Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Energy-efficient intrusion detection with a protocol-aware transformer–spiking hybrid model
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 03 February 2026

Energy-efficient intrusion detection with a protocol-aware transformer–spiking hybrid model

  • M. Ganesh Karthik1,
  • Vijay Keerthika2,
  • Srihari Varma Mantena3,
  • D. Siri4,
  • Lakshmi Prasanna Yeluri5,
  • Kranthi Kumar Lella6 &
  • …
  • B. Rama Ganesh7 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Recent intrusion detection studies have achieved high accuracy using deep learning and transformer-based models; however, many approaches suffer from high computational cost, limited energy efficiency, and poor detection of rare attack classes in imbalanced network traffic. To address these challenges, this study proposes a Transformer-Augmented Spiking Neural Network (TASNN) that integrates attention-driven contextual modeling with energy-efficient spiking computation for intrusion detection systems (IDS). The framework incorporates Protocol-Aware Adaptive Normalization (PAAN) and Pseudo-Flow Reconstruction (PFR) to improve robustness to heterogeneous traffic patterns. An adaptive spike encoding strategy, including Multi-Scale Adaptive Spike Encoding (MASE) and Eventified Delta Coding (EDC), converts tabular features into sparse spiking representations. In addition, a Cross-Modal Gating (XMG) mechanism dynamically regulates spiking activity, while Spike-Aware Information Fusion (SAIF) supports stable and interpretable feature selection. Experimental evaluation on benchmark datasets demonstrates that TASNN achieves improved classification performance and reduced computational overhead compared to existing methods, highlighting its suitability for energy-constrained and edge-based intrusion detection scenarios.

Data availability

The datasets used and/or analyzed during the current study available from the corresponding author on reasonable request.

References

  1. Fenjan, A. et al. Adaptive intrusion detection system using deep learning for network security. In Proceedings of the Cognitive Models and Artificial Intelligence Conference. 279–284 (2024).

  2. Turukmane, A. V. & Devendiran, R. M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Computers Secur. 137, 103587 (2024).

    Google Scholar 

  3. Kukartsev, V., Kravtsov, K., Stefanenko, O., Podanyov, N. & Bezvorotnykh, A. Using machine learning techniques to simulate network intrusion detection. In 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS). 1–4. (IEEE, 2024).

  4. Mynuddin, M. et al. Automatic network intrusion detection system using machine learning and deep learning. In 2024 IEEE International Conference on Artificial Intelligence and Mechatronics Systems (AIMS). 1–9 (IEEE, 2024).

  5. Umar, M. A., Chen, Z., Shuaib, K. & Liu, Y. Effects of feature selection and normalization on network intrusion detection. Data Sci. Manage. 8 (1), 23–39 (2025).

    Google Scholar 

  6. Maddu, M. & Rao, Y. N. Network intrusion detection and mitigation in SDN using deep learning models. Int. J. Inf. Secur. 23 (2), 849–862 (2024).

    Google Scholar 

  7. Umair, M. B. et al. A network intrusion detection system using hybrid multilayer deep learning model. Big Data. 12 (5), 367–376 (2024).

    Google Scholar 

  8. Srinivasan, V., Raj, V. H., Thirumalraj, A. & Nagarathinam, K. Original research article detection of data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO feature selection. J. Auton. Intell. 7 (4), 1094 (2024).

    Google Scholar 

  9. Elsayed, S., Mohamed, K. & Madkour, M. A. A comparative study of using deep learning algorithms in network intrusion detection. IEEE Access. 12, 58851–58870 (2024).

    Google Scholar 

  10. Walling, S. & Lodh, S. An extensive review of machine learning and deep learning techniques on network intrusion detection for IoT. Trans. Emerg. Telecommun. Technol., 36(2), e70064 (2025).

  11. Wang, X. et al. Advanced network intrusion detection with tabtransformer. J. Theory Pract. Eng. Sci. 4 (03), 191–198 (2024).

    Google Scholar 

  12. Devendiran, R. & Turukmane, A. V. Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst. Appl. 245, 123027 (2024).

    Google Scholar 

  13. Xi, C., Wang, H. & Wang, X. A novel multi-scale network intrusion detection model with transformer. Sci. Rep. 14, 23239. https://doi.org/10.1038/s41598-024-74214-w (2024).

    Google Scholar 

  14. Alharthi, A., Alaryani, M. & Kaddoura, S. A comparative study of machine learning and deep learning models in binary and multiclass classification for intrusion detection systems. Array 100406 (2025).

  15. Diana, L., Dini, P. & Paolini, D. Overview on intrusion detection systems for computers networking security. Computers 14 (3), 87 (2025).

    Google Scholar 

  16. Ali, M. L., Thakur, K., Schmeelk, S., Debello, J. & Dragos, D. Deep learning vs. machine learning for intrusion detection in computer networks: A comparative study. Appl. Sci. 15(4), 1903 (2025).

  17. Ahmed, U. et al. Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering. Sci. Rep. 15 (1), 1726 (2025).

    Google Scholar 

  18. Dash, N. et al. An optimized LSTM-based deep learning model for anomaly network intrusion detection. Sci. Rep. 15 (1), 1554 (2025).

    Google Scholar 

  19. Hui, B. & Chiew, K. L. An improved network intrusion detection method based on cnn-lstm-sa. J. Adv. Res. Appl. Sci. Eng. Technol. 44 (1), 225–238 (2025).

    Google Scholar 

  20. Cai, S. et al. DDP-DAR: Network intrusion detection based on denoising diffusion probabilistic model and dual-attention residual network. Neural Netw. 184, 107064 (2025).

    Google Scholar 

  21. Tahir, M., Abdullah, A., Udzir, N. I. & Kasmiran, K. A. A novel approach for handling missing data to enhance network intrusion detection system. Cyber Secur. Appl. 3, 100063 (2025).

    Google Scholar 

  22. Manivannan, R. & Senthilkumar, S. Intrusion detection system for network security using novel adaptive recurrent neural network-based fox optimizer concept. Int. J. Comput. Intell. Syst. 18 (1), 37 (2025).

    Google Scholar 

  23. Deng, P. & Huang, Y. Edge-featured multi-hop attention graph neural network for intrusion detection system. Computers Secur. 148, 104132 (2025).

    Google Scholar 

  24. Kharoubi, K., Cherbal, S., Mechta, D. & Gawanmeh, A. Network intrusion detection system using convolutional neural networks: Nids-dl-cnn for Iot security. Cluster Comput. 28 (4), 219 (2025).

    Google Scholar 

  25. Ahmed, M. A. O., Abdelsatar, Y., Alotaibi, R. & Reyad, O. Enhancing internet of things security using performance gradient boosting for network intrusion detection systems. Alexandria Eng. J. 116, 472–482 (2025).

    Google Scholar 

  26. Thaljaoui, A. Intelligent network intrusion detection system using optimized deep CNN-LSTM with UNSW-NB15. Int. J. Inform. Technol. 1–17 (2025).

  27. Wang, Z. et al. An efficient intrusion detection model based on convolutional spiking neural network. Sci. Rep. 14, 7054. https://doi.org/10.1038/s41598-024-57691-x (2024).

    Google Scholar 

  28. Kamal, H. & Mashaly, M. Advanced hybrid transformer-CNN deep learning model for effective intrusion detection systems with class imbalance mitigation using resampling techniques. Future Internet. 16, 481. https://doi.org/10.3390/fi16120481 (2024).

    Google Scholar 

  29. https://github.com/jmnwong/NSL-KDD-Dataset.

Download references

Funding

Open access funding provided by Manipal Academy of Higher Education, Manipal

Author information

Authors and Affiliations

  1. GITAM School of Computer Science and Engineering, GITAM University-Bengaluru Campus, Bengaluru, India

    M. Ganesh Karthik

  2. Department of CSE-AIML, MLR Institute of Technology, Hyderabad, India

    Vijay Keerthika

  3. Department of Computer Science and Engineering, SRKR Engineering College, Bhimavaram, 534204, India

    Srihari Varma Mantena

  4. Department of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India

    D. Siri

  5. Department of Computer Science and Information Technology, Koneru Lakshmaiah Education Foundation, Hyderabad, 500043, India

    Lakshmi Prasanna Yeluri

  6. Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, 576104, India

    Kranthi Kumar Lella

  7. Department of Computer Science and Engineering, Sri Venkatesa Perumal College of Engineering & Technology, Puttur, Andhra Pradesh, 517583, India

    B. Rama Ganesh

Authors
  1. M. Ganesh Karthik
    View author publications

    Search author on:PubMed Google Scholar

  2. Vijay Keerthika
    View author publications

    Search author on:PubMed Google Scholar

  3. Srihari Varma Mantena
    View author publications

    Search author on:PubMed Google Scholar

  4. D. Siri
    View author publications

    Search author on:PubMed Google Scholar

  5. Lakshmi Prasanna Yeluri
    View author publications

    Search author on:PubMed Google Scholar

  6. Kranthi Kumar Lella
    View author publications

    Search author on:PubMed Google Scholar

  7. B. Rama Ganesh
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Ganesh Karthik M : Conceptualization, Methodology, ValidationVijay Keerthika: Software, ImplementationSrihari Varma Mantena: Conceptualization, Investigation, Writing - review & editingSiri D: Writing original draft, Validation.Lakshmi Prasanna Yeluri: Writing original draftKranthi Kumar Lella: Software, ImplementationRama Ganesh B: Writing - review & editing.

Corresponding author

Correspondence to Kranthi Kumar Lella.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karthik, M.G., Keerthika, V., Mantena, S.V. et al. Energy-efficient intrusion detection with a protocol-aware transformer–spiking hybrid model. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37367-4

Download citation

  • Received: 07 October 2025

  • Accepted: 21 January 2026

  • Published: 03 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-37367-4

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Intrusion detection
  • Transformer
  • Spiking neural networks
  • Protocol-aware normalization
  • Energy efficiency
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on Twitter
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics