Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

被引:38
作者
Praveena, V. [1 ]
Vijayaraj, A. [2 ]
Chinnasamy, P. [3 ]
Ali, Ihsan [4 ]
Alroobaea, Roobaea [5 ]
Alyahyan, Saleh Yahya [6 ]
Raza, Muhammad Ahsan [7 ]
机构
[1] Dr NGP Inst Technol, Dept Comp Sci & Engn, Coimbatore 641048, Tamil Nadu, India
[2] Vignans Fdn Sci Technol & Res, Dept Informat Technol, Guntur 522213, Andhra Pradesh, India
[3] Sri Shakthi Inst Engn & Technol, Dept Informat Technol, Coimbatore 641062, Tamil Nadu, India
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[5] Taif Univ, Dept Comp Sci, Coll Comp & Informat Technol, At Taif 21944, Saudi Arabia
[6] Shaqra Univ, Dept Comp Sci, Community Coll Dwadmi, Shaqraa 11961, Saudi Arabia
[7] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60000, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 02期
关键词
Intrusion detection; UAV networks; reinforcement learning; deep learning; parameter optimization; ALGORITHM;
D O I
10.32604/cmc.2022.020066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance and reduce the false alarms generated by IDS, several researchers have employed Machine Learning (ML) and Deep Learning (DL) algorithms to address the intrusion detection problem. In this view, the current research article presents a deep reinforcement learning technique, optimized by Black Widow Optimization (DRL-BWO) algorithm, for UAV networks. In addition, DRL involves an improved reinforcement learning-based Deep Belief Network (DBN) for intrusion detection. For parameter optimization of DRL technique, BWO algorithm is applied. It helps in improving the intrusion detection performance of UAV networks. An extensive set of experimental analysis was performed to highlight the supremacy of the proposed model. From the simulation values, it is evident that the proposed method is appropriate as it attained high precision, recall, F-measure, and accuracy values such as 0.985, 0.993, 0.988, and 0.989 respectively.
引用
收藏
页码:2639 / 2653
页数:15
相关论文
共 24 条
  • [1] An opportunistic data dissemination for autonomous vehicles communication
    Abbas, Asad
    Krichen, Moez
    Alroobaea, Roobaea
    Malebary, Sharaf
    Tariq, Usman
    Jalil Piran, Md.
    [J]. SOFT COMPUTING, 2021, 25 (18) : 11899 - 11912
  • [2] An Intrusion Detection System on Ping of Death Attacks in IoT Networks
    Abdollahi, Asrin
    Fathi, Mohammad
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) : 2057 - 2070
  • [3] A Neural Network-Based Learning Algorithm for Intrusion Detection Systems
    Ahmed, Hassan I.
    Elfeshawy, Nawal A.
    Elzoghdy, S. F.
    El-sayed, Hala S.
    Faragallah, Osama S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3097 - 3112
  • [4] An overview of security and privacy in smart cities' IoT communications
    Al-Turjman, Fadi
    Zahmatkesh, Hadi
    Shahroze, Ramiz
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [5] Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection
    Alhakami, Wajdi
    Alharbi, Abdullah
    Bourouis, Sami
    Alroobaea, Roobaea
    Bouguila, Nizar
    [J]. IEEE ACCESS, 2019, 7 : 52181 - 52190
  • [6] Aroosa S. S., 2021, WIRELESS COMMUNICATI, V2021, P1
  • [7] Dai Liang, 2019, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). Proceedings, P495, DOI 10.1109/CISCE.2019.00115
  • [8] Distributed attack detection scheme using deep learning approach for Internet of Things
    Diro, Abebe Abeshu
    Chilamkurti, Naveen
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 761 - 768
  • [9] Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow
    Djenouri, Youcef
    Belhadi, Asma
    Lin, Jerry Chun-Wei
    Cano, Alberto
    [J]. IEEE ACCESS, 2019, 7 : 10015 - 10027
  • [10] A fast learning algorithm for deep belief nets
    Hinton, Geoffrey E.
    Osindero, Simon
    Teh, Yee-Whye
    [J]. NEURAL COMPUTATION, 2006, 18 (07) : 1527 - 1554