International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 7.839

CyberBERT: Network Security Intelligence with Language AI and Real-time Power BI Analytics

  • Version
  • Download 28
  • File Size 537.57 KB
  • File Count 1
  • Create Date 18 April 2025
  • Last Updated 18 April 2025

CyberBERT: Network Security Intelligence with Language AI and Real-time Power BI Analytics

Authors:

Chaitany Agrawal1, Anubhav Banerjee2

Dronacharya College of Engineering, Khentawas, Farrukh Nagar, Gurugram, Haryana 123506

Corresponding author:-1agrawalchaitany@gmail.com  2anubhav44r@gmail.com

 

Abstract - We're living in a world where cyber threats are constantly evolving, creating an urgent need for smarter security tools. In this paper, we introduce CyberBERT, a new approach that brings the power of language AI to network security. Here's the cool part: we've figured out how to transform complex network data into something that language models can understand, letting us identify threats with remarkable accuracy.

By converting 84 different network measurements into something resembling natural language, we've created a bridge between network security and the recent breakthroughs in AI language understanding. Our system achieves 96% accuracy in identifying six different types of network traffic (normal connections, DoS attacks, port scanning, and more), and it works incredibly fast—just 5 milliseconds on systems with a decent GPU and 40 milliseconds on regular computers.

This is significantly better than traditional approaches, with accuracy improvements of over 3%. Throughout this paper, we'll walk you through how CyberBERT works, why transforming network data into text makes such a difference, and how we've optimized everything to run in real-time on standard hardware. What's particularly exciting is that our system can spot sophisticated attack patterns without requiring the extensive expert knowledge that traditional systems demand.

Key Words:  Network Security, Traffic Classification, Distilbert, Bert, Transformer Models, Intrusion Detection, Deep Learning, Real-time Analysis, Feature Transformation


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More