Transformer-Based Intrusion Detection for IoT Networks

被引:6
作者
Akuthota, Uday Chandra [1 ]
Bhargava, Lava [1 ]
机构
[1] Malaviya Natl Inst Technol, Dept Elect & Commun Engn, Jaipur 302017, India
关键词
Transformers; Feature extraction; Accuracy; Computational modeling; Adaptation models; Training; Telecommunication traffic; Vectors; Scalability; Real-time systems; intrusion detection; multihead attention (MHA); Transformer;
D O I
10.1109/JIOT.2025.3525494
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection systems are essential for defending recent computer networks from ever-evolving cyber attacks. Security is of utmost importance due to the complex and constantly changing nature of network threats. To improve the detection capabilities in network traffic, this research presents a unique method for intrusion detection by utilizing attention-based Transformer architectures. The proposed Transformer-based model offers an adaptable and reliable method for detecting sophisticated and dynamic threats by fusing the strength of the self-attention mechanism. The model is evaluated on two network intrusion benchmark datasets (NSL-KDD and UNSW-NB15). The correlation technique is used for feature extraction, and both binary and multiclass classification with and without feature extraction are performed on the datasets. The proposed model achieved over 99% accuracy, precision, and recall on the two datasets. The experimental results indicate that the proposed approach provides better results than other systems.
引用
收藏
页码:6062 / 6067
页数:6
相关论文
共 15 条
[1]   Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection [J].
Das, Saikat ;
Saha, Sajal ;
Priyoti, Annita Tahsin ;
Roy, Etee Kawna ;
Sheldon, Frederick T. T. ;
Haque, Anwar ;
Shiva, Sajjan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04) :4821-4833
[2]   A Survey on Vision Transformer [J].
Han, Kai ;
Wang, Yunhe ;
Chen, Hanting ;
Chen, Xinghao ;
Guo, Jianyuan ;
Liu, Zhenhua ;
Tang, Yehui ;
Xiao, An ;
Xu, Chunjing ;
Xu, Yixing ;
Yang, Zhaohui ;
Zhang, Yiman ;
Tao, Dacheng .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (01) :87-110
[3]   Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification [J].
He, Kan ;
Zhang, Wei ;
Zong, Xuejun ;
Lian, Lian .
IEEE ACCESS, 2024, 12 :44335-44350
[4]   A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework [J].
Kasongo, Sydney Mambwe .
COMPUTER COMMUNICATIONS, 2023, 199 :113-125
[5]   An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm [J].
Kolukisa, Burak ;
Dedeturk, Bilge Kagan ;
Hacilar, Hilal ;
Gungor, Vehbi Cagri .
COMPUTER STANDARDS & INTERFACES, 2024, 89
[6]   Intrusion detection of manifold regularized broad learning system based on LU decomposition [J].
Liu, Yaodi ;
Zhang, Kun ;
Wang, Zhendong .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (18) :20600-20648
[7]   FlowTransformer: A transformer framework for flow-based network intrusion detection systems [J].
Manocchio, Liam Daly ;
Layeghy, Siamak ;
Lo, Wai Weng ;
Kulatilleke, Gayan K. ;
Sarhan, Mohanad ;
Portmann, Marius .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
[8]   Fast Anomaly Identification Based on Multiaspect Data Streams for Intelligent Intrusion Detection Toward Secure Industry 4.0 [J].
Qi, Lianyong ;
Yang, Yihong ;
Zhou, Xiaokang ;
Rafique, Wajid ;
Ma, Jianhua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6503-6511
[9]   WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS [J].
Srivastava, Arpita ;
Sinha, Ditipriya ;
Kumar, Vikash .
COMPUTERS & SECURITY, 2023, 134
[10]  
Vishwakarma M., 2023, Decis Analyt J, V7, DOI [DOI 10.1016/J.DAJOUR.2023.100233, 10.1016/j.dajour.2023.100233]