Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

被引:43
作者
Praveena, V. [1 ]
Vijayaraj, A. [2 ]
Chinnasamy, P. [3 ]
Ali, Ihsan [4 ]
Alroobaea, Roobaea [5 ]
Alyahyan, Saleh Yahya [6 ]
Raza, Muhammad Ahsan [7 ]
机构
[1] Dr NGP Inst Technol, Dept Comp Sci & Engn, Coimbatore 641048, Tamil Nadu, India
[2] Vignans Fdn Sci Technol & Res, Dept Informat Technol, Guntur 522213, Andhra Pradesh, India
[3] Sri Shakthi Inst Engn & Technol, Dept Informat Technol, Coimbatore 641062, Tamil Nadu, India
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[5] Taif Univ, Dept Comp Sci, Coll Comp & Informat Technol, At Taif 21944, Saudi Arabia
[6] Shaqra Univ, Dept Comp Sci, Community Coll Dwadmi, Shaqraa 11961, Saudi Arabia
[7] Bahauddin Zakariya Univ, Dept Informat Technol, Multan 60000, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 02期
关键词
Intrusion detection; UAV networks; reinforcement learning; deep learning; parameter optimization; ALGORITHM;
D O I
10.32604/cmc.2022.020066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance and reduce the false alarms generated by IDS, several researchers have employed Machine Learning (ML) and Deep Learning (DL) algorithms to address the intrusion detection problem. In this view, the current research article presents a deep reinforcement learning technique, optimized by Black Widow Optimization (DRL-BWO) algorithm, for UAV networks. In addition, DRL involves an improved reinforcement learning-based Deep Belief Network (DBN) for intrusion detection. For parameter optimization of DRL technique, BWO algorithm is applied. It helps in improving the intrusion detection performance of UAV networks. An extensive set of experimental analysis was performed to highlight the supremacy of the proposed model. From the simulation values, it is evident that the proposed method is appropriate as it attained high precision, recall, F-measure, and accuracy values such as 0.985, 0.993, 0.988, and 0.989 respectively.
引用
收藏
页码:2639 / 2653
页数:15
相关论文
共 24 条
[1]   An opportunistic data dissemination for autonomous vehicles communication [J].
Abbas, Asad ;
Krichen, Moez ;
Alroobaea, Roobaea ;
Malebary, Sharaf ;
Tariq, Usman ;
Jalil Piran, Md. .
SOFT COMPUTING, 2021, 25 (18) :11899-11912
[2]   An Intrusion Detection System on Ping of Death Attacks in IoT Networks [J].
Abdollahi, Asrin ;
Fathi, Mohammad .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (04) :2057-2070
[3]   A Neural Network-Based Learning Algorithm for Intrusion Detection Systems [J].
Ahmed, Hassan I. ;
Elfeshawy, Nawal A. ;
Elzoghdy, S. F. ;
El-sayed, Hala S. ;
Faragallah, Osama S. .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) :3097-3112
[4]   An overview of security and privacy in smart cities' IoT communications [J].
Al-Turjman, Fadi ;
Zahmatkesh, Hadi ;
Shahroze, Ramiz .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[5]   Network Anomaly Intrusion Detection Using a Nonparametric Bayesian Approach and Feature Selection [J].
Alhakami, Wajdi ;
Alharbi, Abdullah ;
Bourouis, Sami ;
Alroobaea, Roobaea ;
Bouguila, Nizar .
IEEE ACCESS, 2019, 7 :52181-52190
[6]  
Aroosa S. S., 2021, WIRELESS COMMUNICATI, V2021, P1
[7]  
Dai Liang, 2019, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). Proceedings, P495, DOI 10.1109/CISCE.2019.00115
[8]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[9]   Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow [J].
Djenouri, Youcef ;
Belhadi, Asma ;
Lin, Jerry Chun-Wei ;
Cano, Alberto .
IEEE ACCESS, 2019, 7 :10015-10027
[10]   A fast learning algorithm for deep belief nets [J].
Hinton, Geoffrey E. ;
Osindero, Simon ;
Teh, Yee-Whye .
NEURAL COMPUTATION, 2006, 18 (07) :1527-1554