Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach

Research output: Contribution to journalArticlepeer-review

Abstract

Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and underexplored issue in cybersecurity. In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. We propose a deep learning approach based on Transformer encoders to classify sequences of network alerts and attribute them to specific attackers among many candidates. Our pipeline includes data preprocessing, exploratory analysis, and robust training/validation using stratified splits and 5-fold cross-validation, all applied to real-world multi-step attack datasets from capture-the-flag (CTF) competitions. We compare the Transformer-based approach with a multilayer perceptron (MLP) baseline to quantify the benefits of advanced architectures. Experiments on this challenging dataset demonstrate that our Transformer model achieves near-perfect accuracy (99.98%) and F1-scores (macro and weighted ≈ 99%) in attack attribution, significantly outperforming the MLP baseline (accuracy 80.62%, macro F1 65.05% and weighted F1 80.48%). The Transformer generalizes robustly across all attacker classes, including those with few samples, as evidenced by per-class metrics and confusion matrices. Our results show that Transformer-based models are highly effective for multi-adversary attack attribution in MSNA, a scenario not or under-addressed in the previous intrusion detection systems (IDS) literature. The adoption of advanced architectures and rigorous validation strategies is essential for reliable attribution in complex and imbalanced environments.

Original languageEnglish
Article number8476
JournalApplied Sciences (Switzerland)
Volume15
Issue number15
DOIs
StatePublished - Aug 2025

Keywords

  • Transformer
  • attack attribution
  • cybersecurity
  • intrusion detection systems
  • multi-adversary attribution
  • multi-step attack

Fingerprint

Dive into the research topics of 'Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach'. Together they form a unique fingerprint.

Cite this