Claim Missing Document
Check
Articles

Found 2 Documents
Search

Network Anomaly Detection System using Transformer Neural Networks and Clustering Techniques Isijola, Ayomitope; Asefon, Michael; Ogude, Ufuoma; Sola, Adetoro Mayowa; Adebowale, Temiloluwa; Akunekwu, Isabella
International Journal of Artificial Intelligence Vol 12 No 1: June 2025
Publisher : Lamintang Education and Training Centre, in collaboration with the International Association of Educators, Scientists, Technologists, and Engineers (IA-ESTE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36079/lamintang.ijai-01201.837

Abstract

This study proposes a hybrid approach for network anomaly detection by integrating a Transformer-based model with clustering techniques. The methodology begins with the application of K-means clustering as a preprocessing step to group similar network traffic data, thereby reducing data complexity and highlighting significant patterns. The clustered data is then fed into a Transformer model, which utilizes multi-head self-attention mechanisms to capture intricate temporal dependencies and contextual relationships within sequential data. This dual-stage approach enhances the model’s ability to differentiate between normal and anomalous behaviors in network traffic. Trained on a network security dataset, the system effectively identifies both common and rare attack types. According to the results, the suggested ensemble classifier outperformed existing deep learning models with an accuracy of over 99.5%, 98.5%, and 99.9% on the UNSW-NB15 dataset. The synergy between the unsupervised pattern recognition of clustering and the deep learning capabilities of Transformers enables a scalable and adaptable solution for real-world network security applications, making it suitable for proactive cyber threat detection and mitigation.
Design and Evaluation of a Fuzzy Logic Based Intrusion Detection System for Network Security Isijola, Ayomitope; Afuadajo, Emmanuel; Asefon, Michael; Ogude, Ufuoma; Akande, Jamiu; Joseph, Promise
International Journal of Artificial Intelligence Vol 12 No 2: December 2025
Publisher : Lamintang Education and Training Centre, in collaboration with the International Association of Educators, Scientists, Technologists, and Engineers (IA-ESTE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36079/lamintang.ijai-01202.870

Abstract

With the proliferation of networked systems, intrusion detection systems (IDS) have become vital in identifying and mitigating cyber threats and unauthorized access. Traditional IDS approaches, such as signature-based and anomaly-based methods, often struggle to detect novel attacks and tend to generate high false alarm rates. This study presents a robust, fuzzy logic-based IDS designed to detect network intrusions and assess their risk levels while minimizing false positives. The IDS classifies network intrusions by analyzing parameters such as source bytes, destination bytes, and packet rates, categorizing them into risk levels through defined fuzzy rules. Implemented in Python using libraries like scikit-fuzzy and pandas, the system utilizes the KDD Cup 99 dataset, a widely recognized IDS benchmark. Fuzzy membership functions and inference rules were defined for the primary input variables, enabling the system to infer intrusion likelihood. The IDS was tested using both two-variable and multi-variable input setups. It achieved a precision of 0.89, a recall of 0.85, and an F1-score of 0.87 in the multi-variable scenario. Results indicate that the fuzzy logic-based IDS achieves a balanced trade-off between detection accuracy and interpretability. It offers a transparent decision-making framework suitable for real-time applications due to its adaptability and potential for integration with live data streams. This research proposes future improvements by creating a foundation for hybrid intrusion detection systems (IDS) that integrate fuzzy logic and machine learning to enhance accuracy and interpretability. It recommends future research on adaptive fuzzy rules, real-time data processing, and explainable AI (XAI) to improve system flexibility, responsiveness, and transparency in cybersecurity applications.