Deep Reinforcement Learning for Cyber Security

被引:168
|
作者
Thanh Thi Nguyen [1 ]
Reddi, Vijay Janapa [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne Burwood Campus, Burwood, Vic 3125, Australia
[2] Harvard Univ, John A Paulson Sch Engn & Appl Sci, Cambridge, MA 02138 USA
关键词
Computer crime; Games; Deep learning; Reinforcement learning; Internet of Things; Estimation; Correlation; Cyber defense; cyber security; cyberattacks; deep learning; deep reinforcement learning (DRL); Internet of Things (IoT); IoT; review; survey; NETWORK INTRUSION DETECTION; MULTIAGENT SYSTEMS; PHYSICAL SYSTEMS; GAME; AUTHENTICATION; INTERNET; IDENTIFICATION; ALGORITHMS; CHALLENGES; ATTACKS;
D O I
10.1109/TNNLS.2021.3121870
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyberattacks more than ever. The complexity and dynamics of cyberattacks require protecting mechanisms to be responsive, adaptive, and scalable. Machine learning, or more specifically deep reinforcement learning (DRL), methods have been proposed widely to address these issues. By incorporating deep learning into traditional RL, DRL is highly capable of solving complex, dynamic, and especially high-dimensional cyber defense problems. This article presents a survey of DRL approaches developed for cyber security. We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multiagent DRL-based game theory simulations for defense strategies against cyberattacks. Extensive discussions and future research directions on DRL-based cyber security are also given. We expect that this comprehensive review provides the foundations for and facilitates future studies on exploring the potential of emerging DRL to cope with increasingly complex cyber security problems.
引用
收藏
页码:3779 / 3795
页数:17
相关论文
共 50 条
  • [31] Generalization of Deep Learning for Cyber-Physical System Security: A Survey
    Wickramasinghe, Chathurika S.
    Marino, Daniel L.
    Amarasinghe, Kasun
    Manic, Milos
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 745 - 751
  • [32] AIRS: Explanation for Deep Reinforcement Learning based Security Applications
    Yu, Jiahao
    Guo, Wenbo
    Qin, Qi
    Wang, Gang
    Wang, Ting
    Xing, Xinyu
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 7375 - 7392
  • [33] Learning Distributed Cooperative Policies For Security Games via Deep Reinforcement Learning
    Sheikh, Hassam Ullah
    Razghandi, Mina
    Boloni, Ladislau
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 489 - 494
  • [34] Applying Deep Reinforcement Learning for Detection of Internet-of-Things Cyber Attacks
    Rookard, Curtis
    Khojandi, Anahita
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 389 - 395
  • [35] Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
    Oh, Sang Ho
    Kim, Jeongyoon
    Nah, Jae Hoon
    Park, Jongyoul
    ELECTRONICS, 2024, 13 (03)
  • [36] Deep reinforcement learning for wireless sensor scheduling in cyber-physical systems
    Leong, Alex S.
    Ramaswamy, Arunselvan
    Quevedo, Daniel E.
    Karl, Holger
    Shi, Ling
    AUTOMATICA, 2020, 113
  • [37] Modeling Deep Reinforcement Learning based Architectures for Cyber-Physical Systems
    Gatto, Nicola
    Kusmenko, Evgeny
    Rumpe, Bernhard
    2019 ACM/IEEE 22ND INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS COMPANION (MODELS-C 2019), 2019, : 196 - 202
  • [38] Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks
    Yu, Yan
    Yang, Wen
    Ding, Wenjie
    Zhou, Jiayu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2583 - 2595
  • [39] Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security
    Wang, Wenhao
    Sun, Dingyuanhao
    Jiang, Feng
    Chen, Xingguo
    Zhu, Cheng
    ALGORITHMS, 2022, 15 (04)
  • [40] A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
    Khoury, Joseph
    Nassar, Mohamed
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,