Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 2 , PP: 19-29, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture

S. Phani Praveen 1 * , Thulasi Bikku 2 , P. Muthukumar 3 , K. Sandeep 4 , Jampani Chandra Sekhar 5 , V. Krishna Pratap 6

  • 1 Department of CSE, PVP Siddhartha Institute of Technology, Kanuru, Vijayawada, A.P, India - (sppraveen@pvpsiddhartha.ac.in)
  • 2 Department of Computer Science & Engineering, Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, AP, India - (in;thulasi.bikku@gmail.com)
  • 3 Professor,Department of Electrical and Electronics Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tiruvallur, Chennai, Tamilnadu, India-602105 - (muthukumarvlsi@gmail.com)
  • 4 Department of Information Technology, Dhanekula Institute of Engineering & Technology, Vijayawada 521139,A.P, India - (kottesandeep@gmail.com)
  • 5 Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India - (jcsekhar9@gmail.com)
  • 6 Assistant Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India - (pratapv9@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.130202

    Received: July 24, 2023 Revised: November 17, 2023 Accepted: February 09, 2024
    Abstract

    The function of network intrusion detection systems (NIDS) in protecting networks from cyberattacks is crucial. Many of the more conventional techniques rely on signature-based approaches, which have a hard time distinguishing between various types of assaults. Using stacked FT-Transformer architecture, this research suggests a new way to identify intrusions in networks. When it comes to dealing with complicated tabular data, FT-Transformers—a variant of the Transformer model—have shown outstanding performance. Because of the inherent tabular nature of network traffic data, FT-Transformers are an attractive option for intrusion detection jobs. In this area, our study looks at how FT-Transformers outperform more conventional machine learning (ML) methods. Our working hypothesis is that, in comparison to single-layered ML models, FT-Transformers will achieve better detection accuracy due to their intrinsic capacity to grasp long-range correlations in network traffic data. We also test the FT-Transformer model on several network traffic datasets that include various protocols and attack kinds to see how well it performs and how generalizable it is. The purpose of this research is to shed light on how well and how versatile FT-Transformers perform for detecting intrusions in networks. We aim to prove that FT-Transformers can secure networks from ever-changing cyber threats by comparing their performance to that of classic ML models and by testing their generalizability.

    Keywords :

    Intrusion detection Ft Transformer , Stacking , cybersecurity , machine learning.

    References

    [1]             Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., & Wahab, A. (2020). A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions. Electronics, 9(7), 1177.

    [2]             Qazi, E. U. H., Faheem, M. H., & Zia, T. (2023). HDLNIDS: hybrid deep-learning-based network intrusion detection system. Applied Sciences, 13(8), 4921.

    [3]             Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150.

    [4]             He, K., Kim, D. D., & Asghar, M. R. (2023). Adversarial machine learning for network intrusion detection systems: A comprehensive survey. IEEE Communications Surveys & Tutorials, 25(1), 538-566.

    [5]             Abdulganiyu, O. H., Ait Tchakoucht, T., & Saheed, Y. K. (2023). A systematic literature review for network intrusion detection system (IDS). International Journal of Information Security, 22(5), 1125-1162.

    [6]             Sirisha, U., Chandana, B. S., & Harikiran, J. (2023). NAM-YOLOV7: An Improved YOLOv7 Based on Attention Model for Animal Death Detection. Traitement du Signal, 40(2).

    [7]             Khafaga, D. S., Karim, F. K., Abdelhamid, A. A., El-kenawy, E. S. M., Alkahtani, H. K., Khodadadi, N., ... & Ibrahim, A. (2023). Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection. Computers, Materials & Continua, 74(2).

    [8]             Alkanhel, R., El-kenawy, E. S. M., Abdelhamid, A. A., Ibrahim, A., Alohali, M. A., Abotaleb, M., & Khafaga, D. S. (2023). Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization. Computers, Materials & Continua74(2).

    [9]             Sarhan, M., Layeghy, S., Moustafa, N., & Portmann, M. (2021). Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10 (pp. 117-135). Springer International Publishing.

    [10]          Gamage, S., & Samarabandu, J. (2020). Deep learning methods in network intrusion detection: A survey and an objective comparison. Journal of Network and Computer Applications169, 102767.

    [11]          Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal61(12), 9395-9409.

    [12]          Kilincer, I. F., Ertam, F., & Sengur, A. (2021). Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks188, 10784.

    [13]          Zhu, B., Shi, X., Erickson, N., Li, M., Karypis, G., & Shoaran, M. (2023). Xtab: Cross-table pretraining for tabular transformers. arXiv preprint arXiv:2305.06090.

    [14]          Sluis, E. (2023). Combining the FT-Transformer with the LSTM model to predict stock prices.

    [15]          Biyyapu, N., Veerapaneni, E. J., Surapaneni, P. P., Vellela, S. S., & Vatambeti, R. (2024). Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection. Cluster Computing, 1-19.

    [16]          Aruna, R., Kushwah, V. S., Praveen, S. P., Pradhan, R., Chinchawade, A. J., Asaad, R. R., & Kumar, R. L. (2024). Coalescing novel QoS routing with fault tolerance for improving QoS parameters in wireless Ad-Hoc network using craft protocol. Wireless Networks, 30(2), 711-735.

    [17]          Phani Praveen, S., Ali, M. H., Jarwar, M. A., Prakash, C., Reddy, C. R. K., Malliga, L., & Chandru Vignesh, C. (2023). 6G assisted federated learning for continuous monitoring in wireless sensor network using game theory. Wireless Networks, 1-27.

    [18]          Swapna, D., & Praveen, S. P. (2020). An exploration of distributed access control mechanism using blockchain. In Smart Intelligent Computing and Applications: Proceedings of the Third International Conference on Smart Computing and Informatics, Volume 2 (pp. 13-20). Springer Singapore.

    [19]          Jyothi, V. E., Kumar, D. L. S., Thati, B., Tondepu, Y., Pratap, V. K., & Praveen, S. P. (2022, December). Secure data access management for cyber threats using artificial intelligence. In 2022 6th International Conference on Electronics, Communication and Aerospace Technology (pp. 693-697). IEEE.

    [20]          https://www.unb.ca/cic/datasets/ids-2017.html

    [21]          https://www.unb.ca/cic/datasets/ids-2018.html

    [22]          https://www.unb.ca/cic/datasets/ddos-2019.html

    Cite This Article As :
    Phani, S.. , Bikku, Thulasi. , Muthukumar, P.. , Sandeep, K.. , Chandra, Jampani. , Krishna, V.. Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 19-29. DOI: https://doi.org/10.54216/JCIM.130202
    Phani, S. Bikku, T. Muthukumar, P. Sandeep, K. Chandra, J. Krishna, V. (2024). Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture. Journal of Cybersecurity and Information Management, (), 19-29. DOI: https://doi.org/10.54216/JCIM.130202
    Phani, S.. Bikku, Thulasi. Muthukumar, P.. Sandeep, K.. Chandra, Jampani. Krishna, V.. Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture. Journal of Cybersecurity and Information Management , no. (2024): 19-29. DOI: https://doi.org/10.54216/JCIM.130202
    Phani, S. , Bikku, T. , Muthukumar, P. , Sandeep, K. , Chandra, J. , Krishna, V. (2024) . Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture. Journal of Cybersecurity and Information Management , () , 19-29 . DOI: https://doi.org/10.54216/JCIM.130202
    Phani S. , Bikku T. , Muthukumar P. , Sandeep K. , Chandra J. , Krishna V. [2024]. Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture. Journal of Cybersecurity and Information Management. (): 19-29. DOI: https://doi.org/10.54216/JCIM.130202
    Phani, S. Bikku, T. Muthukumar, P. Sandeep, K. Chandra, J. Krishna, V. "Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture," Journal of Cybersecurity and Information Management, vol. , no. , pp. 19-29, 2024. DOI: https://doi.org/10.54216/JCIM.130202