Deep Reinforcement Learning for Cyber Security

被引:212
作者
Thanh Thi Nguyen [1 ]
Reddi, Vijay Janapa [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne Burwood Campus, Burwood, Vic 3125, Australia
[2] Harvard Univ, John A Paulson Sch Engn & Appl Sci, Cambridge, MA 02138 USA
关键词
Computer crime; Games; Deep learning; Reinforcement learning; Internet of Things; Estimation; Correlation; Cyber defense; cyber security; cyberattacks; deep learning; deep reinforcement learning (DRL); Internet of Things (IoT); IoT; review; survey; NETWORK INTRUSION DETECTION; MULTIAGENT SYSTEMS; PHYSICAL SYSTEMS; GAME; AUTHENTICATION; INTERNET; IDENTIFICATION; ALGORITHMS; CHALLENGES; ATTACKS;
D O I
10.1109/TNNLS.2021.3121870
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyberattacks more than ever. The complexity and dynamics of cyberattacks require protecting mechanisms to be responsive, adaptive, and scalable. Machine learning, or more specifically deep reinforcement learning (DRL), methods have been proposed widely to address these issues. By incorporating deep learning into traditional RL, DRL is highly capable of solving complex, dynamic, and especially high-dimensional cyber defense problems. This article presents a survey of DRL approaches developed for cyber security. We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multiagent DRL-based game theory simulations for defense strategies against cyberattacks. Extensive discussions and future research directions on DRL-based cyber security are also given. We expect that this comprehensive review provides the foundations for and facilitates future studies on exploring the potential of emerging DRL to cope with increasingly complex cyber security problems.
引用
收藏
页码:3779 / 3795
页数:17
相关论文
共 196 条
[1]  
Abbas H, 2012, ANN ALLERTON CONF, P1594, DOI 10.1109/Allerton.2012.6483411
[2]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[3]  
Abubakar A, 2017, 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), P138, DOI 10.1109/EST.2017.8090413
[4]   Zero-Day Signature Extraction for High-Volume Attacks [J].
Afek, Yehuda ;
Bremler-Barr, Anat ;
Feibish, Shir Landau .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) :691-706
[5]   Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning [J].
Akazaki, Takumi ;
Liu, Shuang ;
Yamagata, Yoriyuki ;
Duan, Yihai ;
Hao, Jianye .
FORMAL METHODS, 2018, 10951 :456-465
[6]   An efficient reinforcement learning-based Botnet detection approach [J].
Alauthman, Mohammad ;
Aslam, Nauman ;
Al-kasassbeh, Mouhammd ;
Khan, Suleman ;
Al-Qerem, Ahmad ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150
[7]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[8]  
[Anonymous], 2018, ARXIV180907193
[9]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[10]  
Aref MA, 2017, IEEE WCNC