This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessSystematic Review
The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review
by
Thilina Prasanga Doremure Gamage
Thilina Prasanga Doremure Gamage 1,*
,
Jairo A. Gutierrez
Jairo A. Gutierrez 1
and
Sayan K. Ray
Sayan K. Ray 2
1
Department of Computer and Information Sciences, School of Engineering, Computer, and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand
2
School of Computer Science, Faculty of Innovation & Technology, Taylor’s University, Subang Jaya 47500, Malaysia
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(21), 4163; https://doi.org/10.3390/electronics14214163 (registering DOI)
Submission received: 15 September 2025
/
Revised: 18 October 2025
/
Accepted: 23 October 2025
/
Published: 24 October 2025
Abstract
Traditional network threat detection based on signatures is becoming increasingly inadequate as network threats and attacks continue to grow in their novelty and sophistication. Such advanced network threats are better handled by anomaly detection based on Machine Learning (ML) models. However, conventional anomaly-based network threat detection with traditional ML and Deep Learning (DL) faces fundamental limitations. Graph Neural Networks (GNNs) and Transformers are recent deep learning models with innovative architectures, capable of addressing these challenges. Reinforcement learning (RL) can facilitate adaptive learning strategies for GNN- and Transformer-based Intrusion Detection Systems (IDS). However, no systematic literature review (SLR) has jointly analyzed and synthesized these three powerful modeling algorithms in network threat detection. To address this gap, this SLR analyzed 36 peer-reviewed studies published between 2017 and 2025, collectively identifying 56 distinct network threats via the proposed threat classification framework by systematically mapping them to Enterprise MITRE ATT&CK tactics and their corresponding Cyber Kill Chain stages. The reviewed literature consists of 23 GNN-based studies implementing 19 GNN model types, 9 Transformer-based studies implementing 13 Transformer architectures, and 4 RL-based studies with 5 different RL algorithms, evaluated across 50 distinct datasets, demonstrating their overall effectiveness in network threat detection.
Share and Cite
MDPI and ACS Style
Doremure Gamage, T.P.; Gutierrez, J.A.; Ray, S.K.
The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review. Electronics 2025, 14, 4163.
https://doi.org/10.3390/electronics14214163
AMA Style
Doremure Gamage TP, Gutierrez JA, Ray SK.
The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review. Electronics. 2025; 14(21):4163.
https://doi.org/10.3390/electronics14214163
Chicago/Turabian Style
Doremure Gamage, Thilina Prasanga, Jairo A. Gutierrez, and Sayan K. Ray.
2025. "The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review" Electronics 14, no. 21: 4163.
https://doi.org/10.3390/electronics14214163
APA Style
Doremure Gamage, T. P., Gutierrez, J. A., & Ray, S. K.
(2025). The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review. Electronics, 14(21), 4163.
https://doi.org/10.3390/electronics14214163
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.