
UNSW-NB15 dataset, released in 2015, which is con-
sidered outdated. The reason for choosing this dataset
is its size (high sample size and manageable feature
size) compared to other datasets in the same field.
Threats to Replicability: in this study, we de-
scribed the process of implementing AAE-DRL. The
corresponding code is available on GitHub
2
along
with a step-by-step guide to reproduce our approach
and the comparative approaches mentioned in the re-
sults section.
7 CONCLUSION AND FUTURE
WORK
In this paper, we have investigated the role of AI-
powered intrusion detection in enhancing the accu-
racy and efficiency of detecting cyber threats. We
have benchmarked our results against state-of-the-art
(SOTA) models using four shallow ML classifiers.
Our approach showcased the advantages and limita-
tions of generating synthetic data. Our main findings
are summarized as follows:
• Our supervised attention-based AAE has outper-
formed SOTA models in detecting and generating
data using real-world data.
• Adapting reinforcement learning to address class
imbalance improved recall performance by 17%,
minimizing the likelihood of false negatives.
• Despite promising results, challenges such as
mode collapse and improving classification pre-
diction remain. Addressing these issues is cru-
cial for deploying generative AI-based intrusion
detection in real-world environments.
For future work, we will focus on updating the in-
put dataset with more contemporary examples and au-
tomating the process of identifying minority classes.
While AI-driven network intrusion detection
holds the potential to transform intrusion detection
systems, ongoing advancements and thorough evalu-
ations are essential to ensure its resilience against the
evolving landscape of cyber threats.
ACKNOWLEDGMENT
The authors thank the Natural Sciences and Engi-
neering Research Council of Canada (NSERC), the
Mathematics of Information Technology and Com-
plex Systems (MITACS) and the Desjardins Group
(Mouvement Desjardins) for their financial support.
2
https://github.com/anonymousForStudy/AAE-DRL
REFERENCES
Abbasian, M., Rajabzadeh, T., Moradipari, A., Aqajari, S.
A. H., Lu, H., and Rahmani, A. (2023). Controlling
the latent space of gans through reinforcement learn-
ing: A case study on task-based image-to-image trans-
lation.
Alabsi, B. A., Anbar, M., and Rihan, S. D. A. (2023). Con-
ditional tabular generative adversarial based intrusion
detection system for detecting ddos and dos attacks on
the internet of things networks. Sensors, 23:1–20.
Chiriac, B.-N., Anton, F.-D., Ionit
,
˘
a, A.-D., and Vasilic
˘
a,
B.-V. (2025). A modular ai-driven intrusion detection
system for network traffic monitoring in industry 4.0,
using nvidia morpheus and generative adversarial net-
works. Sensors, 25(1):1–23.
Fuhl, W., Bozkir, E., and Kasneci, E. (2020). Reinforce-
ment learning for the privacy preservation and manip-
ulation of eye tracking data.
Fujimoto, S., van Hoof, H., and Meger, D. (2018). Ad-
dressing function approximation error in actor-critic
methods.
Gaber, M. G., Ahmed, M., and Janicke, H. (2024). Malware
detection with artificial intelligence: A systematic lit-
erature review. ACM Comput. Surv., 56(6).
H. M. Kotb, T. Gaber, S. A. e. a. (2025). A novel
deep synthesis-based insider intrusion detection (ds-
iid) model for malicious insiders and ai-generated
threats. Nature, 15(207).
Lansky, J., Ali, S., Mohammadi, M., Majeed, M., Karim,
S. H. T., Rashidi, S., Hosseinzadeh, M., and Rah-
mani, A. M. (2021). Deep learning-based intrusion
detection systems: A systematic review. IEEE Access,
9:101574–101599.
M. Ali, I. Udoidiok, F. L. and Zhang, J. (2024). A review on
generative intelligence in deep learning based network
intrusion detection. Cyber Awareness and Research
Symposium (CARS).
Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., and
Frey, B. (2015). Adversarial autoencoders.
Moustafa, N. and Slay, J. (2015). Unsw-nb15: a compre-
hensive data set for network intrusion detection sys-
tems (unsw-nb15 network data set). In 2015 Mili-
tary Communications and Information Systems Con-
ference (MilCIS). IEEE.
Sayed, M. A. and Taha, M. (2023). Oblivious network in-
trusion detection systems. Nature, 13(22308).
van Hasselt, H., Guez, A., and Silver, D. (2015). Deep re-
inforcement learning with double q-learning.
Wohlin, C., Runeson, P., H
¨
ost, M., Ohlsson, M. C., Reg-
nell, B., and Wessl
´
en, A. (2012). Experimentation in
software engineering. Springer Science & Business
Media.
Zhao, S., Li, J., Wang, J., Zhang, Z., Zhu, L., and Zhang, Y.
(2021). attackgan: Adversarial attack against black-
box ids using generative adversarial networks. 2020
International Conference on Identification, Informa-
tion and Knowledge in the Internet of Things.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
474