DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection

被引:4
作者
Strickland, Caroline [1 ]
Zakar, Muhammad [1 ]
Saha, Chandrika [1 ]
Nejad, Sareh Soltani
Tasnim, Noshin [1 ]
Lizotte, Daniel J. [1 ]
Haque, Anwar [1 ]
机构
[1] Univ Western Ontario, Dept Comp Sci, London, ON N6A 3K7, Canada
关键词
network security; Network Intrusion Detection System; Deep Reinforcement Learning; Generative Adversarial Networks; NSL-KDD; Machine Learning; SYSTEMS;
D O I
10.3390/s24092746
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Our increasingly connected world continues to face an ever-growing number of network-based attacks. An Intrusion Detection System (IDS) is an essential security technology used for detecting these attacks. Although numerous Machine Learning-based IDSs have been proposed for the detection of malicious network traffic, the majority have difficulty properly detecting and classifying the more uncommon attack types. In this paper, we implement a novel hybrid technique using synthetic data produced by a Generative Adversarial Network (GAN) to use as input for training a Deep Reinforcement Learning (DRL) model. Our GAN model is trained on the NSL-KDD dataset, a publicly available collection of labeled network traffic data specifically designed to support the evaluation and benchmarking of IDSs. Ultimately, our findings demonstrate that training the DRL model on synthetic datasets generated by specific GAN models can result in better performance in correctly classifying minority classes over training on the true imbalanced dataset.
引用
收藏
页数:18
相关论文
共 36 条
  • [1] Abadi M., 2016, arXiv preprint, DOI DOI 10.48550/ARXIV.1603.04467
  • [2] Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection
    Alavizadeh, Hooman
    Alavizadeh, Hootan
    Jang-Jaccard, Julian
    [J]. COMPUTERS, 2022, 11 (03)
  • [3] Alghayadh F., 2021, Adv. Internet Things, V11, P10, DOI DOI 10.4236/AIT.2021.111002
  • [4] Alghayadh F, 2020, 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P837, DOI 10.1109/UEMCON51285.2020.9298134
  • [5] Alghayadh F, 2020, INT CONF ELECTRO INF, P319, DOI [10.1109/eit48999.2020.9208296, 10.1109/EIT48999.2020.9208296]
  • [6] Generative adversarial networks for network traffic feature generation
    Anande T.J.
    Al-Saadi S.
    Leeson M.S.
    [J]. International Journal of Computers and Applications, 2023, 45 (04) : 297 - 305
  • [7] Anderson J.P., 1980, Technical Report
  • [8] Arjovsky M, 2017, PR MACH LEARN RES, V70
  • [9] Deep Reinforcement Learning A brief survey
    Arulkumaran, Kai
    Deisenroth, Marc Peter
    Brundage, Miles
    Bharath, Anil Anthony
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) : 26 - 38
  • [10] Benaddi Hafsa, 2020, Wireless Internet. 12th EAI International Conference, WiCON 2019. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 317), P73, DOI 10.1007/978-3-030-52988-8_7