Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection

被引:100
作者
Alavizadeh, Hooman [1 ]
Alavizadeh, Hootan [2 ]
Jang-Jaccard, Julian [3 ]
机构
[1] Univ New South Wales, UNSW Inst Cyber Secur, Canberra, ACT 2612, Australia
[2] Imam Reza Int Univ, Comp Engn Dept, Mashhad 55391735, Razavi Khorasan, Iran
[3] Massey Univ, Sch Informat Technol & Elect Engn, Cybersecur Lab, Auckland 0632, New Zealand
关键词
network security; deep Q networks; deep learning; reinforcement learning; network intrusion detection; NSL-KDD; artificial intelligence; ENVIRONMENT; ALGORITHM; MODEL;
D O I
10.3390/computers11030041
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of learning to make decisions without the knowledge of human experts. Several reinforcement learning methods (e.g., Markov) for automated network intrusion tasks have been proposed in recent years. In this paper, we introduce a new generation of the network intrusion detection method, which combines a Q-learning based reinforcement learning with a deep feed forward neural network method for network intrusion detection. Our proposed Deep Q-Learning (DQL) model provides an ongoing auto-learning capability for a network environment that can detect different types of network intrusions using an automated trial-error approach and continuously enhance its detection capabilities. We provide the details of fine-tuning different hyperparameters involved in the DQL model for more effective self-learning. According to our extensive experimental results based on the NSL-KDD dataset, we confirm that the lower discount factor, which is set as 0.001 under 250 episodes of training, yields the best performance results. Our experimental results also show that our proposed DQL is highly effective in detecting different intrusion classes and outperforms other similar machine learning approaches.
引用
收藏
页数:19
相关论文
共 40 条
[1]   Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud [J].
Alavizadeh, Hootan ;
Alavizadeh, Hooman ;
Jang-Jaccard, Julian .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1277-1285
[2]  
Alavizadeh H., 2019, PROC INT C INF SECUR, P150
[3]   Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud [J].
Alavizadeh, Hooman ;
Hong, Jin B. ;
Kim, Dong Seong ;
Jang-Jaccard, Julian .
COMPUTERS & SECURITY, 2021, 102 (102)
[4]  
Bodeau D, 2017, CYBER RESILIENCY DES, P1
[5]  
Brundage M., 2018, ARXIV180207228
[6]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[7]  
Cappart Q., 2020, ARXIV200601610
[8]   Internet of Things: A survey on machine learning-based intrusion detection approaches [J].
da Costa, Kelton A. P. ;
Papa, Joao P. ;
Lisboa, Celso O. ;
Munoz, Roberto ;
de Albuquerque, Victor Hugo C. .
COMPUTER NETWORKS, 2019, 151 :147-157
[9]   Reinforcement Learning for the Problem of Detecting Intrusion in a Computer System [J].
Dang, Quang-Vinh ;
Vo, Thanh-Hai .
PROCEEDINGS OF SIXTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2021), VOL 2, 2022, 236 :755-762
[10]   A multi-attribute decision model for intrusion response system [J].
Fessi, B. A. ;
Benabdallah, S. ;
Boudriga, N. ;
Hamdi, M. .
INFORMATION SCIENCES, 2014, 270 :237-254