Federated Intrusion Detection Using TabTransformer-TCN-BiGRU-Attention: A High-Accuracy Hybrid Deep Learning Approach

Authors

  • Noureddine Allassak Computer Science Department, Faculty of Sciences, IPSS Laboratory, Mohammed V University in Rabat, Rabat, Morocco https://orcid.org/0009-0000-9345-4789
  • Salima Trichni Computer Science Department, Faculty of Sciences, IPSS Laboratory, Mohammed V University in Rabat, Rabat, Morocco | Department of Transversal Modules, Faculty of Law, Economics and Social Sciences, Mohammed V University in Rabat, Rabat, Morocco https://orcid.org/0000-0002-0323-4254
  • Fouzia Omary Computer Science Department, Faculty of Sciences, IPSS Laboratory, Mohammed V University in Rabat, Rabat, Morocco https://orcid.org/0000-0001-5216-0119
Volume: 15 | Issue: 6 | Pages: 29647-29654 | December 2025 | https://doi.org/10.48084/etasr.13566

Abstract

In the context of Industry 4.0, safeguarding Industrial IoT (IIoT) networks against increasingly sophisticated cyber threats remains a critical challenge, as traditional Intrusion Detection Systems (IDSs) often struggle with scalability, adaptability, and data privacy concerns. This study addresses these limitations by introducing a novel hybrid deep learning architecture for anomaly-based intrusion detection in IIoT environments. The proposed model combines TabTransformer for contextual feature extraction, Temporal Convolutional Networks (TCN) and Bi-directional GRU (BiGRU) for temporal sequence modeling, and an attention mechanism to enhance focus on subtle attack patterns. Using the IoTID20 dataset, the model was first evaluated in centralized training, where it outperformed baseline models (LSTM, CNN, CNN-BiGRU, BiGRU) with an F1-score of 99.8%, accuracy of 99.6%, and an AUC of 0.999. To ensure privacy-preserving and communication-efficient deployment, the model was further implemented in a Federated Learning (FL) setting using Flower, enabling collaborative training across distributed clients without sharing raw data, and significantly reducing bandwidth consumption by exchanging only model parameters. Overall, the proposed approach contributes a scalable, accurate, and privacy-aware intrusion detection framework, positioning hybrid transformer-temporal architectures as promising solutions for secure and intelligent IIoT systems.

Keywords:

federated learning, deep learning, TabTransformer, CNN-BiGRU, TCN, intrusion detection

Downloads

Download data is not yet available.

References

N. T. Ching, M. Ghobakhloo, M. Iranmanesh, P. Maroufkhani, and S. Asadi, "Industry 4.0 applications for sustainable manufacturing: A systematic literature review and a roadmap to sustainable development," Journal of Cleaner Production, vol. 334, Feb. 2022, Art. no. 130133. DOI: https://doi.org/10.1016/j.jclepro.2021.130133

M. Achouch et al., "On Predictive Maintenance in Industry 4.0: Overview, Models, and Challenges," Applied Sciences, vol. 12, no. 16, Aug. 2022, Art. no. 8081. DOI: https://doi.org/10.3390/app12168081

K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, "Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures," IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021. DOI: https://doi.org/10.3390/iot2010009

O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, "A systematic literature review for network intrusion detection system (IDS)," International Journal of Information Security, vol. 22, no. 5, pp. 1125–1162, Oct. 2023. DOI: https://doi.org/10.1007/s10207-023-00682-2

C. Zhang, Y. Xie, H. Bai, B. Yu, W. Li, and Y. Gao, "A survey on federated learning," Knowledge-Based Systems, vol. 216, Mar. 2021, Art. no. 106775. DOI: https://doi.org/10.1016/j.knosys.2021.106775

X. Huang, A. Khetan, M. Cvitkovic, and Z. Karnin, "TabTransformer: Tabular Data Modeling Using Contextual Embeddings." arXiv, 2020.

C. Lea, M. D. Flynn, R. Vidal, A. Reiter, and G. D. Hager, "Temporal Convolutional Networks for Action Segmentation and Detection." arXiv, 2016. DOI: https://doi.org/10.1007/978-3-319-49409-8_7

I. Ullah and Q. H. Mahmoud, "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks," in Advances in Artificial Intelligence, 2020, pp. 508–520. DOI: https://doi.org/10.1007/978-3-030-47358-7_52

D. J. Beutel et al., "Flower: A Friendly Federated Learning Research Framework." arXiv, 2020.

T. Q. Al-Ghadi, S. Manickam, I. D. M. Widia, E. R. N. Wulandari, and S. Karuppayah, "Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models," Cyber Security and Applications, vol. 3, Dec. 2025, Art. no. 100098. DOI: https://doi.org/10.1016/j.csa.2025.100098

M. Devi, P. Nandal, and H. Sehrawat, "Federated learning-enabled lightweight intrusion detection system for wireless sensor networks: A cybersecurity approach against DDoS attacks in smart city environments," Intelligent Systems with Applications, vol. 27, Sep. 2025, Art. no. 200553. DOI: https://doi.org/10.1016/j.iswa.2025.200553

D. Lv, X. Cheng, J. Zhang, W. Zhang, W. Zhao, and H. Xu, "DDoS Attack Detection Based on CNN and Federated Learning," in 2021 Ninth International Conference on Advanced Cloud and Big Data (CBD), Xi’an, China, Mar. 2022, pp. 236–241. DOI: https://doi.org/10.1109/CBD54617.2021.00048

M. H. Bhavsar, Y. B. Bekele, K. Roy, J. C. Kelly, and D. Limbrick, "FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT," IEEE Access, vol. 12, pp. 52215–52226, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386631

A. Bouayad, H. Alami, M. Janati Idrissi, and I. Berrada, "Lightweight Federated Learning for Efficient Network Intrusion Detection," IEEE Access, vol. 12, pp. 172027–172045, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3494057

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657

M. Fan, J. Lan, Y. Zhou, M. Pan, J. Li, and D. Zhang, "DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning," IEEE Access, vol. 13, pp. 108798–108814, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3582445

Z. Niu, G. Zhong, and H. Yu, "A review on the attention mechanism of deep learning," Neurocomputing, vol. 452, pp. 48–62, Sep. 2021. DOI: https://doi.org/10.1016/j.neucom.2021.03.091

H. Wang, M. Yurochkin, Y. Sun, D. Papailiopoulos, and Y. Khazaeni, "Federated Learning with Matched Averaging." arXiv, 2020.

F. Pedregosa et al., "Scikit-learn: Machine Learning in Python," 2012.

P. Liashchynskyi and P. Liashchynskyi, "Grid Search, Random Search, Genetic Algorithm: A Big Comparison for NAS." arXiv, 2019.

K. M. Ting, "Confusion Matrix," in Encyclopedia of machine learning, Springer Science & Business Media, 2011. DOI: https://doi.org/10.1007/978-0-387-30164-8_157

Downloads

How to Cite

[1]
N. Allassak, S. Trichni, and F. Omary, “Federated Intrusion Detection Using TabTransformer-TCN-BiGRU-Attention: A High-Accuracy Hybrid Deep Learning Approach”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 29647–29654, Dec. 2025.

Metrics

Abstract Views: 341
PDF Downloads: 234

Metrics Information