Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning

被引:115
作者
Dong, Shi [1 ,2 ,3 ]
Xia, Yuanjun [1 ,2 ]
Peng, Tao [2 ]
机构
[1] Zhoukou Normal Univ, Sch Comp Sci & Technol, Zhoukou 466001, Henan, Peoples R China
[2] Wuhan Text Univ, Sch Comp & Artificial Intelligence, Wuhan 430200, Hubei, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 04期
关键词
Feature extraction; Reinforcement learning; Payloads; Training; Machine learning; Internet; Deep learning; Abnormal traffic detection; semi-supervised learning; machine learning; deep reinforcement learning; INTRUSION DETECTION SYSTEM; MANAGEMENT;
D O I
10.1109/TNSM.2021.3120804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of Internet technology has brought great convenience to our production life, and the ensuing security problems have become increasingly prominent. These problems threaten users' privacy and pose significant security risks to the normal conduct of many aspects of society, such as politics, economy, culture, and people's livelihood. The growth of the information transmission rate expands the scope of attacks and provides a more attack environment for intruders. Abnormal detection is an effective security protection technology that can monitor network transmission in real-time, effectively sense external attacks, and provide response decisions for relevant managers. The development of machine learning has also led to the development of abnormal traffic detection technology. The goal has been to use powerful and fast learning algorithms to deal with changing threats and respond in real-time. Most of the current abnormal detection research is based on simulation, using public and well-known datasets. On the one hand, the dataset contains high-dimensional massive data, which traditional machine learning methods cannot be processed. On the other hand, the labeled data scale is far behind the application requirements, and the dataset's labels are all manually labeled, so the labeling cost is exceptionally high. This paper proposes a semi-supervised Double Deep Q-Network (SSDDQN)-based optimization method for network abnormal traffic detection, mainly based on Double Deep Q-Network (DDQN), a representative of Deep Reinforcement Learning algorithm. In SSDDQN, the current network first adopts the autoencoder to reconstruct the traffic features and then uses a deep neural network as a classifier. The target network first uses the unsupervised learning algorithm K-Means clustering and then uses deep neural network prediction. The experiment uses NSL-KDD and AWID datasets for training and testing and performs a comprehensive comparison with existing machine learning models. The experimental results show that SSDDQN has certain advantages in time complexity and achieved good results in various evaluation metrics.
引用
收藏
页码:4197 / 4212
页数:16
相关论文
共 61 条
[31]   Applications of Deep Reinforcement Learning in Communications and Networking: A Survey [J].
Luong, Nguyen Cong ;
Hoang, Dinh Thai ;
Gong, Shimin ;
Niyato, Dusit ;
Wang, Ping ;
Liang, Ying-Chang ;
Kim, Dong In .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3133-3174
[32]   Comparative Analysis of ML Classifiers for Network Intrusion Detection [J].
Mahfouz, Ahmed M. ;
Venugopal, Deepak ;
Shiva, Sajjan G. .
FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, 2020, 1027 :193-207
[33]  
Mnih V., 2013, PLAYING ATARI DEEP R
[34]   Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey [J].
Pacheco, Fannia ;
Exposito, Ernesto ;
Gineste, Mathieu ;
Baudoin, Cedric ;
Aguilar, Jose .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1988-2014
[35]   Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data [J].
Phong Thanh Nguyen ;
Vy Dang Bich Huynh ;
Khoa Dang Vo ;
Phuong Thanh Phan ;
Elhoseny, Mohamed ;
Dac-Nhuong Le .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (03) :2555-2571
[36]   A Survey on Deep Learning: Algorithms, Techniques, and Applications [J].
Pouyanfar, Samira ;
Sadiq, Saad ;
Yan, Yilin ;
Tian, Haiman ;
Tao, Yudong ;
Reyes, Maria Presa ;
Shyu, Mei-Ling ;
Chen, Shu-Ching ;
Iyengar, S. S. .
ACM COMPUTING SURVEYS, 2019, 51 (05)
[37]   Detecting weak dependence in computer network traffic patterns by using higher criticism [J].
Price-Williams, Matthew ;
Heard, Nick ;
Rubin-Delanchy, Patrick .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES C-APPLIED STATISTICS, 2019, 68 (03) :641-655
[38]  
Qiang Duan, 2020, 2020 IEEE 6th International Conference on Computer and Communications (ICCC), P830, DOI 10.1109/ICCC51575.2020.9345293
[39]   Anomaly intrusion detection method based on HMM [J].
Qiao, Y ;
Xin, XW ;
Bin, Y ;
Ge, S .
ELECTRONICS LETTERS, 2002, 38 (13) :663-664
[40]   Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks [J].
Safaldin, Mukaram ;
Otair, Mohammed ;
Abualigah, Laith .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :1559-1576