NFRT–IDS: A Unified Neuro-Fuzzy Reinforcement Transformer Architecture for Adaptive and Explainable Intrusion Detection
DOI:
https://doi.org/10.15837/ijccc.2026.2.7405Keywords:
Intrusion Detection System, deep learning technique, fuzzy logic systems, Deep Q-Learning, Transformer, Explainable AIAbstract
Intrusion Detection Systems (IDS) are critical to ensuring cybersecurity in complex, dynamic, and data-intensive network environments. Traditional IDS, whether signature-based or classical machine learning (ML)-based, struggle to adapt to evolving attack patterns and to provide explainable decisions in real time. This paper presents a comprehensive evolutionary framework leading to a new unified model: the Neuro-Fuzzy Reinforcement Transformer Intrusion Detection System (NFRT-IDS). Three intermediate hybrid algorithms, a Transformer-CNN (Convolutional Neural Network) IDS, a Fuzzy–Ensemble IDS, and a Deep Q-Learning based Artificial Neural Network (DQL–ANN) IDS, are first proposed, rigorously optimized through cross-validation, and extensively evaluated on benchmark datasets (CICIDS2017, UNSW-NB15, and BoT-IoT). These models respectively address deep feature extraction, interpretability, and adaptive decision optimization challenges in IDS, while providing complementary architectural and learning advantages. Their integration inspired the unified NFRT-IDS framework, which combines global attentionbased feature learning, fuzzy inference for uncertainty modeling and rule-based explainability, and reinforcement learning (DQL agent) for dynamic parameter adaptation and performance-driven optimization. Experimental results demonstrate that NFRT-IDS achieves superior performance, reaching 99.98% accuracy and F1-score on CICIDS2017, with a 0.31% False Alarm Rate (FAR) and 0.999 AUC, outperforming state-of-the-art hybrid models. Beyond single-dataset evaluation, NFRT-IDS exhibits strong cross-dataset generalization, maintaining consistent accuracy and F1- scores when trained on CICIDS2017 and evaluated on heterogeneous datasets such as UNSW-NB15 and BoT-IoT. Furthermore, the framework ensures scalability, robustness, and interpretability, enabling efficient real-time intrusion detection in modern IoT and cloud environments.
References
Song B. (2024). Random Forest Based Intrusion Detection System, 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, pp. 1-4, 2024. https://doi.org/10.1109/ASIANComNet63184.2024.10811056
Wang C., Sun Y., Lv S., Wang C., Liu H., Wang B. (2023). Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model, Electronics, 12(4), 930, 2023. https://doi.org/10.3390/electronics12040930
Krishna, K.V., Swathi, K., Rao, B.B. (2020). A novel framework for NIDS through fast kNN classifier on CICIDS2017 dataset, International Journal of Recent Technology and Engineering, 8(5), 3669-3675,2020. https://doi.org/10.35940/ijrte.E6580.018520
Kumar C. and Ansari, M. S. A. (2024). An explainable nature-inspired cyber attack detection system in software-defined IoT applications, Expert Systems with Applications, 250, 123853, 2024. https://doi.org/10.1016/j.eswa.2024.123853
Liu H. and Lang B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey, Applied Sciences, 9(20), 4396, 2019. https://doi.org/10.3390/app9204396
Qazi E. U. H., A.Almorjan, and Zia T. (2022). A One-dimensional Convolutional Neural Network (1D-CNN) based deep learning system for network intrusion detection, Applied Sciences, 12(16), 7986, 2022. https://doi.org/10.3390/app12167986
Al-Turaiki I. and Altwaijry N. (2021). A convolutional neural network for improved anomalybased network intrusion detection, Big Data, 9(3), 233-252, 2021. https://doi.org/10.1089/big.2020.0263
Halbouni A., Gunawan T. S., Habaebi M. H., Halbouni M., Kartiwi M., and Ahmad R. (2022). CNN-LSTM: Hybrid deep neural network for network intrusion detection system, IEEE Access, 10, 99837-99849, 2022. https://doi.org/10.1109/ACCESS.2022.3206425
Kamal H., Mashaly M. (2024). Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques, Future Internet, 16, 481, 2014. https://doi.org/10.3390/fi16120481
Yaras S., Dener M. (2024). IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm, Electronics, 13, 1053, 2024. https://doi.org/10.3390/electronics13061053
Muhuri P., Chatterjee P., Yuan X., Roy K., Esterline A. (2020). Using a long short-term memory recurrent neural network (lstm-rnn) to classify network attacks, Information, 11, 243, 2020. https://doi.org/10.3390/info11050243
Ullah S., Ahmad J., Khan M.A., Alshehri M.S., Boulila A., Koubaa A., Ullah S.J., et al. (2023). TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks, Computer Networks, 237, 110072, 2023. https://doi.org/10.1016/j.comnet.2023.110072
Shone N., Ngoc T. N., Phai V. D., and Shi Q. (2018). A Deep Learning Approach to Network Intrusion Detection, IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50, 2018. https://doi.org/10.1109/TETCI.2017.2772792
Gad A.R., Nashat A.A., Barkat T.M. (2021). Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset, IEEE Access, 9, 142206-142217, 2021 https://doi.org/10.1109/ACCESS.2021.3120626
Turk F. (2023). Analysis of intrusion detection systems in UNSW-NB15 and NSL-KDD datasets with machine learning algorithms, Bitlis Eren Üniversitesi Fen Bilim. Derg., 12, 465-477, 2023. https://doi.org/10.17798/bitlisfen.1240469
Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat A., Venkatraman S. (2019). Deep learning approach for intelligent intrusion detection system, IEEE Access, 7, 41525-41550, 2019. https://doi.org/10.1109/ACCESS.2019.2895334
Stiawan D., Idris M.Y.B., Bamhdi A.M., Budiarto R. (2020). CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access, 8, 132911-132921, 2020. https://doi.org/10.1109/ACCESS.2020.3009843
Mjahed O., El Hadaj S., El Guarmah E., Mjahed S. (2023). Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets, Computer Modeling in Engineering & Sciences, 137(1), 265-298, 2023. https://doi.org/10.32604/cmes.2023.027581
Mjahed O., El Hadaj S., Guarmah E. and Mjahed S. (2023). New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets, Computer Systems Science and Engineering, 47, 757-775, 2023. https://doi.org/10.32604/csse.2023.039111
Anand M., Muthurajkumar S. (2025). An intelligent IDS using bagging based fuzzy CNN for secured communication in vehicular networks, Scientific Reports, 15, 26952, 2025. https://doi.org/10.1038/s41598-025-09633-4
Qiu X., Shi L. and Fan P. (2025). A cooperative intrusion detection system for internet of things using fuzzy logic and ensemble of convolutional neural networks, Scientific Reports, 15, 15934, 2025. https://doi.org/10.1038/s41598-025-99938-1
S. Yu et al., (2024). Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things, IEEE Internet of Things Journal, 11(7), 12536-12550, 2024. https://doi.org/10.1109/JIOT.2023.3333903
Ren K., Zeng Y., Zhong Y., Sheng B., Zhang Y. (2023). MAFSIDS: a reinforcement learning based intrusion detection model for multi-agent feature selection networks, Journal of Big Data, 10 (1), 137, 2023. https://doi.org/10.1186/s40537-023-00814-4
Kamal M., Mashaly H. (2025). Enhanced Transformer-Convolutional hybrid intrusion detection architecture for large-scale networks, IEEE Transactions on Network Science and Engineering, 12, 212-228, 2025.
Zhao, Y., Lu, J.L. (2024). Spatiotemporal Sequence Prediction Based on Spatiotemporal Self- Attention Mechanism, International Journal of Computers Communications & Control, 19(6), 6771, 2024. https://doi.org/10.15837/ijccc.2024.6.6771
Zadeh L.A. (1965). Fuzzy sets, Information and control, 8, 338-353, 1965. https://doi.org/10.1016/S0019-9958(65)90241-X
Breiman L. (2001). Random forests, Machine Learning, 45(1), 5-32, 2021. https://doi.org/10.1023/A:1010933404324
Chen, S., Li, G., Chang, K., Hu, X., Li, P., Wang, Y., Zhang, Y. (2024). Ultra-short-term Load Forecasting Based on XGBoost-BiGRU, International Journal of Computers Communications & Control, 19(5), 6631, 2024. https://doi.org/10.15837/ijccc.2024.5.6631
Ke T Y.G., Meng Q., Finley T., Wang T., Chen W., Ma W., Ye Q., and Liu. (2017). LightGBM: a highly efficient gradient boosting decision tree, In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS'17), Curran Associates Inc., Red Hook, NY, USA, 3149-3157, 2017.
Rini P., Shamsuddin M., Yuhaniz S. (2011). Particle Swarm Optimization: technique, system and challenges, International Journal of Computer Applications, 14, 19-27, 2011. https://doi.org/10.5120/1810-2331
Silver D., Sutton R. S. (2018). Reinforcement Learning: An Introduction, (2nd ed.), MIT Press, 2018.
CICIDS2017 Dataset. (2017). https://www.unb.ca/cic/datasets/ids-2017.html
Moustafa, N., and Jill S. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), Military Communications and Information Systems Conference (MilCIS), IEEE, 2015. https://doi.org/10.1109/MilCIS.2015.7348942
Koroniotis N., Moustafa N., Sitnikova E. and Turnbull B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset, Future Generation Computer Systems, 100, 779-796, 2019. https://doi.org/10.1016/j.future.2019.05.041
Chawla, N.V., Bowyer, K.W., Hall, L. Kegelmeyer, W.P. (2002). SMOTE: Synthetic Minority Over-sampling Technique, Journal of Artificial Intelligence Research, 16, 321-357, 2002. https://doi.org/10.1613/jair.953
Zachary C. L. (2018). The mythos of model interpretability, Communications of the ACM, 61(10), 36-43, 2018. https://doi.org/10.1145/3233231
Givisis I, Kalatzis D, Christakis C, Kiouvrekis Y. (2025). Comparing Explainable AI Models: SHAP, LIME, and Their Role in Electric Field Strength Prediction over Urban Areas. Electronics, 14(23):4766. https://doi.org/10.3390/electronics14234766
Conover, W.J. (1973). On Methods of Handling Ties in the Wilcoxon Signed-Rank Test, Journal of the American Statistical Association, 68 (344), 985-988, 1973. https://doi.org/10.1080/01621459.1973.10481460
Manimurugan S., Al-Mutairi S., Aborokbah M. M., Chilamkurti N., Ganesan S. and Patan R. (2020). Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network, IEEE Access, 8, 77396-77404, 2020. https://doi.org/10.1109/ACCESS.2020.2986013
Ullah F., Ullah S., Srivastava G., Lin J.C.W. (2024). IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic, Digital Communications and Networks, 10(1), 190-204, 2024. https://doi.org/10.1016/j.dcan.2023.03.008
Xing N., Zhao S., Wang Y., Ning K., Liu X. (2023). A dynamic intrusion detection system capable of detecting unknown attacks, International Journal of Advanced Computer Science and Applications, 14, 2023. https://doi.org/10.14569/IJACSA.2023.0140743
Mayhew M., Atighetchi M., Adler A., Greenstadt R. (2015). Use of machine learning in big data analytics for insider threat detection, In: Proceedings of the MILCOM -2015 IEEE Military Communications Conference, Canberra, Australia, 10-12 November 2015, pp. 915-922, 2015. https://doi.org/10.1109/MILCOM.2015.7357562
Saba T., Rehman A., Sadad T., Kolivand H., Bahaj S.A. (2022). Anomaly-based intrusion detection system for IoT networks through deep learning model, Computers and Electrical Engineering, 99, 107810, 2022. https://doi.org/10.1016/j.compeleceng.2022.107810
Alashjaee A.M. (2025). Deep learning for network security: an Attention-CNN-LSTM model for accurate intrusion detection, Scientific Reports, 15, 21856, 2025. https://doi.org/10.1038/s41598-025-07706-y
Shahin M., Maghanaki M., Hosseinzadeh A. and Chen F. F. (2024). Advancing IIoT cybersecurity via AI-enabled IDS architectures, Advanced Engineering Informatics, 62, 102685, 2024. https://doi.org/10.1016/j.aei.2024.102685
Additional Files
Published
Issue
Section
License
Copyright (c) 2026 Ouail MJAHED, Soukaina MJAHED

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.






