Deep Reinforcement Learning based Ensemble Model for Intrusion Detection System

نویسندگان

چکیده

Powered by advancements in information and In-ternet technologies, there has been a rapid development network-based applications. Meanwhile, it is recognized that more attention needs to be paid the issue of cybersecurity. The security network environment plays vital role stable functioning society. Cybersecurity research become active lately. Researchers have proposed several approaches protect network. Among them, broadly practised approach intrusion detection system (IDS). This work suggested potential value reinforcement learning building systems at packet-level. A novel embedding proposed, namely image embedding, encode traffics. Utilizing en-coding raw traffic, which are difficult tackle machine models, can converted images. Thus, experiments applied convolutional neural networks. In addition, packets embedded images arranged time order. this way, integrate flow statistics with packet convert tasks image-associated tasks. experiment, Deep Q-Learning algorithm was selected for ensemble 1D-CNN CNN designed training module an interaction module. Experiments results indicate RL-image-based attain high performance on DDoS traffic provided DDoS2019 outperforms other traditional deep approaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-agent Reinforcement Learning for Intrusion Detection

Intrusion Detection has been investigated for many years and the field has matured. Nevertheless, there are still important challenges, e.g., how an IDS can detect new and complex distributed attacks. To tackle these problems, we propose a distributed Reinforcement Learning (RL) approach in a hierarchical architecture of network sensor agents. Each network sensor agent learns to interpret local...

متن کامل

Ensemble Classifiers for Network Intrusion Detection System

Two of the major challenges in designing anomaly intrusion detection are to maximize detection accuracy and to minimize false alarm rate. In addressing this issue, this paper proposes an ensemble of one-class classifiers where each adopts different learning paradigms. The techniques deployed in this ensemble model are; Linear Genetic Programming (LGP), Adaptive Neural Fuzzy Inference System (AN...

متن کامل

Ensemble Voting System for Anomaly Based Network Intrusion Detection

The growing dependence of modern society on telecommunication and information networks has become inevitable. Therefore, the security aspects of such networks play a strategic role in ensuring protection of data against misuse. Intrusion Detection systems (IDS) are meant to detect intruders who elude the “first line” protection. Data mining techniques are being used for building effective IDS. ...

متن کامل

A Deep Learning Approach for Network Intrusion Detection System

A Network Intrusion Detection System (NIDS) helps system administrators to detect network security breaches in their organization. However, many challenges arise while developing a flexible and effective NIDS for unforeseen and unpredictable attacks. In this work, we propose a deep learning based approach to implement such an effective and flexible NIDS. We use Self-taught Learning (STL), a dee...

متن کامل

Operation Scheduling of MGs Based on Deep Reinforcement Learning Algorithm

: In this paper, the operation scheduling of Microgrids (MGs), including Distributed Energy Resources (DERs) and Energy Storage Systems (ESSs), is proposed using a Deep Reinforcement Learning (DRL) based approach. Due to the dynamic characteristic of the problem, it firstly is formulated as a Markov Decision Process (MDP). Next, Deep Deterministic Policy Gradient (DDPG) algorithm is presented t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2022

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2022.01304100