ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Real-Time Intrusion Detection Leveraging Deep Learning: A Comparative Analysis of CNN, RNN, and Transformer Architectures

Journal: International Journal of Advanced engineering, Management and Science (Vol.11, No. 5)

Publication Date:

Authors : ;

Page : 064-072

Keywords : Cybersecurity; Intrusion Detection; Deep Learning; RNN; Transformer;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Due to the rapid increase in digital data and the rise in sophisticated cyber threats, the demand for smart, automated, and scalable cybersecurity solutions are more essential now than ever. Conventional intrusion detection systems (IDS) typically use signature-grounded or heuristic approaches, which have difficulty identifying new or advanced attacks in live. Recent progress in artificial intelligence (AI), especially deep learning (DL), has unveiled new possibilities in creating adaptive and live threat spotting systems that can learn intricate patterns from extensive flows of network data. This study examines and contrasts the effectiveness of three advanced deep learning frameworks—CNN, RNN, and Transformer models (TMs) — in live intrusion detection within cybersecurity contexts. The research employs benchmark datasets like CIC-IDS2017 and UNSW-NB15, which feature a varied collection of contemporary cyber threats, including DoS, DDoS, botnets, and brute-force assaults. Each model is trained and evaluated with the help of the identical preprocessing pipeline encompassing normalization, encoding, and live simulation of data flow to properly represent the real deployment. The detection performances are evaluated along the accuracy, false rate, precision, recall, F1 score, and inference duration on each event. In addition, special significance is laid on each Model's ability to generalize on unknown attack types and deliver responses within milliseconds, a vital consideration in live detection and prevention. Initial observations point out that while CNNs are proficient in drawing spatial features from static data chunks, RNNs outperform them in time-sequence patterns recognition for time-series network traffic. Nevertheless, the TM fares better in accuracy and in terms of generalization abilities; its self-attention mechanism is at work to capture dependencies efficiently both in short and long ranges without the constraints involved during training of RNNs. Moreover, Transformer-powered Models fine-tuned for low-latency inference present the best compromise between speed and accuracy for live cybersecurity purposes.

Last modified: 2025-12-17 14:51:01