Javascript must be enabled to continue!
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
View through CrossRef
Intrusion Detection Systems (IDS) are crucial in safeguarding
network security against increasingly sophisticated threats. In
this study, we propose a Transformer-based intrusion detection
model to enhance attack recognition performance. The
UNSW-NB15 dataset is utilized for model training and
evaluation. The data preprocessing pipeline includes handling
missing values, encoding categorical features, normalizing
numerical features, and splitting stratified training and testing
sets. The Transformer model has three layers, leveraging self-
attention mechanisms to capture relationships between
network features. Experimental results demonstrate that the
model achieves an accuracy of 98.26% and an F1-score of
95.80%, outperforming traditional methods such as Random
Forest. Notably, despite exhibiting a higher false alarm rate,
the model significantly reduces the number of undetected
attacks. The Transformer demonstrates superior performance
and strong potential for real-time cybersecurity applications
compared to previous studies. Future research directions
include enhancing the model’s interpretability, optimizing its
deployment in resource-constrained environments, and
extending its capability to detect zero-day attacks.
Keywords: Intrusion detection; transformer; UNSW-NB15;
cybersecurity; self-attention
Title: APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
Description:
Intrusion Detection Systems (IDS) are crucial in safeguarding
network security against increasingly sophisticated threats.
In
this study, we propose a Transformer-based intrusion detection
model to enhance attack recognition performance.
The
UNSW-NB15 dataset is utilized for model training and
evaluation.
The data preprocessing pipeline includes handling
missing values, encoding categorical features, normalizing
numerical features, and splitting stratified training and testing
sets.
The Transformer model has three layers, leveraging self-
attention mechanisms to capture relationships between
network features.
Experimental results demonstrate that the
model achieves an accuracy of 98.
26% and an F1-score of
95.
80%, outperforming traditional methods such as Random
Forest.
Notably, despite exhibiting a higher false alarm rate,
the model significantly reduces the number of undetected
attacks.
The Transformer demonstrates superior performance
and strong potential for real-time cybersecurity applications
compared to previous studies.
Future research directions
include enhancing the model’s interpretability, optimizing its
deployment in resource-constrained environments, and
extending its capability to detect zero-day attacks.
Keywords: Intrusion detection; transformer; UNSW-NB15;
cybersecurity; self-attention.
Related Results
Automatic Load Sharing of Transformer
Automatic Load Sharing of Transformer
Transformer plays a major role in the power system. It works 24 hours a day and provides power to the load. The transformer is excessive full, its windings are overheated which lea...
High frequency modeling of power transformers under transients
High frequency modeling of power transformers under transients
This thesis presents the results related to high frequency modeling of power transformers. First, a 25kVA distribution transformer under lightning surges is tested in the laborator...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
ANALISIS PENGARUH MASA OPERASIONAL TERHADAP PENURUNAN KAPASITAS TRANSFORMATOR DISTRIBUSI DI PT PLN (PERSERO)
ANALISIS PENGARUH MASA OPERASIONAL TERHADAP PENURUNAN KAPASITAS TRANSFORMATOR DISTRIBUSI DI PT PLN (PERSERO)
One cause the interruption of transformer is loading that exceeds the capabilities of the transformer. The state of continuous overload will affect the age of the transformer and r...
LIFE CYCLE OF TRANSFORMER 110/X KV AND ITS VALUE
LIFE CYCLE OF TRANSFORMER 110/X KV AND ITS VALUE
In a deregulated environment, power companies are in the constant process of reducing the costs of operating power facilities, with the aim of optimally improving the quality of de...
PLC Based Load Sharing of Transformers
PLC Based Load Sharing of Transformers
The transformer is very expensive and bulky power system equipment. It runs and feed the load for 24 hours a day. Sometimes the load on the transformer unexpectedly rises above its...
Simulation modeling study on short circuit ability of distribution transformer
Simulation modeling study on short circuit ability of distribution transformer
Abstract
Under short circuit condition, the oil immersed distribution transformer will endure combined electro-thermal stress, eventually lead to the mechanical dama...
Architecture between heteronomy and self-generation
Architecture between heteronomy and self-generation
Introduction
«I have never worked in the technocratic exaltation, solving a constructive problem and that’s it. I’ve always tried to interpret the space of human life» (Vitto...

