ASRL: Adaptive Swarm Reinforcement Learning for Enhanced OSN Intrusion Detection

被引:1
作者
Boahen, Edward Kwadwo [1 ]
Sosu, Rexford Nii Ayitey [1 ]
Ocansey, Selasi Kwame [1 ]
Xu, Qinbao [1 ]
Wang, Changda [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Intrusion detection; Social networking (online); Feature extraction; Forensics; Computational modeling; Accuracy; Long short term memory; Analytical models; Adaptation models; Online social network (OSN); intrusion detection (ID); deep reinforcement learning; salp swarm algorithm (SSA); network security;
D O I
10.1109/TIFS.2024.3488506
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online Social Networks (OSNs) face escalating security threats that imperil user privacy. Conventional Deep Learning methods, relying predominantly on fixed learning rates, encounter limitations when capturing the nuanced intricacies of OSN traffic that arise from shifting user behaviors, diverse content types, and evolving interaction patterns because of social trending topics changes. To tackle these challenges, our paper delves into the diverse variations and transitions from a uniform approach, where a single method is employed for various types of data, to a multi-variation methodology. This methodology dynamically adapts to the special characteristics of each data type, resulting in more effective data representation while alleviating the limitations associated with fixed-rate calibration. Therefore, we devise the Adaptive Swarm Reinforcement Learning (ASRL) method that leverages adaptive learning to intricately analyze a wide range of user interactions, endowing our proposed method with the capacity to flexibly adjust to the constantly shifting OSN patterns. The experiments show that the proposed ASRL method achieves an accuracy of 98.59% in detecting a range of threat patterns, surpassing other prevalent methods by an average of 5% across the datasets from Facebook, Google+, and Twitter. Meanwhile, ASRL logs suspicious activities to identify the intruder for forensic analysis. The implementation of our proposed method is now publicly accessible at https://github.com/don2c/asrl_Project.
引用
收藏
页码:10258 / 10272
页数:15
相关论文
共 46 条
[41]   Markov enhanced graph attention network for spammer detection in online social network [J].
Tripathi, Ashutosh ;
Ghosh, Mohona ;
Bharti, Kusum Kumari .
KNOWLEDGE AND INFORMATION SYSTEMS, 2024, 66 (09) :5561-5580
[42]   DeepProfile: Finding fake profile in online social network using dynamic CNN [J].
Wanda, Putra ;
Jie, Huang Jin .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[43]   Toxic Fake News Detection and Classification for Combating COVID-19 Misinformation [J].
Wani, Mudasir Ahmad ;
ELAffendi, Mohammad ;
Shakil, Kashish Ara ;
Abuhaimed, Ibrahem Mohammed ;
Nayyar, Anand ;
Hussain, Amir ;
Abd El-Latif, Ahmed A. .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (04) :5101-5118
[44]   Feature Selection in the Data Stream Based on Incremental Markov Boundary Learning [J].
Wu, Xingyu ;
Jiang, Bingbing ;
Wang, Xiangyu ;
Ban, Taiyu ;
Chen, Huanhuan .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (10) :6740-6754
[45]   RoSGAS: Adaptive Social Bot Detection with Reinforced Self-supervised GNN Architecture Search [J].
Yang, Yingguang ;
Yang, Renyu ;
Li, Yangyang ;
Cui, Kai ;
Yang, Zhiqin ;
Wang, Yue ;
Xu, Jie ;
Xie, Haiyong .
ACM TRANSACTIONS ON THE WEB, 2023, 17 (03)
[46]   Minimizing makespan in two-stage assembly additive manufacturing: A reinforcement learning iterated greedy algorithm [J].
Ying, Kuo-Ching ;
Lin, Shih-Wei .
APPLIED SOFT COMPUTING, 2023, 138