<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Journal of Network
and Computer Applications 186 (2021) 103082. doi:10.1016/j.jnca.2021.103082.
[7] W. Liu</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1016/j.comcom.2020.10.002</article-id>
      <title-group>
        <article-title>machine learning-based intrusion detection systems for IoT environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zhe Deng</string-name>
          <email>zhe.deng@taltech.ee</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Tallinn University of Technology</institution>
          ,
          <addr-line>Ehitajate tee 5, 12616, Tallinn</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>2014</volume>
      <fpage>305</fpage>
      <lpage>316</lpage>
      <abstract>
        <p>The rapid growth of Internet of Things (IoT) devices has expanded the attack surface of modern networks, underscoring the need for robust and adaptive security solutions. Machine learning-based Intrusion Detection Systems (IDS) ofer promise but face challenges like data scarcity, imbalance, and concept drift. This paper outlines ongoing doctoral research focused on developing scalable and label-eficient IDS frameworks tailored to IoT environments. A systematic literature review evaluates the role of generative models, such as GANs, Autoencoders, and Transformers, in addressing these challenges. In addition, the paper presents a novel active learning-based detection pipeline, validated using mobile malware data. Combining uncertainty sampling, autolabeling, and drift detection, the approach achieves over 97% accuracy with less than 3% labeled data. These results support the core hypothesis that adaptive, lightweight ML models may improve intrusion detection in IoT environments.</p>
      </abstract>
      <kwd-group>
        <kwd>machine learning (ML)</kwd>
        <kwd>intrusion detection system (IDS)</kwd>
        <kwd>Internet of Things (IoT)</kwd>
        <kwd>generative AI</kwd>
        <kwd>mobile malware</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The proliferation of the Internet of Things (IoT) has fundamentally transformed the digital landscape,
connecting billions of devices and industrial sensors into a massive, distributed computing
environment [1, 2]. While this interconnectedness brings unprecedented convenience and innovation, it also
introduces serious cybersecurity risks. IoT environments are increasingly targeted by adversaries
exploiting their inherent limitations: heterogeneous architectures, minimal security configurations,
limited computational resources, and inconsistent software updates. These factors render traditional
Intrusion Detection Systems (IDS), which are often designed for stationary, high-power environments,
inefective when applied directly to IoT [ 3, 4].</p>
      <p>Machine learning (ML)-based IDSs have emerged as promising tools to enhance the security of IoT
environments due to their ability to learn complex attack patterns from data and adapt to previously
unseen threats [5]. However, several challenges complicate the efective use of ML in this context.
First, acquiring large, labeled datasets in IoT is dificult due to privacy concerns, labeling costs, and
the domain-specific nature of threats. Second, IoT data is often highly imbalanced and non-stationary,
with concept drift emerging over time as attackers evolve their techniques [ 6]. Third, the constrained
resources of IoT devices demand lightweight, eficient models capable of real-time inference without
degrading performance [7].</p>
      <p>The central objective of my PhD research is to develop machine learning-based intrusion detection
systems tailored specifically for IoT environments that are adaptive, label-eficient, and robust to
evolving threat patterns and computational limitations. In support of this objective, my work has taken
two significant directions thus far. First, a systematic literature review has examined the current state
of generative artificial intelligence within IDS, with a particular focus on its relevance and applicability
to the Internet of Things. This review ofers an overview of recent advances, identifies common design
challenges, and highlights unresolved problems that limit the deployment of generative models in
https://zhe2d.github.io (Z. Deng)</p>
      <p>CEUR</p>
      <p>ceur-ws.org
resource-constrained environments [8]. Second, I have designed and evaluated an active learning-based
detection framework that combines auto-labeling with data drift detection. This approach aims to
reduce the reliance on expensive manual annotation while maintaining strong detection performance
over time, even as the underlying data distribution shifts [ 9].</p>
      <p>Together, these contributions lay the groundwork for developing intelligent IDS solutions capable of
operating in complex and dynamic IoT ecosystems. They also help clarify the practical requirements
and limitations that any future IDS must meet to be efective and sustainable in the long term. My
ongoing research builds on these insights by investigating how hybrid architectures, including ensemble
models and federated learning techniques, might further improve adaptability and eficiency in diverse
deployment contexts [10, 11]. Through this research, I aim to contribute to the development of practical,
scalable, and intelligent IDS frameworks that address the evolving security needs of the IoT landscape.</p>
      <p>This paper is structured as follows: Section 2 introduces the research methodology and experimental
framework employed. Section 3 reviews related literature on machine learning, specifically generative
AI for IoT IDS, and outlines gaps. Section 4 presents the preliminary results based on the active learning
framework developed in earlier work. Section 5 discusses the implications of these findings and proposes
directions for future investigation.</p>
      <sec id="sec-1-1">
        <title>1.1. Research questions</title>
        <p>The following research questions (RQs) are derived from the limitations, challenges, and research
gaps identified in the systematic literature review presented in Section 2. Specifically, gaps related to
data scarcity, class imbalance, deployment constraints, and concept drift shaped the formulation of
each question. These RQs guide the scope of this doctoral research and ensure alignment between
literature-driven needs and methodological direction.</p>
        <p>RQ1: What are the key limitations and emerging trends in applying machine learning, including generative</p>
        <p>AI, to intrusion detection in IoT environments?
RQ2: How can ML models be adapted to detect cyber threats in IoT environments with limited labeled
data, data imbalance, and concept drift?
RQ3: What features and data representations are most efective for training ML-based IDS in heterogeneous
and resource-constrained IoT environments?
RQ4: To what extent can hybrid ML techniques improve detection performance, robustness, and adaptability
in evolving IoT threat landscapes?</p>
        <p>These questions are addressed through a combination of systematic literature analysis and empirical
evaluation of proposed ML-based IDS frameworks. The answers to these questions will contribute
to the design of next-generation intrusion detection solutions that are both efective and practical in
real-world IoT environments.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Research methodology</title>
      <p>
        This research adopts the Applied Research method [12], targeting real-world challenges in designing and
deploying machine learning-based intrusion detection systems for IoT environments. It is a six-phase
cyclic model:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) Problem analysis: This work is motivated by limitations in existing IDSs, particularly their inability
to handle non-stationary data, reliance on labeled datasets, and ineficiency in constrained environments.
IoT environments introduce further complexity, including heterogeneous devices, multimodal data, and
evolving threats—necessitating IDSs that are adaptive and resource-aware.
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) Literature review: A structured, ongoing literature review underpins all research stages, covering
foundational theories and emerging approaches such as generative AI, active/semi-supervised learning,
drift detection, and explainable AI. Particular attention is given to IoT-specific challenges like device
diversity and limited computational capacity. The initial research cycle involved a systematic review
identifying limitations in current ML-based IDSs, guiding both hypothesis formation and experimental
design.
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) Hypothesis formulation: Each cycle defines testable hypotheses addressing design goals such as
label eficiency, robustness, and adaptability. For example, we hypothesize that active learning reduces
annotation costs and that hybrid models enhance performance across heterogeneous domains. These
hypotheses align with the overarching research questions.
(4) Dataset collection and feature engineering: The evaluation leverages a dual-domain setup:
mobile malware detection (KronoDroid) and IoT intrusion datasets (UNSW-NB15 [13], Edge-IIoT [14]).
Mobile malware ofers a high-fidelity proxy for IoT dynamics, supporting experiments on drift and
hybrid features. IoT network datasets complement this with protocol-specific trafic and deployment
realism. Known dataset limitations are mitigated through preprocessing and feature engineering.
      </p>
      <p>Features across all datasets were unified into hybrid representations combining static (e.g.,
permissions) and dynamic (e.g., system calls) indicators. Temporal segmentation simulates real-world
evolution, enabling longitudinal evaluations of adaptability and generalizability.
(5) Development and experimentation: Machine learning-based IDS prototypes were developed
with modular designs incorporating active learning, drift detection, auto-labeling, and (future)
generative augmentation. Experiments span various datasets, feature sets, and supervision levels (e.g., full,
uncertainty-based). Android malware currently serves as the testbed, with plans to extend to federated
IoT setups.
(6) Evaluation and validation: Evaluation includes standard metrics (accuracy, F1, etc.) alongside
deployment-oriented criteria like label cost, adaptability, and computational overhead. Explainability is
also considered to ensure interpretability in critical contexts. Longitudinal tests across time-segmented
data support analysis under concept drift.</p>
      <p>Each cycle’s findings refine subsequent methodology, supporting an iterative and practice-driven
research process. Implementation is conducted in Python using Scikit-learn, TensorFlow, and PyTorch.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Related research</title>
      <sec id="sec-3-1">
        <title>3.1. Generative AI in IDS for IoT: a systematic literature review</title>
        <p>The growing interest in applying machine learning (ML) to intrusion detection for Internet of Things
(IoT) systems has resulted in a fragmented and evolving body of literature. Given the complexity of
the ML landscape and the increasing prominence of generative artificial intelligence (AI) within it,
this study conducted a systematic literature review [8] to establish a clear foundation for this doctoral
research.</p>
        <p>The review protocol was developed to ensure methodological rigor and relevance to the research
questions at hand, following Kitchenham’s guidelines [15]. We conducted a comprehensive search
of major scientific databases, including IEEE Xplore, Scopus, ACM Digital Library, SpringerLink, and
ScienceDirect, focusing on the period between 2018 and 2023, beginning with the first recognized
scientific evaluation of GAN applicability in IoT IDS [ 16]. The query string ”(generative AI OR GAN OR
Transformers) AND (Internet of Things OR IoT) AND (intrusion detection OR IDS)” was used to identify
studies at the intersection of these domains. After applying inclusion, exclusion, and quality assessment
criteria, 100 primary studies were selected for detailed analysis.</p>
        <p>The findings highlight a growing use of generative models, especially GANs—for addressing core
challenges in IoT IDS, including limited labeled data, class imbalance, and evolving threat behavior (RQ2,
RQ3). GANs are primarily employed for data augmentation and anomaly detection, while
Transformerbased models are emerging for time-series and sequential trafic analysis, reflecting increased attention
to temporal patterns and real-world applicability (RQ1).</p>
        <p>Applications of generative AI span synthetic attack generation, unsupervised feature learning, and
latent representation modeling. These methods support the development of IDS that can adapt to
heterogeneity and resource constraints common in IoT environments (RQ2, RQ3). However, the
review also exposes methodological gaps: many studies lack evaluation across datasets, fail to assess
robustness or explainability, and rely on static benchmarks, limiting insight into model generalizability
and operational readiness (RQ4).</p>
        <p>This review thus establishes a foundation for the present research, reinforcing the need for
adaptable, label-eficient, and rigorously evaluated ML-based IDS tailored for dynamic IoT environments.
The following subsections provide a detailed synthesis of three dimensions of the literature review:
generative model architectures and techniques, their applications in IoT IDS, and the approaches used
to evaluate their performance and relevance.</p>
        <sec id="sec-3-1-1">
          <title>3.1.1. Generative AI model architectures and techniques</title>
          <p>Four primary generative model families dominate the research landscape: GANs, AEs (including VAEs
and CVAEs), Transformer-based models, and hybrid or alternative architectures. GAN-based approaches
constitute the majority, with over 58% of the reviewed studies employing variants such as Conditional
GANs (CGAN), Auxiliary Classifier GANs (ACGAN), and Wasserstein GANs (WGAN-GP) [ 17]. These
models typically pair a generator with a discriminator to synthesize realistic intrusion trafic, often to
augment minority-class samples in imbalanced datasets.</p>
          <p>Autoencoder-based approaches, including standard AEs and variational variants, are primarily used
for feature compression and reconstruction. While they are less prevalent as standalone generative
models, AEs often appear in hybrid systems, where their capacity to model latent representations
complements the data synthesis capabilities of GANs. Transformer-based architectures, though relatively
recent, have shown potential in modeling sequential patterns in IoT trafic. Their parallel computation
capability and attention mechanisms ofer a pathway to capturing long-range patterns in complex IoT
trafic data.</p>
          <p>Hybrid architectures further combine the strengths of multiple model types. Notable examples include
GAN+AE models, which leverage adversarial learning for sample generation alongside autoencoding
for anomaly detection. Similarly, Transformer-GAN hybrids incorporate temporal modeling with data
synthesis to create robust, explainable, and adaptable detection pipelines.</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>3.1.2. Applications in IoT intrusion detection</title>
          <p>The reviewed literature identifies three core application domains for generative models within IoT IDS:
data augmentation and class balancing, anomaly detection and reconstruction, and adversarial attack
simulation.</p>
          <p>The most prevalent application is data augmentation, where synthetic samples are generated to
expand limited training sets. GANs and VAEs are commonly employed to address extreme class
imbalance, a common issue in IDS datasets where benign trafic vastly outnumbers malicious instances.
Techniques such as Conditional Tabular GAN (CTGAN) [18] are employed to selectively synthesize
minority class data while preserving distributional fidelity. Several studies report gains in recall and
generalization, particularly in class-imbalanced contexts.</p>
          <p>Reconstruction-based applications primarily involve AEs and VAEs. These models are trained to
learn the distribution of benign trafic and identify anomalies based on reconstruction error. This is
particularly useful for zero-day attack detection, where no labeled attack data exists. Additionally, AEs
contribute to dimensionality reduction and feature extraction, both of which are critical for eficient
deployment in resource-constrained IoT settings.</p>
          <p>A smaller but growing segment of research explores adversarial attack generation. Here, GANs
are trained to generate adversarial samples that evade detection, serving both ofensive research and
defensive countermeasure development. These works underscore the vulnerability of existing ML-based
IDS and highlight the importance of robust, adversarially trained models for deployment in real-world
scenarios.</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>3.1.3. Evaluation approaches and performance metrics</title>
          <p>While the reviewed studies report promising detection accuracies, often exceeding 95% on the benchmark
datasets, they frequently lack robustness evaluations across diverse scenarios and real-world conditions.
The quality and comprehensiveness of evaluation methodologies vary widely. The most frequently
used datasets include NSL-KDD [19], BoT-IoT [20], CICIDS2017 [21], and UNSW-NB15 [13], many of
which sufer from known limitations such as outdated attack scenarios, synthetic trafic, or limited
diversity.</p>
          <p>Standard evaluation metrics, accuracy, precision, recall, and F1 score, are commonly reported, but are
often insuficient to fully characterize model performance in dynamic IoT environments. Few studies
assess robustness to concept drift, generalizability [ 3] across domains, or computational eficiency.
Moreover, explainability [22], a crucial criterion for operational trust in IDS, is rarely addressed.
Transformer-based models and some hybrid architectures ofer potential for interpretable outputs (e.g.,
through attention weights), yet few studies capitalize on this capacity.</p>
          <p>Another overlooked aspect is deployment feasibility. While generative AI models show strong
performance in centralized training, few consider lightweight [11] or distributed deployment. This is a
significant omission, as many IoT devices operate under severe resource constraints, necessitating
models with low memory and computational footprints. Federated and edge-aware generative frameworks,
while emerging, remain largely underexplored.</p>
          <p>In summary, the systematic literature review reveals that while generative models ofer substantial
advantages for IoT IDS, particularly in enhancing data availability and improving detection of evolving
threats, significant gaps remain in evaluation rigor, deployment realism, and operational explainability.
These findings directly inform the methodological direction of this doctoral research.</p>
          <p>Despite promising results, most studies remain limited in terms of practical deployment. Evaluation
practices are frequently narrow in scope, relying on isolated metrics such as accuracy or F1-score
without examining robustness, generalizability, or explainability across diferent IoT scenarios (RQ4).
Furthermore, only a few studies report performance under adversarial conditions or across multiple
datasets, and almost none consider model interpretability, a critical factor for real-world applications.
These limitations suggest that while generative AI holds potential for advancing IDS design, existing
approaches often fall short in ensuring operational feasibility and broad applicability.</p>
          <p>This review establishes a foundation for this doctoral study by identifying where generative techniques
can meaningfully contribute to IoT security and where methodological gaps persist. Specifically, it
highlights the need for IDS frameworks that are not only accurate but also adaptive, explainable, and
eficient enough to be deployed at scale across diverse IoT environments.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Active learning and concept drift in ML-based IDS</title>
        <p>Intrusion detection in IoT environments is challenged by dynamic data distributions, severe class
imbalance, scarce labeled data, and resource constraints at the edge. These limitations make conventional,
static ML-based IDS architectures inadequate for real-world deployment. Concept drift caused by
evolving attacker behaviors, software updates, or shifting device patterns can degrade model performance
over time, necessitating adaptive learning strategies (RQ1, RQ2).</p>
        <p>Active learning ofers a label-eficient alternative by querying only the most informative samples
from incoming data, thereby reducing annotation efort while preserving accuracy. This approach
has been explored in both batch-based and online learning settings, the latter processing data one
instance at a time to accommodate environments with limited storage or computational resources [23].
When applied to non-stationary data streams, active learning frameworks can incorporate drift-aware
retraining and ensemble methods to remain efective [ 7, 24]. Nonetheless, labeling the entire stream
remains costly, reinforcing the utility of selective querying.</p>
        <p>While active learning holds promise, it is not immune to adversarial risks. Attackers may inject
malicious samples into the data pool, corrupt the labeling oracle, or craft adversarial examples that
evade detection [25, 26]. These threats highlight the need for robust, trustworthy integration of active
learning in IDS pipelines.</p>
        <p>In terms of practical applications, active learning has been successfully employed in network intrusion
detection to improve detection quality with minimal supervision [27]. This study leverages mobile
malware detection as a proxy domain to explore active learning under non-stationary conditions—a
challenge shared with many real-world IoT deployments Recent research has shown that dynamic
behavioral features (e.g., system calls)[28, 29] and hybrid representations combining static and dynamic
data[30] enhance model performance in such settings. Studies that leverage human-in-the-loop active
learning have also demonstrated improved detection of IoT-specific threats, including botnets, with
significantly reduced data requirements [ 31].</p>
        <p>Explainability is another important consideration. Active learning inherently supports human
oversight by surfacing the most uncertain or ambiguous samples for labeling. This selective transparency
not only improves model robustness but also facilitates trust and auditability in high-stakes applications,
such as healthcare, industrial automation, and autonomous systems (RQ4).</p>
        <p>In summary, active learning provides a promising avenue for addressing the limitations of traditional
IDS in IoT environments. However, existing methods often lack comprehensive integration of drift
detection, adversarial resilience, and explainability. This doctoral research aims to develop adaptive,
label-eficient, and resource-aware intrusion detection frameworks for IoT environments, with a focus
on robustness to evolving threats, concept drift, and deployment constraints. The solutions will be
empirically validated and designed to be practically deployable in heterogeneous real-world contexts.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results (preliminary)</title>
      <p>Active learning-based intrusion detection for mobile malware
As the beginning of this doctoral research, we developed and evaluated an active learning-based malware
detection framework aimed at improving adaptability and reducing labeling costs in machine
learningbased intrusion detection systems (IDS) for dynamic environments. The framework was experimentally
validated in the context of mobile malware detection, using real-world Android telemetry data as
a testbed to simulate IoT-relevant operational conditions such as data imbalance, concept drift, and
constrained labeling resources. The results presented in this section are drawn from our publication [9].</p>
      <p>The study utilizes the KronoDroid dataset [32], which is labeled with timestamps and rich hybrid
features (permissions and system calls). These timestamps enabled the simulation of a continuous,
evolving data stream, divided into 44 chronological periods, thus allowing for realistic modeling of
non-stationary malware behavior and drift in data distributions.</p>
      <p>Our approach integrates a pool-based active learning mechanism with auto-labeling and drift-aware
thresholding strategies. During each learning iteration, the model selectively queries the most uncertain
samples for human annotation while automatically labeling high-confidence instances. A key innovation
lies in dynamically adjusting the auto-labeling threshold across periods to balance labeling cost with
detection performance. We also incorporated basic oversampling and undersampling strategies to
address class imbalance during initial training.</p>
      <p>
        Three training strategies were evaluated: (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) traditional batch learning with full supervision
(upperbound baseline), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) active learning with uncertainty-based querying, and (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) active learning with
random sampling (lower-bound baseline). We carried out the benchmark training across feature sets
and balancing methods. In particular, our best-performing configuration, using hybrid features and
undersampling, achieved a 97.4% F1 score and 96.8% accuracy while querying only 6.9% of the labeled
data, indicating reduced annotation costs while maintaining comparable performance levels.
      </p>
      <p>To further reduce labeling overhead, we experimented with static, time-dynamic, and
iterationdynamic auto-labeling thresholds. Among these, a polynomial function-based dynamic threshold
ofered the best trade-of between false label rate and detection accuracy. This approach achieved up
to 97.9% F1 using only 2.37% of queried labels, a notable reduction in manual annotation compared to
baseline active learning pipelines.</p>
      <p>Table 1 displays results using static thresholds for model confidence.</p>
      <p>While lower thresholds increase the number of auto-labeled samples, they also risk performance
drops due to mislabeling.</p>
      <p>Dynamic strategies adjusting the threshold across time periods are summarized in Table 2.</p>
      <p>Descending thresholds improved performance while reducing mislabeled data, indicating their
advantage in later-stage learning.</p>
      <p>We also implemented the dynamic thresholds changing through iterations. The most efective
threshold shaping was found via polynomial and linear iteration-based functions.</p>
      <p>According to Table 3, the level function achieves nearly identical F1 to the baseline, but with around
50% fewer queried labels.</p>
      <p>To enhance robustness, we integrated a drift-aware auto-labeling strategy, which explored the
integration of concept drift detection into the auto-labeling process. Using statistical monitoring to
estimate drift magnitude, the system temporarily suspended auto-labeling when the drift exceeded a
predefined threshold. Results are shown in Table</p>
      <p>4.
Auto-labeling driven by drift detection (Hybrid, level)</p>
      <p>While this strategy did not significantly improve predictive accuracy beyond our already optimized
thresholding mechanisms, it provided improved interpretability and stability across simulated drift
scenarios.</p>
      <p>These results provide empirical support for the working hypothesis that combining active learning with
dynamic auto-labeling and drift awareness can enable cost-efective and adaptive intrusion detection
in dynamic IoT environments. Overall, they demonstrate that a combined strategy of active learning,
automated labeling, and lightweight drift detection provides a scalable and resource-eficient foundation
for ML-based IDS in dynamic, data-constrained environments. Although the current study is situated
within the domain of Android malware detection, the underlying methodology is designed to generalize
to broader IoT contexts, where similar constraints apply and adaptability is critical. These findings
provide preliminary empirical support for the core hypothesis of this PhD research: that adaptive,
label-eficient, and drift-aware ML models can significantly enhance the feasibility and efectiveness of
intrusion detection in real-world IoT deployments.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion and future work</title>
      <p>This doctoral research has made initial strides toward developing machine learning-based intrusion
detection systems (IDS) that are better suited to the evolving, heterogeneous, and resource-constrained
nature of Internet of Things (IoT) environments. The work to date integrates both conceptual and
empirical investigations that lay the groundwork for building adaptive and eficient IDS tailored for
real-world IoT deployments.</p>
      <p>The first major contribution comes from a systematic literature review focused on the use of generative
artificial intelligence (AI) in intrusion detection for IoT environments. This review analyzed recent
advances in applying models such as Generative Adversarial Networks (GANs) and Transformers for
tasks like synthetic data generation, anomaly detection, and feature augmentation. It highlighted the
growing reliance on generative methods to overcome limitations such as class imbalance and data
scarcity, common challenges in IoT security. The review also underscored significant gaps in current
research, particularly in areas such as model generalizability, real-world validation, and explainability.
These findings have provided a comprehensive understanding of the state-of-the-art, directly informing
the design choices and evaluation priorities in the subsequent empirical work.</p>
      <p>Building on this foundation, the second contribution is an experimental framework for malware
detection using active learning integrated with auto-labeling and concept drift detection. This approach
addresses practical limitations identified in the review, especially the high cost of labeled data and
the non-stationarity of real-world threat environments. Using a time-structured Android malware
dataset to simulate evolving data streams, the system achieved competitive detection performance
while drastically reducing the labeling efort. Dynamic thresholding, hybrid feature modeling, and
uncertainty-based sampling strategies collectively contributed to improved adaptability and operational
eficiency, key requirements for deployable IoT IDS. This study ofers initial evidence that machine
learning models, when combined with uncertainty sampling, adaptive thresholding, and drift awareness,
can maintain efective detection performance over time with limited human supervision. These results
are consistent with the central hypothesis of the research, although further validation remains necessary
in real-world IoT scenarios.</p>
      <p>Together, these two studies reflect the complementary nature of theoretical landscape mapping and
practical method development. The literature review clarified where generative AI can be applied
and where it remains underexplored, while the empirical study ofered one such implementation of
data-eficient, adaptive learning within a real-world security context.</p>
      <sec id="sec-5-1">
        <title>5.1. Future work and milestones</title>
        <p>Looking ahead, several future directions are envisioned to extend the contributions of the current
research. These directions are categorized by priority and feasibility within the remaining PhD timeframe
(until Q1 2027), and each is linked to specific research questions (RQs). A milestone-based plan and risk
assessment are also provided to ensure a realistic and focused trajectory.</p>
        <p>Core directions which has high priority and are feasible:</p>
        <p>Federated learning in IoT contexts (RQ2, RQ4). The experimental framework will be expanded
to distributed IoT domains such as smart home and industrial systems using federated learning [10].
These environments introduce challenges in terms of limited resources, communication constraints,
and device heterogeneity. This work will be integrated into the applied research cycle through iterative
experimentation and evaluation.</p>
        <p>Generative AI for data augmentation (RQ2, RQ3). While the current work focused on active
learning, planned eforts include applying GANs or difusion models to synthesize attack trafic for
underrepresented classes. Pretrained Transformer architectures will also be used for feature
representation in heterogeneous IoT data. These generative methods will be evaluated as part of the extended
development phase, targeting data-scarce or adversarial scenarios.</p>
        <p>Online and continual learning (RQ1, RQ3). Batch-based models will be extended to
streamprocessing settings using online learning [33]. This includes integrating active learning, auto-labeling,
and drift detection into a unified real-time learning loop. Preliminary prototypes will be developed in
simulated environments using partitioned data streams.</p>
        <p>There are some secondary or optional directions, which can be done if time permits:</p>
        <p>Explainability. Model-agnostic interpretability tools (e.g., SHAP, LIME) will be evaluated to generate
human-readable justifications for model decisions. This is a longer-term direction and will be pursued
if core experiments are completed ahead of schedule.</p>
        <p>Milestones are set with risk analysis and mitigation strategies:
Q2–Q3 2025: Finalize Android-based baseline and submit paper on active learning + drift (RQ1, RQ3).
Q4 2025: Conduct cross-domain generalization experiments on IoT datasets (RQ2).
Q1 2026: Integrate generative models for augmentation; evaluate on class imbalance tasks (RQ2, RQ3).
Q2 2026: Develop federated IDS prototype and some simulations (RQ2, RQ4).</p>
        <p>Q3–Q4 2026: Deployment and explore online learning loop (RQ1, RQ3, RQ4).</p>
        <p>Q1 2027: Final evaluation, thesis writing.</p>
        <p>If Generative AI models such as GANs or Transformers fail to generalize, traditional augmentation
(e.g., SMOTE + ensemble learning) will be used. Optional directions (e.g., explainability) will only be
pursued if core milestones are achieved early.</p>
        <p>The future work plan is tightly integrated with the applied research methodology and structured to
ensure a realistic path to completion. By prioritizing core objectives and preparing for foreseeable
challenges, this research aims to deliver adaptive, scalable, and resource-aware IDS frameworks deployable
across real-world IoT environments.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>I would like to express my sincere gratitude to my supervisors, Dr. Ants Torim, Prof. Dr. Sadok Ben
Yahia, and Prof. Dr. Hayretdin Bahsi, for their invaluable guidance, support, and constructive feedback
throughout this research. Their expertise and encouragement have been vital to the development of my
PhD work. I also thank the Department of Software Science at Tallinn University of Technology for
supporting this research through the doctoral study program, and special thanks to Dr. Gunnar Piho.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author used Grammarly to check spelling and grammar only.
After using this tool, the author reviewed and edited the content as needed and takes full responsibility
for the content of the publication.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Atzori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iera</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Morabito,</surname>
          </string-name>
          <article-title>The internet of things: A survey</article-title>
          ,
          <source>Computer Networks</source>
          <volume>54</volume>
          (
          <year>2010</year>
          )
          <fpage>2787</fpage>
          -
          <lpage>2805</lpage>
          . doi:
          <volume>10</volume>
          .1016/ j.comnet.
          <year>2010</year>
          .
          <volume>05</volume>
          .010.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Statista</given-names>
            <surname>Research</surname>
          </string-name>
          <string-name>
            <surname>Department</surname>
          </string-name>
          ,
          <article-title>Number of connected iot devices worldwide 2019-2030</article-title>
          , https://www.statista.com/ statistics/1183457/iot-connected
          <string-name>
            <surname>-</surname>
          </string-name>
          devices-worldwide/,
          <year>2023</year>
          . Accessed:
          <fpage>2024</fpage>
          -12-10.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hussain</surname>
          </string-name>
          , G. Sarwar,
          <string-name>
            <given-names>S. U.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>A review of performance metrics for machine learning-based ids in iot networks</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>71564</fpage>
          -
          <lpage>71581</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>2988028</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>