{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:38:31Z","timestamp":1777390711910,"version":"3.51.4"},"reference-count":18,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Post-5G and 6G telecommunication infrastructures face critical information security challenges due to increasing network complexity and sophisticated cyberattacks. Traditional intrusion detection systems based on statistical traffic analysis struggle to identify advanced threats that exploit semantic-level vulnerabilities in modern communication protocols. This paper proposes a Transformer-based intrusion detection system specifically designed for post-5G and 6G networks. Our approach integrates three key innovations: First, a comprehensive feature extraction method capturing both semantic content characteristics and communication behavior patterns. Second, a dynamic semantic embedding mechanism that adaptively adjusts positional encoding based on semantic context changes. Third, a Transformer-based classifier with multi-head attention mechanisms to model long-range dependencies in attack sequences. Extensive experiments on CICIDS2017 and UNSW-NB15 datasets demonstrate superior performance compared to LSTM, GRU, and CNN baselines across multiple evaluation metrics. Robustness testing and cross-dataset validation confirm strong generalization capability, making the system suitable for deployment in heterogeneous post-5G and 6G telecommunication environments.<\/jats:p>","DOI":"10.3390\/fi17120544","type":"journal-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T08:26:57Z","timestamp":1764318417000},"page":"544","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Transformer-Based Intrusion Detection for Post-5G and 6G Telecommunication Networks Using Dynamic Semantic Embedding"],"prefix":"10.3390","volume":"17","author":[{"given":"Haonan","family":"Yan","sequence":"first","affiliation":[{"name":"Hangzhou Hikvision Digital Technology Co., Ltd., Hangzhou 310051, China"}]},{"given":"Xin","family":"Pang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China"}]},{"given":"Shaopeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Zhejiang University, Hangzhou 310027, China"}]},{"given":"Honghui","family":"Fan","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"key":"ref_1","unstructured":"Qin, Z., Tao, X., Lu, J., Tong, W., and Li, G.Y. (2021). Semantic communications: Principles and challenges. arXiv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2663","DOI":"10.1109\/TSP.2021.3071210","article-title":"Deep learning enabled semantic communication systems","volume":"69","author":"Xie","year":"2021","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Xin, G., Fan, P., and Letaief, K.B. (2024). Semantic communication: A survey of its theoretical development. Entropy, 26.","DOI":"10.20944\/preprints202310.1208.v2"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2860","DOI":"10.1109\/COMST.2024.3516819","article-title":"A survey on semantic communication networks: Architecture, security, and privacy","volume":"27","author":"Guo","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MCOM.006.2200878","article-title":"Is semantic communication secure? A tale of multi-domain adversarial attacks","volume":"61","author":"Sagduyu","year":"2023","journal-title":"IEEE Commun. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep learning approach for intelligent intrusion detection system","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Adefemi Alimi, K.O., Ouahada, K., Abu-Mahfouz, A.M., Rimer, S., and Alimi, O.A. (2022). Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11030032"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Abd El-Rady, A., Osama, H., Sadik, R., and El Badwy, H. (June, January 30). Network intrusion detection CNN model for realistic network attacks based on network traffic classification. Proceedings of the 2023 40th National Radio Science Conference (NRSC), Giza, Egypt.","DOI":"10.1109\/NRSC58893.2023.10152872"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2243","DOI":"10.1109\/LCOMM.2024.3452715","article-title":"Secure semantic communications: From perspective of physical layer security","volume":"28","author":"Li","year":"2024","journal-title":"IEEE Commun. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wei, K., Xie, R., Xu, W., Lu, Z., and Xiao, H. (2025). Robust Semantic Communication Via Adversarial Training. IEEE Trans. Veh. Technol., early access.","DOI":"10.1109\/TVT.2025.3585536"},{"key":"ref_11","first-page":"5","article-title":"Beyond transmitting bits: Context, semantics, and task-oriented communications","volume":"41","author":"Qin","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Chen, S., Yin, Q., and Song, J. (2025, January 26\u201329). PHierT: A Privacy-Preserving Hierarchical Transformer Model for ICS Network Traffic Classification. Proceedings of the International Conference on Intelligent Computing, Ningbo, China.","DOI":"10.1007\/978-981-96-9911-7_2"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"96038","DOI":"10.1109\/ACCESS.2022.3205426","article-title":"Security of satellite-terrestrial communications: Challenges and potential solutions","volume":"10","author":"Ahmad","year":"2022","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1002\/sat.1431","article-title":"On jamming detection methods for satellite Internet of Things networks","volume":"40","author":"Taricco","year":"2022","journal-title":"Int. J. Satell. Commun. Netw."},{"key":"ref_15","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., and Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems 30, Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4\u20139 December 2017, Curran Associates Inc."},{"key":"ref_16","first-page":"19","article-title":"Intrusion Detection System Based on Transformer","volume":"29","author":"Tsai","year":"2023","journal-title":"Commun. CCISA"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"100395","DOI":"10.1016\/j.bdr.2023.100395","article-title":"Botnet DGA domain name classification using transformer network with hybrid embedding","volume":"33","author":"Ding","year":"2023","journal-title":"Big Data Res."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tuli, S., Casale, G., and Jennings, N.R. (2022). Tranad: Deep transformer networks for anomaly detection in multivariate time series data. arXiv.","DOI":"10.14778\/3514061.3514067"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/544\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T08:36:50Z","timestamp":1764319010000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/12\/544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"references-count":18,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["fi17120544"],"URL":"https:\/\/doi.org\/10.3390\/fi17120544","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]}}}