1. Introduction
The Internet of Things (IoT) is considered to be among the rapidly developing technological spheres in the world. It helps in merging the physical space with the cyberspace. The IoT technology is a network consisting of interrelated physical objects, sensors, actuators, and others that communicate through different communication protocols to create, receive, and transmit data. It has become popular in various fields of application, such as the healthcare, the transport and industrial systems, to enhance the overall quality of experience in everyday life [
1].
Although the IoT is widely applied in various uses, it has a low resistance against broad security threats. Heterogeneous and dispersed nature of the IoT devices, in addition to the lack of computational capabilities and security settings, render these environments nice targets by the cyber attackers. Therefore, IoT networks are frequently subject to numerous types of attacks, e.g., Distributed Denial of Service (DDoS) attacks, data losses, malware distribution, and unauthorized access. These security concerns have been underlined by the number of large-scale IoT attacks that have been observed in the last ten years. To illustrate, the malware campaign of BADBOX 2.0 has affected over one million devices by March 2025 and it is estimated that it might have reached over ten million devices in 222 countries by now [
2]. Another notable one is the Reaper botnet which was identified in September 2017, unlike the Mirai botnet which primarily used weak default credentials, it used known vulnerabilities on IoT devices, making it more developed and threatening to use.
Intrusion Detection System (IDS) is essential to alleviate these threats and to secure the safety of the IoT systems. IDS is an alternative that continuously inspects and analyzes network traffic and system activity to detect anomalies and possible intrusions [
4]. It allows identifying different attacks in IoT networks. Over the last several years, a significant portion of the attention has been focused on IDS methods that rely on Machine Learning (ML) and Deep Learning (DL) since they can conduct automatic learning of complex patterns of the network traffic data and enhance the accuracy of the detection process in the IoT contexts [
5,
6].
The IoT ecosystem consists of a wide range of devices, such as sensors, actuators and edge nodes, which are usually constrained by harsh resource limits. IoT devices usually possess weak processing power, memory, storage capacity, and energy sources than traditional computing systems do [
7]. These limitations ensure that it is difficult to deploy traditional security mechanisms and computationally expensive intrusion detection systems to directly run on IoT devices. This has left most IoT devices vulnerable to security threats and exploitable weaknesses. Moreover, conventional IDS techniques usually depend on sophisticated machine learning algorithms that demand massive training data sets and high dimension features which demand a lot of computation and storage resources that cannot be implemented in the IoT setting [
8].
The application of successful IDS solutions to IoT networks consequently poses a number of challenges. Currently, numerous methods focus primarily on high detection accuracy at the cost of constraints in the practical implementation of IoT devices, such as limited processing power, reliance on batteries, and limited memory. Moreover, IoT networks are large-scale and heterogeneous, making real-time intrusion detection even more difficult [
9]. This may still lead to latency increase and extra energy usage in spite of the fact that edge computing has been implemented to remove computational workload of the IoT devices to nearby edge nodes [
10,
11]. Thus, when creating intrusion detection systems in an IoT setting, computational overhead, energy efficiency, and real-time detection are to be given due attention.
In effort to solve these problems, recent studies have aimed at coming up with lightweight IDS models that have been optimized to meet the needs of resource-constrained IoT settings. The main aim is to achieve the balance between high detection and low computational cost characteristics of high detection performance is sought after [
12]. Nevertheless, the problem of creating machine learning-based IDS models, which are efficient and accurate, is a continuous challenge. In the recent past, researchers have investigated methods like compressed model and federated learning and dynamic quantization to simplify the models without significantly impacting the level of detection performance [
13]. These methods are designed to facilitate the ability of effective intrusion detection within the constrained computational and energy capabilities of the IoT devices.
Although the advances have been achieved in the intrusion detection methods, most of the available IDS solutions to the IoT settings continue to not find the optimal balance between detection efficiency and computational efficiency. The majority of the traditional ML and DL-based methods are based on the complicated architecture and numerous parameters and consequently consume a lot of memory, computation time, and energy [
14]. These features render them inappropriate to run on resource limited IoT devices. Hence, there is a strong necessity of light and efficient intrusion detection mechanisms which ensure that the detection performance is high with minimum consumption of resources. In this paper, we will develop an effective IDS that suits IoT settings and is optimized by balancing the detection rate with the performance rate. The proposed solution will aim at providing efficient intrusion detection and will be appropriate to be implemented in resource-constrained IoT systems.
The main contributions of this work are summarized as follows:
We propose a lightweight intrusion detection model that learns compact representations from network traffic features using a two-layer Multi-Layer Perceptron embedding backbone.
The proposed architecture employs a simple, efficient design that combines an MLP feature-embedding network with a linear SoftMax classification head for multi-class attack detection.
The proposed approach is evaluated on two widely used benchmark datasets, namely CICIDS2017 and NSL-KDD, to validate its effectiveness for intrusion detection tasks.
Experimental results demonstrate that the proposed model achieves strong classification performance, with accuracies of 99.85% on CICIDS2017 and 99.21% on NSL-KDD.
The proposed method maintains a lightweight structure with reduced model size, fewer parameters, and significantly lower FLOPs compared with existing approaches, making it suitable for deployment in resource-constrained IoT environments.
The rest of the paper will be structured in the following.
Section 2 explains the lightweight methods of intrusion detection of the IoT networks.
Section 3 presents the proposed intrusion detection model which is developed on the basis of two-layered Multi-Layer Perceptron embedding backbone and linear SoftMax classification head to detect multi-class attacks.
Section 4 is the description of the dataset, experimental set-up, model implementation, evaluation metrics, and performance analysis. Lastly,
Section 5 will wrap up the paper, comment on the findings, and provide the future work directions.