confirmed the significance of considering all features
with slightly different weights, as opposed to focusing
on specific features.
The experimental results on two publicly avail-
able datasets, namely UNSW-NB15 and NSL-KDD,
demonstrate the effectiveness of the Trans-IDS sys-
tem. Overall, the suggested approach for intrusion
detection has the potential to overcome some of the
limitations of traditional methods while avoiding the
need for feature selection techniques.
In future work, we plan to investigate the scal-
ability of Trans-IDS and its performance on other
datasets.
REFERENCES
Aydın, H., Orman, Z., and Aydın, M. A. (2022). A long
short-term memory (lstm)-based distributed denial of
service (ddos) detection and defense system design in
public cloud network environment. Computers & Se-
curity, 118:102725.
Ayesha, S., Hanif, M. K., and Talib, R. (2020). Overview
and comparative study of dimensionality reduction
techniques for high dimensional data. Information Fu-
sion, 59:44–58.
Basati, A. and Faghih, M. M. (2022). Pdae: Efficient
network intrusion detection in iot using parallel deep
auto-encoders. Information Sciences, 598:57–74.
Caville, E., Lo, W. W., Layeghy, S., and Portmann, M.
(2022). Anomal-e: A self-supervised network intru-
sion detection system based on graph neural networks.
Knowledge-Based Systems, 258:110030.
Das, S., Saha, S., Priyoti, A. T., Roy, E. K., Sheldon, F. T.,
Haque, A., and Shiva, S. (2021). Network intrusion
detection and comparative analysis using ensemble
machine learning and feature selection. IEEE Trans-
actions on Network and Service Management.
Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K.
(2018). Bert: Pre-training of deep bidirectional trans-
formers for language understanding. arXiv preprint
arXiv:1810.04805.
Dong, R.-H., Li, X.-Y., Zhang, Q.-Y., and Yuan, H. (2020).
Network intrusion detection model based on multi-
variate correlation analysis–long short-time memory
network. IET Information Security, 14(2):166–174.
Donkol, A. A. E.-B., Hafez, A. G., Hussein, A. I., and
Mabrook, M. M. (2023). Optimization of intrusion de-
tection using likely point pso and enhanced lstm-rnn
hybrid technique in communication networks. IEEE
Access, 11:9469–9482.
Gorishniy, Y., Rubachev, I., Khrulkov, V., and Babenko, A.
(2021). Revisiting deep learning models for tabular
data. Advances in Neural Information Processing Sys-
tems, 34:18932–18943.
Hsu, C.-M., Hsieh, H.-Y., Prakosa, S. W., Azhari, M. Z.,
and Leu, J.-S. (2019). Using long-short-term mem-
ory based convolutional neural networks for network
intrusion detection. In Wireless Internet: 11th EAI In-
ternational Conference, WiCON 2018, Taipei, Taiwan,
October 15-16, 2018, Proceedings 11, pages 86–94.
Springer.
Kasongo, S. M. (2023). A deep learning technique for in-
trusion detection system using a recurrent neural net-
works based framework. Computer Communications,
199:113–125.
Kasongo, S. M. and Sun, Y. (2020). A deep learning method
with wrapper based feature extraction for wireless
intrusion detection system. Computers & Security,
92:101752.
Loshchilov, I. and Hutter, F. (2017). Decoupled weight de-
cay regularization. arXiv preprint arXiv:1711.05101.
Roopa Devi, E. and Suganthe, R. (2020). Enhanced trans-
ductive support vector machine classification with
grey wolf optimizer cuckoo search optimization for
intrusion detection system. Concurrency and Com-
putation: Practice and Experience, 32(4):e4999.
Sun, B., Yang, W., Yan, M., Wu, D., Zhu, Y., and Bai,
Z. (2020). An encrypted traffic classification method
combining graph convolutional network and autoen-
coder. In 2020 IEEE 39th International Perfor-
mance Computing and Communications Conference
(IPCCC), pages 1–8. IEEE.
Taha, A., Cosgrave, B., and Mckeever, S. (2022). Using
feature selection with machine learning for generation
of insurance insights. Applied Sciences, 12(6):3209.
Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones,
L., Gomez, A. N., Kaiser, Ł., and Polosukhin, I.
(2017). Attention is all you need. Advances in neural
information processing systems, 30.
Wang, H. and Li, W. (2021). Ddostc: A transformer-based
network attack detection hybrid mechanism in sdn.
Sensors, 21(15):5047.
Wu, Z., Zhang, H., Wang, P., and Sun, Z. (2022). Rtids:
A robust transformer-based approach for intrusion de-
tection system. IEEE Access, 10:64375–64387.
Yin, C., Zhu, Y., Fei, J., and He, X. (2017). A deep learning
approach for intrusion detection using recurrent neural
networks. Ieee Access, 5:21954–21961.
Zhang, C., Jia, D., Wang, L., Wang, W., Liu, F., and Yang,
A. (2022). Comparative research on network intrusion
detection methods based on machine learning. Com-
puters & Security, page 102861.
Zheng, J. and Li, D. (2019). Gcn-tc: combining trace graph
with statistical features for network traffic classifica-
tion. In ICC 2019-2019 IEEE International Confer-
ence on Communications (ICC), pages 1–6. IEEE.
Trans-IDS: A Transformer-Based Intrusion Detection System
409