Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning

被引:115
作者
Dong, Shi [1 ,2 ,3 ]
Xia, Yuanjun [1 ,2 ]
Peng, Tao [2 ]
机构
[1] Zhoukou Normal Univ, Sch Comp Sci & Technol, Zhoukou 466001, Henan, Peoples R China
[2] Wuhan Text Univ, Sch Comp & Artificial Intelligence, Wuhan 430200, Hubei, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 04期
关键词
Feature extraction; Reinforcement learning; Payloads; Training; Machine learning; Internet; Deep learning; Abnormal traffic detection; semi-supervised learning; machine learning; deep reinforcement learning; INTRUSION DETECTION SYSTEM; MANAGEMENT;
D O I
10.1109/TNSM.2021.3120804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of Internet technology has brought great convenience to our production life, and the ensuing security problems have become increasingly prominent. These problems threaten users' privacy and pose significant security risks to the normal conduct of many aspects of society, such as politics, economy, culture, and people's livelihood. The growth of the information transmission rate expands the scope of attacks and provides a more attack environment for intruders. Abnormal detection is an effective security protection technology that can monitor network transmission in real-time, effectively sense external attacks, and provide response decisions for relevant managers. The development of machine learning has also led to the development of abnormal traffic detection technology. The goal has been to use powerful and fast learning algorithms to deal with changing threats and respond in real-time. Most of the current abnormal detection research is based on simulation, using public and well-known datasets. On the one hand, the dataset contains high-dimensional massive data, which traditional machine learning methods cannot be processed. On the other hand, the labeled data scale is far behind the application requirements, and the dataset's labels are all manually labeled, so the labeling cost is exceptionally high. This paper proposes a semi-supervised Double Deep Q-Network (SSDDQN)-based optimization method for network abnormal traffic detection, mainly based on Double Deep Q-Network (DDQN), a representative of Deep Reinforcement Learning algorithm. In SSDDQN, the current network first adopts the autoencoder to reconstruct the traffic features and then uses a deep neural network as a classifier. The target network first uses the unsupervised learning algorithm K-Means clustering and then uses deep neural network prediction. The experiment uses NSL-KDD and AWID datasets for training and testing and performs a comprehensive comparison with existing machine learning models. The experimental results show that SSDDQN has certain advantages in time complexity and achieved good results in various evaluation metrics.
引用
收藏
页码:4197 / 4212
页数:16
相关论文
共 61 条
[1]   A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data [J].
Agarap, Abien Fred M. .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :26-30
[2]   The k-means Algorithm: A Comprehensive Survey and Performance Evaluation [J].
Ahmed, Mohiuddin ;
Seraj, Raihan ;
Islam, Syed Mohammed Shamsul .
ELECTRONICS, 2020, 9 (08) :1-12
[3]   IoT Traffic Management and Integration in the QoS Supported Network [J].
Al-Shammari, Basim K. J. ;
Al-Aboody, Nadia ;
Al-Raweshidy, Hamed S. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :352-370
[4]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[5]  
AMINANTO ME, 2017, P IEEE IWBIS, P99
[6]  
[Anonymous], 1999, KDD Cup 1999 Data
[7]   Deep Reinforcement Learning A brief survey [J].
Arulkumaran, Kai ;
Deisenroth, Marc Peter ;
Brundage, Miles ;
Bharath, Anil Anthony .
IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) :26-38
[8]   Malware Detection in Android Systems with Traditional Machine Learning Models: A Survey [J].
Bayazit, Esra Calik ;
Sahingoz, Ozgur Koray ;
Dogan, Buket .
2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, :374-381
[9]  
Benaddi K., 2019, P INT WIR C, P73
[10]  
Bhandari S., 2020, P 3 INT WORKSH SYST, P19, DOI DOI 10.1145/3391812.3396274