NFRT–IDS: A Unified Neuro-Fuzzy Reinforcement Transformer Architecture for Adaptive and Explainable Intrusion Detection

Authors

  • Ouail MJAHED Faculty of Sciences Semlalia, Department of Computer Sciences, LISI Laboratory, Cadi Ayyad University Marrakech, Morocco
  • Soukaina MJAHED Faculty of Sciences Semlalia, Department of Computer Sciences, LISI Laboratory, Cadi Ayyad University Marrakech, Morocco

DOI:

https://doi.org/10.15837/ijccc.2026.2.7405

Keywords:

Intrusion Detection System, deep learning technique, fuzzy logic systems, Deep Q-Learning, Transformer, Explainable AI

Abstract

Intrusion Detection Systems (IDS) are critical to ensuring cybersecurity in complex, dynamic, and data-intensive network environments. Traditional IDS, whether signature-based or classical machine learning (ML)-based, struggle to adapt to evolving attack patterns and to provide explainable decisions in real time. This paper presents a comprehensive evolutionary framework leading to a new unified model: the Neuro-Fuzzy Reinforcement Transformer Intrusion Detection System (NFRT-IDS). Three intermediate hybrid algorithms, a Transformer-CNN (Convolutional Neural Network) IDS, a Fuzzy–Ensemble IDS, and a Deep Q-Learning based Artificial Neural Network (DQL–ANN) IDS, are first proposed, rigorously optimized through cross-validation, and extensively evaluated on benchmark datasets (CICIDS2017, UNSW-NB15, and BoT-IoT). These models respectively address deep feature extraction, interpretability, and adaptive decision optimization challenges in IDS, while providing complementary architectural and learning advantages. Their integration inspired the unified NFRT-IDS framework, which combines global attentionbased feature learning, fuzzy inference for uncertainty modeling and rule-based explainability, and reinforcement learning (DQL agent) for dynamic parameter adaptation and performance-driven optimization. Experimental results demonstrate that NFRT-IDS achieves superior performance, reaching 99.98% accuracy and F1-score on CICIDS2017, with a 0.31% False Alarm Rate (FAR) and 0.999 AUC, outperforming state-of-the-art hybrid models. Beyond single-dataset evaluation, NFRT-IDS exhibits strong cross-dataset generalization, maintaining consistent accuracy and F1- scores when trained on CICIDS2017 and evaluated on heterogeneous datasets such as UNSW-NB15 and BoT-IoT. Furthermore, the framework ensures scalability, robustness, and interpretability, enabling efficient real-time intrusion detection in modern IoT and cloud environments.

References

Song B. (2024). Random Forest Based Intrusion Detection System, 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, pp. 1-4, 2024. https://doi.org/10.1109/ASIANComNet63184.2024.10811056

Wang C., Sun Y., Lv S., Wang C., Liu H., Wang B. (2023). Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model, Electronics, 12(4), 930, 2023. https://doi.org/10.3390/electronics12040930

Krishna, K.V., Swathi, K., Rao, B.B. (2020). A novel framework for NIDS through fast kNN classifier on CICIDS2017 dataset, International Journal of Recent Technology and Engineering, 8(5), 3669-3675,2020. https://doi.org/10.35940/ijrte.E6580.018520

Kumar C. and Ansari, M. S. A. (2024). An explainable nature-inspired cyber attack detection system in software-defined IoT applications, Expert Systems with Applications, 250, 123853, 2024. https://doi.org/10.1016/j.eswa.2024.123853

Liu H. and Lang B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey, Applied Sciences, 9(20), 4396, 2019. https://doi.org/10.3390/app9204396

Qazi E. U. H., A.Almorjan, and Zia T. (2022). A One-dimensional Convolutional Neural Network (1D-CNN) based deep learning system for network intrusion detection, Applied Sciences, 12(16), 7986, 2022. https://doi.org/10.3390/app12167986

Al-Turaiki I. and Altwaijry N. (2021). A convolutional neural network for improved anomalybased network intrusion detection, Big Data, 9(3), 233-252, 2021. https://doi.org/10.1089/big.2020.0263

Halbouni A., Gunawan T. S., Habaebi M. H., Halbouni M., Kartiwi M., and Ahmad R. (2022). CNN-LSTM: Hybrid deep neural network for network intrusion detection system, IEEE Access, 10, 99837-99849, 2022. https://doi.org/10.1109/ACCESS.2022.3206425

Kamal H., Mashaly M. (2024). Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques, Future Internet, 16, 481, 2014. https://doi.org/10.3390/fi16120481

Yaras S., Dener M. (2024). IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm, Electronics, 13, 1053, 2024. https://doi.org/10.3390/electronics13061053

Muhuri P., Chatterjee P., Yuan X., Roy K., Esterline A. (2020). Using a long short-term memory recurrent neural network (lstm-rnn) to classify network attacks, Information, 11, 243, 2020. https://doi.org/10.3390/info11050243

Ullah S., Ahmad J., Khan M.A., Alshehri M.S., Boulila A., Koubaa A., Ullah S.J., et al. (2023). TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks, Computer Networks, 237, 110072, 2023. https://doi.org/10.1016/j.comnet.2023.110072

Shone N., Ngoc T. N., Phai V. D., and Shi Q. (2018). A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50, 2018. https://doi.org/10.1109/TETCI.2017.2772792

Gad A.R., Nashat A.A., Barkat T.M. (2021). Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset, IEEE Access, 9, 142206-142217, 2021 https://doi.org/10.1109/ACCESS.2021.3120626

Turk F. (2023). Analysis of intrusion detection systems in UNSW-NB15 and NSL-KDD datasets with machine learning algorithms, Bitlis Eren Üniversitesi Fen Bilim. Derg., 12, 465-477, 2023. https://doi.org/10.17798/bitlisfen.1240469

Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat A., Venkatraman S. (2019). Deep learning approach for intelligent intrusion detection system, IEEE Access, 7, 41525-41550, 2019. https://doi.org/10.1109/ACCESS.2019.2895334

Stiawan D., Idris M.Y.B., Bamhdi A.M., Budiarto R. (2020). CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access, 8, 132911-132921, 2020. https://doi.org/10.1109/ACCESS.2020.3009843

Mjahed O., El Hadaj S., El Guarmah E., Mjahed S. (2023). Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets, Computer Modeling in Engineering & Sciences, 137(1), 265-298, 2023. https://doi.org/10.32604/cmes.2023.027581

Mjahed O., El Hadaj S., Guarmah E. and Mjahed S. (2023). New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets, Computer Systems Science and Engineering, 47, 757-775, 2023. https://doi.org/10.32604/csse.2023.039111

Anand M., Muthurajkumar S. (2025). An intelligent IDS using bagging based fuzzy CNN for secured communication in vehicular networks, Scientific Reports, 15, 26952, 2025. https://doi.org/10.1038/s41598-025-09633-4

Qiu X., Shi L. and Fan P. (2025). A cooperative intrusion detection system for internet of things using fuzzy logic and ensemble of convolutional neural networks, Scientific Reports, 15, 15934, 2025. https://doi.org/10.1038/s41598-025-99938-1

S. Yu et al., (2024). Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things, IEEE Internet of Things Journal, 11(7), 12536-12550, 2024. https://doi.org/10.1109/JIOT.2023.3333903

Ren K., Zeng Y., Zhong Y., Sheng B., Zhang Y. (2023). MAFSIDS: a reinforcement learning based intrusion detection model for multi-agent feature selection networks, Journal of Big Data, 10 (1), 137, 2023. https://doi.org/10.1186/s40537-023-00814-4

Kamal M., Mashaly H. (2025). Enhanced Transformer-Convolutional hybrid intrusion detection architecture for large-scale networks, IEEE Transactions on Network Science and Engineering, 12, 212-228, 2025.

Zhao, Y., Lu, J.L. (2024). Spatiotemporal Sequence Prediction Based on Spatiotemporal Self- Attention Mechanism, International Journal of Computers Communications & Control, 19(6), 6771, 2024. https://doi.org/10.15837/ijccc.2024.6.6771

Zadeh L.A. (1965). Fuzzy sets, Information and control, 8, 338-353, 1965. https://doi.org/10.1016/S0019-9958(65)90241-X

Breiman L. (2001). Random forests, Machine Learning, 45(1), 5-32, 2021. https://doi.org/10.1023/A:1010933404324

Chen, S., Li, G., Chang, K., Hu, X., Li, P., Wang, Y., Zhang, Y. (2024). Ultra-short-term Load Forecasting Based on XGBoost-BiGRU, International Journal of Computers Communications & Control, 19(5), 6631, 2024. https://doi.org/10.15837/ijccc.2024.5.6631

Ke T Y.G., Meng Q., Finley T., Wang T., Chen W., Ma W., Ye Q., and Liu. (2017). LightGBM: a highly efficient gradient boosting decision tree, In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS'17), Curran Associates Inc., Red Hook, NY, USA, 3149-3157, 2017.

Rini P., Shamsuddin M., Yuhaniz S. (2011). Particle Swarm Optimization: technique, system and challenges, International Journal of Computer Applications, 14, 19-27, 2011. https://doi.org/10.5120/1810-2331

Silver D., Sutton R. S. (2018). Reinforcement Learning: An Introduction, (2nd ed.), MIT Press, 2018.

CICIDS2017 Dataset. (2017). https://www.unb.ca/cic/datasets/ids-2017.html

Moustafa, N., and Jill S. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), Military Communications and Information Systems Conference (MilCIS), IEEE, 2015. https://doi.org/10.1109/MilCIS.2015.7348942

Koroniotis N., Moustafa N., Sitnikova E. and Turnbull B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset, Future Generation Computer Systems, 100, 779-796, 2019. https://doi.org/10.1016/j.future.2019.05.041

Chawla, N.V., Bowyer, K.W., Hall, L. Kegelmeyer, W.P. (2002). SMOTE: Synthetic Minority Over-sampling Technique, Journal of Artificial Intelligence Research, 16, 321-357, 2002. https://doi.org/10.1613/jair.953

Zachary C. L. (2018). The mythos of model interpretability, Communications of the ACM, 61(10), 36-43, 2018. https://doi.org/10.1145/3233231

Givisis I, Kalatzis D, Christakis C, Kiouvrekis Y. (2025). Comparing Explainable AI Models: SHAP, LIME, and Their Role in Electric Field Strength Prediction over Urban Areas. Electronics, 14(23):4766. https://doi.org/10.3390/electronics14234766

Conover, W.J. (1973). On Methods of Handling Ties in the Wilcoxon Signed-Rank Test, Journal of the American Statistical Association, 68 (344), 985-988, 1973. https://doi.org/10.1080/01621459.1973.10481460

Manimurugan S., Al-Mutairi S., Aborokbah M. M., Chilamkurti N., Ganesan S. and Patan R. (2020). Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network, IEEE Access, 8, 77396-77404, 2020. https://doi.org/10.1109/ACCESS.2020.2986013

Ullah F., Ullah S., Srivastava G., Lin J.C.W. (2024). IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic, Digital Communications and Networks, 10(1), 190-204, 2024. https://doi.org/10.1016/j.dcan.2023.03.008

Xing N., Zhao S., Wang Y., Ning K., Liu X. (2023). A dynamic intrusion detection system capable of detecting unknown attacks, International Journal of Advanced Computer Science and Applications, 14, 2023. https://doi.org/10.14569/IJACSA.2023.0140743

Mayhew M., Atighetchi M., Adler A., Greenstadt R. (2015). Use of machine learning in big data analytics for insider threat detection, In: Proceedings of the MILCOM -2015 IEEE Military Communications Conference, Canberra, Australia, 10-12 November 2015, pp. 915-922, 2015. https://doi.org/10.1109/MILCOM.2015.7357562

Saba T., Rehman A., Sadad T., Kolivand H., Bahaj S.A. (2022). Anomaly-based intrusion detection system for IoT networks through deep learning model, Computers and Electrical Engineering, 99, 107810, 2022. https://doi.org/10.1016/j.compeleceng.2022.107810

Alashjaee A.M. (2025). Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection, Scientific Reports, 15, 21856, 2025. https://doi.org/10.1038/s41598-025-07706-y

Shahin M., Maghanaki M., Hosseinzadeh A. and Chen F. F. (2024). Advancing IIoT cybersecurity via AI-enabled IDS architectures, Advanced Engineering Informatics, 62, 102685, 2024. https://doi.org/10.1016/j.aei.2024.102685

Additional Files

Published

2026-03-12

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.