Double Deep Q-Network Next-Generation Cyber-Physical Systems: A Reinforcement Learning-Enabled Anomaly Detection Framework for Next-Generation Cyber-Physical Systems

被引:5
作者
Zhang, Yinjun [1 ]
Jamjoom, Mona [2 ]
Ullah, Zahid [3 ]
机构
[1] Guangxi Sci & Technol Normal Univ, Sch Mech & Elect Engn, Liuzhou 545004, Peoples R China
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11564, Saudi Arabia
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah 21589, Saudi Arabia
关键词
anomaly detection; next-generation-CPS; deep Q-learning; reinforcement learning; intrusion detection systems; neural networks; outlier detection;
D O I
10.3390/electronics12173632
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we considered the problem of anomaly detection in next-generation cyber-physical systems (NG-CPS). For this, we used a double deep Q-network-enabled framework, where an agent was trained to detect anomalies in the traffic that does not match the behavior of the legitimate traffic at the end side. Furthermore, the proposed paradigm recognizes known and unknown anomalies by directly engaging with a simulation environment. Given that, it progressively develops its interpretation of anomalies to encompass new, previously unrecognized classes of anomalies by proactively exploring probable anomalies in data that have not been labeled. The method achieves this by concurrently optimizing the use of a limited amount of labeled abnormality data for better understanding (exploitation) and the identification of infrequent, unlabeled anomalies (exploration). During analysis, we observed that the proposed model achieves significant results in the context of average and greedy catching of anomalies in the presence of comparative models.
引用
收藏
页数:15
相关论文
共 24 条
[1]  
Aberkane S., 2019, P 2019 6 INT C IM SI, P1
[2]  
Adil M, 2023, Arxiv, DOI arXiv:2305.16473
[3]  
Adil M, 2022, IEEE INTERNET THINGS, V9, P22173, DOI [10.1109/jiot.2021.3083731, 10.1109/JIOT.2021.3083731]
[4]   ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning [J].
Akbari, Iman ;
Tahoun, Ezzeldin ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Boutaba, Raouf .
NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
[5]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[6]   Interpretable Anomaly Detection with DIFFI: Depth-based feature importance of Isolation Forest [J].
Carletti, Mattia ;
Terzi, Matteo ;
Susto, Gian Antonio .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 119
[7]   From anomaly detection to open set recognition: Bridging the gap [J].
Cevikalp, Hakan ;
Uzun, Bedirhan ;
Salk, Yusuf ;
Saribas, Hasan ;
Kopuklu, Okan .
PATTERN RECOGNITION, 2023, 138
[8]  
de La Bourdonnaye F, 2017, IEEE IJCNN, P760, DOI 10.1109/IJCNN.2017.7965928
[9]   RanBox: anomaly detection in the copula space [J].
Dorigo, Tommaso ;
Fumanelli, Martina ;
Maccani, Chiara ;
Mojsovska, Marija ;
Strong, Giles C. ;
Scarpa, Bruno .
JOURNAL OF HIGH ENERGY PHYSICS, 2023, 2023 (01)
[10]   QLLog: A log anomaly detection method based on Q-learning algorithm [J].
Duan, Xiaoyu ;
Ying, Shi ;
Yuan, Wanli ;
Cheng, Hailong ;
Yin, Xiang .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)