Effective Multi-Stage Training Model For Edge Computing Devices In Intrusion Detection