Fesu, A, Shone, N, Mac Dermott, A, Zhou, B and Hashem Eiza, M Application of SNN and CNN Models for Intrusion Detection in Resource-Constrained Networks. In: The 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France. (Accepted)
![]() |
Text
Accepted paper.pdf - Accepted Version Access Restricted until 18 June 2025. Download (625kB) |
Abstract
Deep learning models like Convolutional Neural Networks (CNNs) are widely used in Intrusion Detection Systems (IDSs), but their high energy demands and complexity limit deployment in resource-constrained environments. This paper presents a feasibility study of a lightweight yet deep Spiking Neural Network (SNN) based on Leaky Integrate-and-Fire (LIF) dynamics for sustainable IDS applications. Evaluated on the NSL-KDD dataset, the proposed SNN achieved comparable overall accuracy to a CNN, trained ~3x faster (~2.14 s/epoch), and consumed up to 5x less energy. Despite a slightly lower macro F1 score (0.58 vs. 0.62), it outperformed the CNN on rare attacks (e.g., U2R F1: 0.82 vs. 0.42) and exhibited lower test loss, indicating better calibration. Local deployment estimates showed ~65% lower CO2 emissions than cloud execution, challenging assumptions that offloading is inherently greener. Its low energy footprint, compact architecture, and fast inference latency (~0.014 ms/sample) make it well-suited for real-time traffic first -line analysis in edge or IoT environments. These findings highlight SNNs as viable, sustainable alternatives for IDS and underscore the importance of evaluating carbon emissions, not just energy use, when designing AI systems for cyber security.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | © 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science and Mathematics |
Date of acceptance: | 23 May 2025 |
Date Deposited: | 11 Jun 2025 09:55 |
Last Modified: | 11 Jun 2025 09:55 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/26572 |
![]() |
View Item |