ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection

被引:1
作者
Boahen, Edward Kwadwo [1 ]
Sosu, Rexford Nii Ayitey [1 ]
Ocansey, Selasi Kwame [1 ]
Xu, Qinbao [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Intrusion detection; Social networking (online); Feature extraction; Forensics; Computational modeling; Accuracy; Long short term memory; Analytical models; Adaptation models; Online social network (OSN); intrusion detection (ID); deep reinforcement learning; salp swarm algorithm (SSA); network security;
D O I
10.1109/TIFS.2024.3488506
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online Social Networks (OSNs) face escalating security threats that imperil user privacy. Conventional Deep Learning methods, relying predominantly on fixed learning rates, encounter limitations when capturing the nuanced intricacies of OSN traffic that arise from shifting user behaviors, diverse content types, and evolving interaction patterns because of social trending topics changes. To tackle these challenges, our paper delves into the diverse variations and transitions from a uniform approach, where a single method is employed for various types of data, to a multi-variation methodology. This methodology dynamically adapts to the special characteristics of each data type, resulting in more effective data representation while alleviating the limitations associated with fixed-rate calibration. Therefore, we devise the Adaptive Swarm Reinforcement Learning (ASRL) method that leverages adaptive learning to intricately analyze a wide range of user interactions, endowing our proposed method with the capacity to flexibly adjust to the constantly shifting OSN patterns. The experiments show that the proposed ASRL method achieves an accuracy of 98.59% in detecting a range of threat patterns, surpassing other prevalent methods by an average of 5% across the datasets from Facebook, Google+, and Twitter. Meanwhile, ASRL logs suspicious activities to identify the intruder for forensic analysis. The implementation of our proposed method is now publicly accessible at https://github.com/don2c/asrl_Project.
引用
收藏
页码:10258 / 10272
页数:15
相关论文
共 46 条
[1]   Salp swarm algorithm: a comprehensive survey [J].
Abualigah, Laith ;
Shehab, Mohammad ;
Alshinwan, Mohammad ;
Alabool, Hamzeh .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15) :11195-11215
[2]   Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques [J].
Anand, M. ;
Sahay, Kishan Bhushan ;
Ahmed, Mohammed Altaf ;
Sultan, Daniyar ;
Chandan, Radha Raman ;
Singh, Bharat .
THEORETICAL COMPUTER SCIENCE, 2023, 943 :203-218
[3]   On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach [J].
Anisetti, Marco ;
Ardagna, Claudio A. ;
Balestrucci, Alessandro ;
Bena, Nicola ;
Damiani, Ernesto ;
Yeun, Chan Yeob .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04) :540-554
[4]   A novel model for Sybil attack detection in online social network using optimal three-stream double attention network [J].
Antony, Blessy ;
Revathy, S. .
JOURNAL OF SUPERCOMPUTING, 2024, 80 (06) :7433-7482
[5]   Enhancing security in online social networks: introducing the DeepSybil model for Sybil attack detection [J].
Antony, Blessy ;
Revathy, S. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) :41911-41937
[6]   Deep Learning Based Social Bot Detection on Twitter [J].
Arin, Efe ;
Kutlu, Mucahid .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :1763-1772
[7]   Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets [J].
Barbon, Sylvio, Jr. ;
Campos, Gabriel F. C. ;
Tavares, Gabriel M. ;
Igawa, Rodrigo A. ;
Proenca, Mario L., Jr. ;
Guido, Rodrigo Capobianco .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2018, 14 (01)
[8]   A Deep Learning Approach to Online Social Network Account Compromisation [J].
Boahen, Edward Kwadwo ;
Bouya-Moko, Brunel Elvire ;
Qamar, Faizan ;
Wang, Changda .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) :3204-3216
[9]   Salp Swarm Optimization: A critical review [J].
Castelli, Mauro ;
Manzoni, Luca ;
Mariot, Luca ;
Nobile, Marco S. ;
Tangherloni, Andrea .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 189
[10]   SpADe: Multi-Stage Spam Account Detection for Online Social Networks [J].
Concone, Federico ;
Lo Re, Giuseppe ;
Morana, Marco ;
Das, Sajal K. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) :3128-3143