An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum

Md Mahbub Islam*, Tanwir Ahmad, Dragos Truscan

*Tämän työn vastaava kirjoittaja

Tutkimustuotos: Artikkeli kirjassa/raportissa/konferenssijulkaisussaKonferenssiartikkeliTieteellinenvertaisarvioitu

Abstrakti

With the increasing popularity of the cloud continuum, the security of different layers and nodes involved has become more relevant than ever. Intrusion detection systems, are one of the main tools to identify and intercept intrusion attacks. Furthermore, identifying the attacks in time, before they are completed, is necessary in order to deploy countermeasures in time and to limit the losses. In this work, we evaluate the use of transformer models for implementing early-detection signature-based detection systems targeted at Cloud Continuum. We implement the approach in the context of our tool for early detection of network intrusions and we evaluate it using the CICIDS2017 dataset and MQTT-IDS-2020. The results show that transformer models are a viable alternative for early-detection systems and this will pave the road for further research on the topic.

AlkuperäiskieliEnglanti
OtsikkoProceedings - 2023 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023
KustantajaIEEE Computer Society
Sivut279-284
Sivumäärä6
ISBN (elektroninen)9798350339826
DOI - pysyväislinkit
TilaJulkaistu - 2023
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
Tapahtuma14th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023 - Naples, Italy
Kesto: 4 jouluk. 20236 jouluk. 2023

Julkaisusarja

NimiProceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
ISSN (painettu)2330-2194
ISSN (elektroninen)2330-2186

Konferenssi

Konferenssi14th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023
Maa/AlueItaly
KaupunkiNaples
Ajanjakso04/12/2306/12/23

Sormenjälki

Sukella tutkimusaiheisiin 'An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Viittausmuodot