Real-Time Intrusion Detection Leveraging Deep Learning: A Comparative Analysis of CNN, RNN, and Transformer Architectures
Journal: International Journal of Advanced engineering, Management and Science (Vol.11, No. 5)Publication Date: 2025-09-04
Authors : Mohammed Musthafa;
Page : 064-072
Keywords : Cybersecurity; Intrusion Detection; Deep Learning; RNN; Transformer;
Abstract
Due to the rapid increase in digital data and the rise in sophisticated cyber threats, the demand for smart, automated, and scalable cybersecurity solutions are more essential now than ever. Conventional intrusion detection systems (IDS) typically use signature-grounded or heuristic approaches, which have difficulty identifying new or advanced attacks in live. Recent progress in artificial intelligence (AI), especially deep learning (DL), has unveiled new possibilities in creating adaptive and live threat spotting systems that can learn intricate patterns from extensive flows of network data. This study examines and contrasts the effectiveness of three advanced deep learning frameworks—CNN, RNN, and Transformer models (TMs) — in live intrusion detection within cybersecurity contexts. The research employs benchmark datasets like CIC-IDS2017 and UNSW-NB15, which feature a varied collection of contemporary cyber threats, including DoS, DDoS, botnets, and brute-force assaults. Each model is trained and evaluated with the help of the identical preprocessing pipeline encompassing normalization, encoding, and live simulation of data flow to properly represent the real deployment. The detection performances are evaluated along the accuracy, false rate, precision, recall, F1 score, and inference duration on each event. In addition, special significance is laid on each Model's ability to generalize on unknown attack types and deliver responses within milliseconds, a vital consideration in live detection and prevention. Initial observations point out that while CNNs are proficient in drawing spatial features from static data chunks, RNNs outperform them in time-sequence patterns recognition for time-series network traffic. Nevertheless, the TM fares better in accuracy and in terms of generalization abilities; its self-attention mechanism is at work to capture dependencies efficiently both in short and long ranges without the constraints involved during training of RNNs. Moreover, Transformer-powered Models fine-tuned for low-latency inference present the best compromise between speed and accuracy for live cybersecurity purposes.
Other Latest Articles
- Performance Analysis of a Solar Air Heating System for Thermal Comfort in Tropical Buildings: Case Study in Madagascar
- The Influence of Hotel Greenwashing on Visit Intentions: The Mediating Role of Green Skepticism
- Understanding the Role of Legal Awareness in Building E-Commerce Trust Among Gen Z Consumers
- Understanding the Role of Legal Awareness in Building E-Commerce Trust Among Gen Z Consumers
- Asset Management Maturity and Lifecycle Practices based on Stakeholders’ Feedback
Last modified: 2025-12-17 14:51:01
Share Your Research, Maximize Your Social Impacts


