Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture

 

S. Phani Praveen *1, Thulasi Bikku2, P. Muthukumar3, K. Sandeep4, Jampani Chandra Sekhar5, V. Krishna Pratap6

1Department of CSE, PVP Siddhartha Institute of Technology, Kanuru, Vijayawada, A.P, India.

2Department of Computer Science & Engineering, Amrita School of Computing Amaravati, Amrita Vishwa

Vidyapeetham, AP, India

3Professor,Department of Electrical and Electronics Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tiruvallur, Chennai, Tamilnadu, India-602105
4Department of Information Technology, Dhanekula Institute of Engineering & Technology, Vijayawada 521139,A.P, India

5Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India

6Assistant Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India

 

Emails: sppraveen@pvpsiddhartha.ac.in;thulasi.bikku@gmail.com; muthukumarvlsi@gmail.com; kottesandeep@gmail.com; jcsekhar9@gmail.com; pratapv9@gmail.com

* Corresponding Author: sppraveen@pvpsiddhartha.ac.in

 

Abstract

 

The function of network intrusion detection systems (NIDS) in protecting networks from cyberattacks is crucial. Many of the more conventional techniques rely on signature-based approaches, which have a hard time distinguishing between various types of assaults. Using stacked FT-Transformer architecture, this research suggests a new way to identify intrusions in networks. When it comes to dealing with complicated tabular data, FT-Transformers—a variant of the Transformer model—have shown outstanding performance. Because of the inherent tabular nature of network traffic data, FT-Transformers are an attractive option for intrusion detection jobs. In this area, our study looks at how FT-Transformers outperform more conventional machine learning (ML) methods. Our working hypothesis is that, in comparison to single-layered ML models, FT-Transformers will achieve better detection accuracy due to their intrinsic capacity to grasp long-range correlations in network traffic data. We also test the FT-Transformer model on several network traffic datasets that include various protocols and attack kinds to see how well it performs and how generalizable it is. The purpose of this research is to shed light on how well and how versatile FT-Transformers perform for detecting intrusions in networks. We aim to prove that FT-Transformers can secure networks from ever-changing cyber threats by comparing their performance to that of classic ML models and by testing their generalizability.

 

Keywords : Intrusion detection Ft Transformer; Stacking; cybersecurity; machine learning.