journal article Open Access Jul 19, 2025

A Lightweight Intrusion Detection System for IoT and UAV Using Deep Neural Networks with Knowledge Distillation

Computers Vol. 14 No. 7 pp. 291 · MDPI AG
View at Publisher Save 10.3390/computers14070291
Abstract
Deep neural networks (DNNs) are highly effective for intrusion detection systems (IDS) due to their ability to learn complex patterns and detect potential anomalies within the systems. However, their high resource consumption requirements including memory and computation make them difficult to deploy on low-powered platforms. This study explores the possibility of using knowledge distillation (KD) to reduce constraints such as power and hardware consumption and improve real-time inference speed but maintain high detection accuracy in IDS across all attack types. The technique utilizes the transfer of knowledge from DNNs (teacher) models to more lightweight shallow neural network (student) models. KD has been proven to achieve significant parameter reduction (92–95%) and faster inference speed (7–11%) while improving overall detection performance (up to 6.12%). Experimental results on datasets such as NSL-KDD, UNSW-NB15, CIC-IDS2017, IoTID20, and UAV IDS demonstrate DNN with KD’s effectiveness in achieving high accuracy, precision, F1 score, and area under the curve (AUC) metrics. These findings confirm KD’s ability as a potential edge computing strategy for IoT and UAV devices, which are suitable for resource-constrained environments and lead to real-time anomaly detection for next-generation distributed systems.
Topics

No keywords indexed for this article. Browse by subject →

References
52
[1]
Survey of intrusion detection systems: techniques, datasets and challenges

Ansam Khraisat, Iqbal Gondal, Peter Vamplew et al.

Cybersecurity 2019 10.1186/s42400-019-0038-7
[2]
Scarfone "Guide to intrusion detection and prevention systems (idps)" NIST Spec. Publ. (2007)
[3]
Hussain, A., Sharif, H., Rehman, F., Kirn, H., Sadiq, A., Khan, M.S., Riaz, A., Ali, C.N., and Chandio, A.H. (2023, January 17–18). A systematic review of intrusion detection systems in internet of things using ML and DL. Proceedings of the 2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan. 10.1109/icomet57998.2023.10099142
[4]
Sommer, R., and Paxson, V. (2010, January 16–19). Outside the closed world: On using machine learning for network intrusion detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA. 10.1109/sp.2010.25
[5]
A comprehensive survey on network anomaly detection

Gilberto Fernandes, Joel J. P. C. Rodrigues, Luiz Fernando Carvalho et al.

Telecommunication Systems 2019 10.1007/s11235-018-0475-8
[6]
Deep learning

Yann LeCun, Yoshua Bengio, Geoffrey Hinton

Nature 2015 10.1038/nature14539
[7]
Deep learning in neural networks: An overview

Jürgen Schmidhuber

Neural Networks 2015 10.1016/j.neunet.2014.09.003
[8]
Shone "A deep learning approach to network intrusion detection" IEEE Trans. Emerg. Top. Comput. Intell. (2018) 10.1109/tetci.2017.2772792
[9]
Sharafaldin "Toward generating a new intrusion detection dataset and intrusion traffic characterization" ICISSp (2018)
[10]
Hinton, G., Vinyals, O., and Dean, J. (2015). Distilling the knowledge in a neural network. arXiv.
[11]
Knowledge Distillation: A Survey

Jianping Gou, Baosheng Yu, Stephen J. Maybank et al.

International Journal of Computer Vision 2021 10.1007/s11263-021-01453-z
[12]
Model Compression and Acceleration for Deep Neural Networks: The Principles, Progress, and Challenges

Yu Cheng, Duo Wang, Pan Zhou et al.

IEEE Signal Processing Magazine 2018 10.1109/msp.2017.2765695
[13]
Teerapittayanon, S., McDanel, B., and Kung, H.T. (2017, January 5–8). Distributed deep neural networks over the cloud, the edge and end devices. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA. 10.1109/icdcs.2017.226
[14]
Wang "A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning" Expert Syst. Appl. (2022) 10.1016/j.eswa.2022.117671
[15]
Li "A two stage lightweight approach for intrusion detection in Internet of Things" Expert Syst. Appl. (2024) 10.1016/j.eswa.2024.124965
[16]
Wang "Lightweight intrusion detection model based on CNN and knowledge distillation" Appl. Soft Comput. (2024) 10.1016/j.asoc.2024.112118
[17]
Zhao, R., Chen, Y., Wang, Y., Shi, Y., and Xue, Z. (2021, January 14–23). An efficient and lightweight approach for intrusion detection based on knowledge distillation. Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada. 10.1109/icc42927.2021.9500574
[18]
Chen, J., Guo, Q., Fu, Z., Shang, Q., Ma, H., and Wang, N. (2023, January 18–23). Semi-supervised Campus Network Intrusion Detection Based on Knowledge Distillation. Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN), Gold Coast, Australia. 10.1109/ijcnn54540.2023.10191988
[19]
Zhu "Lkd-stnn: A lightweight malicious traffic detection method for internet of things based on knowledge distillation" IEEE Internet Things J. (2023) 10.1109/jiot.2023.3310794
[20]
Ren, Y., Restivo, R.D., Tan, W., Wang, J., Liu, Y., Jiang, B., Wang, H., and Song, H. (2023). Knowledge distillation-based GPS spoofing detection for small UAV. Future Internet, 15. 10.3390/fi15120389
[21]
Abbasi "Unleashing the potential of knowledge distillation for IoT traffic classification" IEEE Trans. Mach. Learn. Commun. Netw. (2024) 10.1109/tmlcn.2024.3360915
[22]
Zhao, R., Yang, L., Wang, Y., Xue, Z., Gui, G., and Ohtsuki, T. (2022, January 16–20). A semi-supervised federated learning scheme via knowledge distillation for intrusion detection. Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea. 10.1109/icc45855.2022.9838256
[23]
Shen, J., Yang, W., Chu, Z., Fan, J., Niyato, D., and Lam, K.Y. (2024, January 9–13). Effective intrusion detection in heterogeneous Internet-of-Things networks via ensemble knowledge distillation-based federated learning. Proceedings of the ICC 2024—IEEE International Conference on Communications, Denver, CO, USA. 10.1109/icc51166.2024.10622262
[24]
Quyen "FedKD-IDS: A robust intrusion detection system using knowledge distillation-based semi-supervised federated learning and anti-poisoning attack mechanism" Inf. Fusion (2025) 10.1016/j.inffus.2024.102807
[25]
Ravipati "Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper" Int. J. Comput. Sci. Inf. Technol. (IJCSIT) Vol (2019)
[26]
Ali, T., Eleyan, A., Bejaoui, T., and Al-Khalidi, M. (2024, January 28–30). Lightweight Intrusion Detection System with GAN-Based Knowledge Distillation. Proceedings of the 2024 International Conference on Smart Applications, Communications and Networking (SmartNets), Harrisonburg, VA, USA. 10.1109/smartnets61466.2024.10577682
[27]
Bertoli "An end-to-end framework for machine learning-based network intrusion detection system" IEEE Access (2021) 10.1109/access.2021.3101188
[28]
Hassler "Cyber-physical intrusion detection system for unmanned aerial vehicles" IEEE Trans. Intell. Transp. Syst. (2023) 10.1109/tits.2023.3339728
[29]
Hadi "Real-time collaborative intrusion detection system in uav networks using deep learning" IEEE Internet Things J. (2024) 10.1109/jiot.2024.3426511
[30]
Yang, S., Zheng, X., Xu, Z., and Wang, X. (June, January 28). A lightweight approach for network intrusion detection based on self-knowledge distillation. Proceedings of the ICC 2023—IEEE International Conference on Communications, Rome, Italy. 10.1109/icc45041.2023.10279691
[31]
A Novel Lightweight IoT Intrusion Detection Model Based on Self-Knowledge Distillation

Zhendong Wang, Renqiang Zhou, Shuxin Yang et al.

IEEE Internet of Things Journal 2025 10.1109/jiot.2025.3533092
[32]
Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8–10). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada. 10.1109/cisda.2009.5356528
[33]
Wisanwanichthan "A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM" IEEE Access (2021) 10.1109/access.2021.3118573
[34]
Moustafa, N., and Slay, J. (2015, January 10–12). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia. 10.1109/milcis.2015.7348942
[35]
Kumar, A., Guleria, K., Chauhan, R., and Upadhyay, D. (2024, January 28–29). Advancing Intrusion Detection with Machine Learning: Insights from the UNSW-NB15 Dataset. Proceedings of the 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India. 10.1109/iciteics61368.2024.10625148
[36]
Arun, C.B., Anusha, M., Rao, T., Rohini, B., Gargi, N., and Kodipalli, A. (2024, January 22–23). Enhancing Network Intrusion Detection using Artificial Neural Networks: An Analysis of the UNSW-NB15 Dataset. Proceedings of the 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS), Kalaburagi, India. 10.1109/iciics63763.2024.10859396
[37]
Ullah, I., and Mahmoud, Q.H. (2020, January 28–31). A scheme for generating a dataset for anomalous activity detection in iot networks. Proceedings of the Canadian Conference on Artificial Intelligence, Kingston, ON, Canada. 10.1007/978-3-030-47358-7_52
[38]
Intrusion detection systems for IoT-based smart environments: a survey

Mohamed Faisal Elrawy, Ali Ismail Awad, Hesham F. A. Hamed

Journal of Cloud Computing 2018 10.1186/s13677-018-0123-6
[39]
Bebortta, S., and Senapati, D. (2021). Empirical characterization of network traffic for reliable communication in IoT devices. Security in Cyber—Physical Systems, Springer. 10.1007/978-3-030-67361-1_3
[40]
Whelan "Uav attack dataset" IEEE Dataport (2020)
[41]
Choudhary, G., Sharma, V., You, I., Yim, K., Chen, R., and Cho, J.H. (2018, January 25–29). Intrusion detection systems for networked unmanned aerial vehicles: A survey. Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus. 10.1109/iwcmc.2018.8450305
[42]
Krishna, C.L., and Murphy, R.R. (2017, January 11–13). A review on cybersecurity vulnerabilities for unmanned aerial vehicles. Proceedings of the 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), Shanghai, China. 10.1109/ssrr.2017.8088163
[43]
Attack, W., Attack, I., and Attack, B.F. (2025). Ensemble of feature augmented convolutional neural network and deep autoencoder for efficient detection of network attacks. Sci. Rep., 15. 10.1038/s41598-025-88243-6
[44]
Fu, Y., Du, Y., Cao, Z., Li, Q., and Xiang, W. (2022). A deep learning model for network intrusion detection with imbalanced data. Electronics, 11. 10.3390/electronics11060898
[45]
Goodfellow, I., Bengio, Y., Courville, A., and Bengio, Y. (2016). Deep Learning, MIT Press.
[46]
"A survey of neural networks usage for intrusion detection systems" J. Ambient. Intell. Humaniz. Comput. (2021) 10.1007/s12652-020-02014-x
[47]
Khalaf, L.I., Alhamadani, B., Ismael, O.A., Radhi, A.A., Ahmed, S.R., and Algburi, S. (2024, January 13–14). Deep learning-based anomaly detection in network traffic for cyber threat identification. Proceedings of the Cognitive Models and Artificial Intelligence Conference, Prague, Czech Republic. 10.1145/3660853.3660932
[48]
Kingma, D.P., and Ba, J. (2014). Adam: A method for stochastic optimization. arXiv.
[49]
Jeong, H.J., Lee, H.J., Kim, G.N., and Choi, S.H. (2025). Self-MCKD: Enhancing the Effectiveness and Efficiency of Knowledge Transfer in Malware Classification. Electronics, 14. 10.20944/preprints202501.2257.v1
[50]
Wu, Y., Zang, Z., Zou, X., Luo, W., Bai, N., Xiang, Y., Li, W., and Dong, W. (2025). Graph attention and Kolmogorov–Arnold network based smart grids intrusion detection. Sci. Rep., 15. 10.1038/s41598-025-88054-9

Showing 50 of 52 references

Metrics
14
Citations
52
References
Details
Published
Jul 19, 2025
Vol/Issue
14(7)
Pages
291
License
View
Funding
Royal Thai Air Force Cyber Security Research Program
Cite This Article
Treepop Wisanwanichthan, Mason Thammawichai (2025). A Lightweight Intrusion Detection System for IoT and UAV Using Deep Neural Networks with Knowledge Distillation. Computers, 14(7), 291. https://doi.org/10.3390/computers14070291
Related

You May Also Like