Transformer-Based Approach for Intrusion Detection System

dc.contributor.authorSenoussi, Nour El Houda
dc.contributor.authorSalmi, Cheikh
dc.contributor.authorBanouh, Nassim
dc.contributor.authorKhalfi, Adem
dc.date.accessioned2026-01-21T12:46:38Z
dc.date.issued2025
dc.description.abstractIntrusion Detection Systems (IDS) have been used for years to protect enterprise hosts from cyberattacks. Traditional IDSs are usually based on simple methods, such as signatures or heuristics, that do not adapt to reactions against new threats that are constantly increasing. The objective of this paper is to develop an IDS based on a deep learning technique which is transformers. Unlike conventional models and thanks to their self-attention mechanism, transformers are characterized by an excellent ability to support complex patterns by very accurately modeling the context in sequential data. A host-based dataset containing system logs and network activities is used to train the transformer model that forms the core of the developed IDS. A detailed evaluation is used to compare our approach against existing methods based on machine learning and deep learning, showing significant improvements in precision, recall, and false positive rate. These results are very encouraging for developing robust IDSs that can be fine-tuned in real time to take into account new attacks
dc.identifier.isbn979-833150957-6
dc.identifier.uriDOI: 10.1109/ISNIB64820.2025.10983583
dc.identifier.urihttps://dspace.univ-boumerdes.dz/handle/123456789/15995
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics
dc.relation.ispartofseries2025 International Symposium on iNnovative Informatics of Biskra, ISNIB 2025
dc.subjectDeep learning
dc.subjectVisualization
dc.subjectAccuracy
dc.subjectIntrusion detection
dc.subjectTransformer cores
dc.titleTransformer-Based Approach for Intrusion Detection System
dc.typeArticle

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: