An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum

Md Mahbub Islam*, Tanwir Ahmad, Dragos Truscan

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

Abstract

With the increasing popularity of the cloud continuum, the security of different layers and nodes involved has become more relevant than ever. Intrusion detection systems, are one of the main tools to identify and intercept intrusion attacks. Furthermore, identifying the attacks in time, before they are completed, is necessary in order to deploy countermeasures in time and to limit the losses. In this work, we evaluate the use of transformer models for implementing early-detection signature-based detection systems targeted at Cloud Continuum. We implement the approach in the context of our tool for early detection of network intrusions and we evaluate it using the CICIDS2017 dataset and MQTT-IDS-2020. The results show that transformer models are a viable alternative for early-detection systems and this will pave the road for further research on the topic.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023
PublisherIEEE
Pages279-284
Number of pages6
ISBN (Electronic)979-8-3503-3982-6
ISBN (Print)979-8-3503-3983-3
DOIs
Publication statusPublished - 2023
MoE publication typeA4 Article in a conference publication
EventIEEE International Conference on Cloud Computing Technology and Science -
Duration: 4 Dec 2023 → …

Publication series

NameProceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
ISSN (Print)2330-2194
ISSN (Electronic)2330-2186

Conference

ConferenceIEEE International Conference on Cloud Computing Technology and Science
Abbreviated titleCloudCom
Period04/12/23 → …

Keywords

  • deep learning
  • Intrusion detection systems
  • monitoring
  • transformer-architecture

Fingerprint

Dive into the research topics of 'An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum'. Together they form a unique fingerprint.

Cite this