Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS

View through CrossRef
Intrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats. In this study, we propose a Transformer-based intrusion detection model to enhance attack recognition performance. The UNSW-NB15 dataset is utilized for model training and evaluation. The data preprocessing pipeline includes handling missing values, encoding categorical features, normalizing numerical features, and splitting stratified training and testing sets. The Transformer model has three layers, leveraging self- attention mechanisms to capture relationships between network features. Experimental results demonstrate that the model achieves an accuracy of 98.26% and an F1-score of 95.80%, outperforming traditional methods such as Random Forest. Notably, despite exhibiting a higher false alarm rate, the model significantly reduces the number of undetected attacks. The Transformer demonstrates superior performance and strong potential for real-time cybersecurity applications compared to previous studies. Future research directions include enhancing the model’s interpretability, optimizing its deployment in resource-constrained environments, and extending its capability to detect zero-day attacks. Keywords: Intrusion detection; transformer; UNSW-NB15; cybersecurity; self-attention
Title: APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
Description:
Intrusion Detection Systems (IDS) are crucial in safeguarding network security against increasingly sophisticated threats.
In this study, we propose a Transformer-based intrusion detection model to enhance attack recognition performance.
The UNSW-NB15 dataset is utilized for model training and evaluation.
The data preprocessing pipeline includes handling missing values, encoding categorical features, normalizing numerical features, and splitting stratified training and testing sets.
The Transformer model has three layers, leveraging self- attention mechanisms to capture relationships between network features.
Experimental results demonstrate that the model achieves an accuracy of 98.
26% and an F1-score of 95.
80%, outperforming traditional methods such as Random Forest.
Notably, despite exhibiting a higher false alarm rate, the model significantly reduces the number of undetected attacks.
The Transformer demonstrates superior performance and strong potential for real-time cybersecurity applications compared to previous studies.
Future research directions include enhancing the model’s interpretability, optimizing its deployment in resource-constrained environments, and extending its capability to detect zero-day attacks.
Keywords: Intrusion detection; transformer; UNSW-NB15; cybersecurity; self-attention.

Related Results

Automatic Load Sharing of Transformer
Automatic Load Sharing of Transformer
Transformer plays a major role in the power system. It works 24 hours a day and provides power to the load. The transformer is excessive full, its windings are overheated which lea...
High frequency modeling of power transformers under transients
High frequency modeling of power transformers under transients
This thesis presents the results related to high frequency modeling of power transformers. First, a 25kVA distribution transformer under lightning surges is tested in the laborator...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
ANALISIS PENGARUH MASA OPERASIONAL TERHADAP PENURUNAN KAPASITAS TRANSFORMATOR DISTRIBUSI DI PT PLN (PERSERO)
ANALISIS PENGARUH MASA OPERASIONAL TERHADAP PENURUNAN KAPASITAS TRANSFORMATOR DISTRIBUSI DI PT PLN (PERSERO)
One cause the interruption of transformer is loading that exceeds the capabilities of the transformer. The state of continuous overload will affect the age of the transformer and r...
LIFE CYCLE OF TRANSFORMER 110/X KV AND ITS VALUE
LIFE CYCLE OF TRANSFORMER 110/X KV AND ITS VALUE
In a deregulated environment, power companies are in the constant process of reducing the costs of operating power facilities, with the aim of optimally improving the quality of de...
PLC Based Load Sharing of Transformers
PLC Based Load Sharing of Transformers
The transformer is very expensive and bulky power system equipment. It runs and feed the load for 24 hours a day. Sometimes the load on the transformer unexpectedly rises above its...
Simulation modeling study on short circuit ability of distribution transformer
Simulation modeling study on short circuit ability of distribution transformer
Abstract Under short circuit condition, the oil immersed distribution transformer will endure combined electro-thermal stress, eventually lead to the mechanical dama...
Architecture between heteronomy and self-generation
Architecture between heteronomy and self-generation
Introduction «I have never worked in the technocratic exaltation, solving a constructive problem and that’s it. I’ve always tried to interpret the space of human life» (Vitto...

Back to Top