Cyber-security and reinforcement learning - A brief survey

被引:24
|
作者
Adawadkar, Amrin Maria Khan [1 ,2 ]
Kulkarni, Nilima [2 ]
机构
[1] IBM India Pvt Ltd, Bangalore, Karnataka, India
[2] MITADT Univ, Dept Comp Sci & Engn, MITSOE, Pune, Maharashtra, India
关键词
Reinforcement learning; IoT; IAM; IDS/IPS; Cybersecurity; ML; Systematic literature review; AUTHENTICATION;
D O I
10.1016/j.engappai.2022.105116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a comprehensive literature review on Reinforcement Learning (RL) techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Internet of Things (IoT) and Identity and Access Management (IAM). This study reviews scientific documents such as journals and articles, from 2010 to 2021, extracted from the Science Direct, ACM, IEEEXplore, and Springer database. Most of the research articles published in 2020 and 2021, for cybersecurity and RL are for IDS classifiers and resource optimization in IoTs. Some datasets used for training RL-based IDS algorithms are NSL-KDD, CICIDS, and AWID. There are few datasets and publications for IAM. The few that exist focus on the physical layer authentication. The current state of the art lacks standard evaluation criteria, however, we have identified parameters like detection rate, precision, and accuracy which can be used to compare the algorithms employing RL. This paper is suitable for new researchers, students, and beginners in the field of RL who want to learn about the field and identify problem areas.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A Survey on the Applications of Semi-supervised Learning to Cyber-security
    Mvula, Paul Kiyambu
    Branco, Paula
    Jourdan, Guy-Vincent
    Viktor, Herna Lydia
    ACM COMPUTING SURVEYS, 2024, 56 (10)
  • [2] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    ENERGIES, 2021, 14 (01)
  • [3] A Survey of Cyber-Security Awareness in Saudi Arabia
    Alotaibi, Faisal
    Furnell, Steven
    Stengel, Ingo
    Papadaki, Maria
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 154 - 158
  • [4] Cyber-security in smart grid: Survey and challenges
    El Mrabet, Zakaria
    Kaabouch, Naima
    El Ghazi, Hassan
    El Ghazi, Hamid
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 : 469 - 482
  • [5] Cyber-Security Profiles of European Users: A Survey
    Zamfirescu, Raisa-Gabriela
    Rughinis, Cosima
    Hosszu, Alexandra
    Cristea, Darie
    2019 22ND INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2019, : 438 - 442
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] Railway Cyber-Security in the Era of Interconnected Systems: A Survey
    Soderi, Simone
    Masti, Daniele
    Lun, Yuriy Zacchia
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 6764 - 6779
  • [8] A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs)
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 6240 - 6259
  • [9] Challenges on Digital Cyber-Security and Network Forensics: A Survey
    Al-Sanjary, Omar Ismael
    Ahmed, Ahmed Abdullah
    Mohammed, M. N.
    Aik, Kevin Loo Teow
    ADVANCES ON INTELLIGENT INFORMATICS AND COMPUTING: HEALTH INFORMATICS, INTELLIGENT SYSTEMS, DATA SCIENCE AND SMART COMPUTING, 2022, 127 : 524 - 537
  • [10] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568