  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2730</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of CSE, PVP Siddhartha Institute of Technology, Kanuru, Vijayawada, A.P, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>S.</given_name>
    <surname>S.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science &amp; Engineering, Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Thulasi</given_name>
    <surname>Bikku</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor,Department of Electrical and Electronics Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tiruvallur, Chennai, Tamilnadu, India-602105</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>P.</given_name>
    <surname>Muthukumar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Information Technology, Dhanekula Institute of Engineering &amp; Technology, Vijayawada 521139,A.P, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>K.</given_name>
    <surname>Sandeep</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jampani Chandra</given_name>
    <surname>Sekhar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of CSE, NRI Institute of Technology, Visadala, Guntur, Andhra Pradesh, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>V. Krishna</given_name>
    <surname>Pratap</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The function of network intrusion detection systems (NIDS) in protecting networks from cyberattacks is crucial. Many of the more conventional techniques rely on signature-based approaches, which have a hard time distinguishing between various types of assaults. Using stacked FT-Transformer architecture, this research suggests a new way to identify intrusions in networks. When it comes to dealing with complicated tabular data, FT-Transformers—a variant of the Transformer model—have shown outstanding performance. Because of the inherent tabular nature of network traffic data, FT-Transformers are an attractive option for intrusion detection jobs. In this area, our study looks at how FT-Transformers outperform more conventional machine learning (ML) methods. Our working hypothesis is that, in comparison to single-layered ML models, FT-Transformers will achieve better detection accuracy due to their intrinsic capacity to grasp long-range correlations in network traffic data. We also test the FT-Transformer model on several network traffic datasets that include various protocols and attack kinds to see how well it performs and how generalizable it is. The purpose of this research is to shed light on how well and how versatile FT-Transformers perform for detecting intrusions in networks. We aim to prove that FT-Transformers can secure networks from ever-changing cyber threats by comparing their performance to that of classic ML models and by testing their generalizability.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>19</first_page>
   <last_page>29</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.130202</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2730</resource>
  </doi_data>
 </journal_article>
</journal>
