Federated Intrusion Detection Using TabTransformer-TCN-BiGRU-Attention: A High-Accuracy Hybrid Deep Learning Approach
Received: 21 July 2025 | Revised: 10 September 2025 and 28 September 2025 | Accepted: 5 October 2025 | Online: 8 December 2025
Corresponding author: Noureddine Allassak
Abstract
In the context of Industry 4.0, safeguarding Industrial IoT (IIoT) networks against increasingly sophisticated cyber threats remains a critical challenge, as traditional Intrusion Detection Systems (IDSs) often struggle with scalability, adaptability, and data privacy concerns. This study addresses these limitations by introducing a novel hybrid deep learning architecture for anomaly-based intrusion detection in IIoT environments. The proposed model combines TabTransformer for contextual feature extraction, Temporal Convolutional Networks (TCN) and Bi-directional GRU (BiGRU) for temporal sequence modeling, and an attention mechanism to enhance focus on subtle attack patterns. Using the IoTID20 dataset, the model was first evaluated in centralized training, where it outperformed baseline models (LSTM, CNN, CNN-BiGRU, BiGRU) with an F1-score of 99.8%, accuracy of 99.6%, and an AUC of 0.999. To ensure privacy-preserving and communication-efficient deployment, the model was further implemented in a Federated Learning (FL) setting using Flower, enabling collaborative training across distributed clients without sharing raw data, and significantly reducing bandwidth consumption by exchanging only model parameters. Overall, the proposed approach contributes a scalable, accurate, and privacy-aware intrusion detection framework, positioning hybrid transformer-temporal architectures as promising solutions for secure and intelligent IIoT systems.
Keywords:
federated learning, deep learning, TabTransformer, CNN-BiGRU, TCN, intrusion detectionDownloads
References
N. T. Ching, M. Ghobakhloo, M. Iranmanesh, P. Maroufkhani, and S. Asadi, "Industry 4.0 applications for sustainable manufacturing: A systematic literature review and a roadmap to sustainable development," Journal of Cleaner Production, vol. 334, Feb. 2022, Art. no. 130133. DOI: https://doi.org/10.1016/j.jclepro.2021.130133
M. Achouch et al., "On Predictive Maintenance in Industry 4.0: Overview, Models, and Challenges," Applied Sciences, vol. 12, no. 16, Aug. 2022, Art. no. 8081. DOI: https://doi.org/10.3390/app12168081
K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, "Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures," IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021. DOI: https://doi.org/10.3390/iot2010009
O. H. Abdulganiyu, T. Ait Tchakoucht, and Y. K. Saheed, "A systematic literature review for network intrusion detection system (IDS)," International Journal of Information Security, vol. 22, no. 5, pp. 1125–1162, Oct. 2023. DOI: https://doi.org/10.1007/s10207-023-00682-2
C. Zhang, Y. Xie, H. Bai, B. Yu, W. Li, and Y. Gao, "A survey on federated learning," Knowledge-Based Systems, vol. 216, Mar. 2021, Art. no. 106775. DOI: https://doi.org/10.1016/j.knosys.2021.106775
X. Huang, A. Khetan, M. Cvitkovic, and Z. Karnin, "TabTransformer: Tabular Data Modeling Using Contextual Embeddings." arXiv, 2020.
C. Lea, M. D. Flynn, R. Vidal, A. Reiter, and G. D. Hager, "Temporal Convolutional Networks for Action Segmentation and Detection." arXiv, 2016. DOI: https://doi.org/10.1007/978-3-319-49409-8_7
I. Ullah and Q. H. Mahmoud, "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks," in Advances in Artificial Intelligence, 2020, pp. 508–520. DOI: https://doi.org/10.1007/978-3-030-47358-7_52
D. J. Beutel et al., "Flower: A Friendly Federated Learning Research Framework." arXiv, 2020.
T. Q. Al-Ghadi, S. Manickam, I. D. M. Widia, E. R. N. Wulandari, and S. Karuppayah, "Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models," Cyber Security and Applications, vol. 3, Dec. 2025, Art. no. 100098. DOI: https://doi.org/10.1016/j.csa.2025.100098
M. Devi, P. Nandal, and H. Sehrawat, "Federated learning-enabled lightweight intrusion detection system for wireless sensor networks: A cybersecurity approach against DDoS attacks in smart city environments," Intelligent Systems with Applications, vol. 27, Sep. 2025, Art. no. 200553. DOI: https://doi.org/10.1016/j.iswa.2025.200553
D. Lv, X. Cheng, J. Zhang, W. Zhang, W. Zhao, and H. Xu, "DDoS Attack Detection Based on CNN and Federated Learning," in 2021 Ninth International Conference on Advanced Cloud and Big Data (CBD), Xi’an, China, Mar. 2022, pp. 236–241. DOI: https://doi.org/10.1109/CBD54617.2021.00048
M. H. Bhavsar, Y. B. Bekele, K. Roy, J. C. Kelly, and D. Limbrick, "FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT," IEEE Access, vol. 12, pp. 52215–52226, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3386631
A. Bouayad, H. Alami, M. Janati Idrissi, and I. Berrada, "Lightweight Federated Learning for Efficient Network Intrusion Detection," IEEE Access, vol. 12, pp. 172027–172045, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3494057
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7657
M. Fan, J. Lan, Y. Zhou, M. Pan, J. Li, and D. Zhang, "DDoS Attack Detection in SDN-Assisted Federated Learning Environment Based on Contrastive Learning," IEEE Access, vol. 13, pp. 108798–108814, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3582445
Z. Niu, G. Zhong, and H. Yu, "A review on the attention mechanism of deep learning," Neurocomputing, vol. 452, pp. 48–62, Sep. 2021. DOI: https://doi.org/10.1016/j.neucom.2021.03.091
H. Wang, M. Yurochkin, Y. Sun, D. Papailiopoulos, and Y. Khazaeni, "Federated Learning with Matched Averaging." arXiv, 2020.
F. Pedregosa et al., "Scikit-learn: Machine Learning in Python," 2012.
P. Liashchynskyi and P. Liashchynskyi, "Grid Search, Random Search, Genetic Algorithm: A Big Comparison for NAS." arXiv, 2019.
K. M. Ting, "Confusion Matrix," in Encyclopedia of machine learning, Springer Science & Business Media, 2011. DOI: https://doi.org/10.1007/978-0-387-30164-8_157
Downloads
How to Cite
License
Copyright (c) 2025 Noureddine Allassak, Salima Trichni, Fouzia Omary

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
