DDoS Traffic Control Using Transfer Learning DQN With Structure Information

被引:5
作者
Xia, Shi-Ming [1 ]
Zhang, Lei [1 ]
Bai, Wei [1 ]
Zhou, Xing-Yu [1 ]
Pan, Zhi-Song [1 ]
机构
[1] PLA Army Engn Univ, Coll Command & Informat Syst, Nanjing 210007, Jiangsu, Peoples R China
关键词
Distributed denial of service; router throttling; deep network; team structure information; multiagent reinforcement learning; progressive transfer learning; REINFORCEMENT; ATTACKS; FRAMEWORK;
D O I
10.1109/ACCESS.2019.2923993
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A DDoS attack is one of the most serious threats to the current Internet. The Router throttling is a popular method to response against DDoS attacks. Currently, coordinated team learning (CTL) has adopted tile coding for continuous state representation and strategy learning. It is suitable for this distributed challenge but lacks robustness. Our first contribution is that we adapt deep network as function approximation for continuous state representation, as a deep reinforcement learning approach is robust in many different Atari games with a little modification of the learning architecture. Furthermore, current multiagent router throttling methods only consider traffic-reading information. Therefore, for a homogeneous team scenario, all agents can share parameters with the same deep network. However, for heterogeneous team scenarios, if all agents still share one deep network, the learning policy may not be sufficiently ideal. Our second contribution is that we add team structure information so that all agents can still share one deep network. However, deep reinforcement learning is a considerably time-consuming task. Transfer learning is an appropriate method because learning policy in a simple scenario allows us to transfer the policy to other different and even complex scenarios. For transfer learning regarding the DDoS control problem, we propose a progressive transfer learning approach, which is our third contribution. Therefore, we can learn a better policy with less time consumption. Moreover, with progressive transfer learning, we can promote our method in a more complex environment. The experimental results validate that our three contributions truly achieve better performance than the existing methods.
引用
收藏
页码:81481 / 81493
页数:13
相关论文
共 50 条
[1]   MF (minority first) scheme for defeating distributed denial of service attacks [J].
Ahn, G ;
Kim, K ;
Jang, J .
EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, :1233-1238
[2]  
[Anonymous], BIOGEOSCIENCES
[3]  
[Anonymous], 2013, Playing atari with deep reinforcement learning
[4]  
[Anonymous], ARXIV14037371
[5]  
[Anonymous], 2009, P 26 ANN INT C MACHI, DOI DOI 10.1145/1553374.1553380
[6]  
[Anonymous], 2018, REINFORCEMENT LEARNI
[7]  
[Anonymous], 2000, TECH REP
[8]  
Baird L., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P30
[9]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[10]  
Chu Xiangxiang, 2017, ARXIV171000336