
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
April-June 2025
Indexing Partners



















A NEURAL NETWORK APPROACH FOR CYBER THREAT DETECTION VIA EVENT PROFILING
Author(s) | Pradeep Kumar Bikki, Dr. Kalyan Kumar Dasari |
---|---|
Country | India |
Abstract | The increasing sophistication of cyber threats demands more advanced detection systems capable of identifying novel attacks while maintaining efficiency and interpretability. This paper presents a hybrid Transformer-LSTM neural network for real-time cyber threat detection through security event profiling. Unlike existing approaches, our model combines the long-range dependency capture of Transformers with the temporal pattern recognition of LSTMs, enabling more accurate identification of complex attack sequences. Additionally, we integrate a self-supervised learning mechanism that allows the model to dynamically adapt to emerging threats without requiring retraining on fixed datasets. Evaluated on the CIC-IDS2017 dataset, our approach achieves 98.7% precision, 97.5% recall, and a 98.1% F1-score, outperforming state-of-the-art methods such as DeepLog, LSTM, and GNN-based detectors. The model also demonstrates computational efficiency, with a 30% reduction in training time compared to existing architectures. Beyond performance improvements, our framework incorporates attention-based explainability, providing security analysts with interpretable insights into detection decisions. These advancements address critical gaps in adaptability, scalability, and transparency for neural network-based threat detection systems. Our results highlight the potential of hybrid deep learning architectures in building more robust and dynamic cybersecurity defenses. |
Keywords | Cyber threat detection, Transformer-LSTM hybrid model, Anomaly detection, Self-supervised learning, Explainable AI, Security event profiling |
Field | Computer > Artificial Intelligence / Simulation / Virtual Reality |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-06-12 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.6192 |
Short DOI | https://doi.org/g9qqz2 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
