:40281–40306.
Hassan, W. H. et al. (2019). Current research on internet of
things (iot) security: A survey. Computer networks,
148:283–294.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., and
Sikdar, B. (2019). A survey on iot security: applica-
tion areas, security threats, and solution architectures.
IEEE Access, 7:82721–82743.
Hassini, K., Khalis, S., Habibi, O., Chemmakha, M., and
Lazaar, M. (2024). An end-to-end learning approach
for enhancing intrusion detection in industrial-internet
of things. Knowledge-Based Systems, 294:111785.
Hossain, A., Badawy, A.-H. A., Islam, M. A., Patki, T., and
Ahmed, K. (2025). Hpc application parameter auto-
tuning on edge devices: A bandit learning approach.
arXiv preprint arXiv:2501.01057.
Karatas, G., Demir, O., and Sahingoz, O. K. (2020). In-
creasing the performance of machine learning-based
idss on an imbalanced and up-to-date dataset. IEEE
access, 8:32150–32162.
Leu, F.-Y., Tsai, K.-L., Hsiao, Y.-T., and Yang, C.-T. (2015).
An internal intrusion detection and protection system
by using data mining and forensic techniques. IEEE
Systems Journal, 11(2):427–438.
Lynn, T., Endo, P. T., Ribeiro, A. M. N., Barbosa, G. B., and
Rosati, P. (2020). The internet of things: definitions,
key concepts, and reference architectures. The Cloud-
To-Thing Continuum: Opportunities and Challenges
in Cloud, Fog and Edge Computing, pages 1–22.
Mirsky, Y., Doitshman, T., Elovici, Y., and Shabtai, A.
(2018). Kitsune: an ensemble of autoencoders for
Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning
213