Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 175

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_TDMA-12-1_003

تاریخ نمایه سازی: 28 فروردین 1402

Abstract:

Distributed Denial of Service (DDoS) attacks are a significant threat, especially for the Internet of Things (IoT). One approach that is practically used to protect the network against DDoS attacks is the honeypot. This study proposes a new adversarial Deep Reinforcement Learning (DRL) model that can deliver better performance using experiences gained from the environment. Further regulation of the agent's behavior is made with an adversarial goal. In such an environment, an attempt is made to increase the difficulty level of predictions deliberately. In this technique, the simulated environment acts as a second agent against the primary environment. To evaluate the performance of the proposed method, we compare it with two well-known types of DDoS attacks, including NetBIOS and LDAP. Our modeling overcomes the previous models in terms of weight accuracy criteria (> ۰.۹۸) and F-score (> ۰.۹۷). The proposed adversarial RL model can be especially suitable for highly unbalanced datasets. Another advantage of our modeling is that there is no need to segregate the reward function.

Authors

Abbasgholi Pashaei

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mohammad Esmaeil Akbari

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mina Zolfy Lighvan

Department of Electrical and Computer Engineering Faculty, Tabriz University, Tabriz, Iran

Asghar Charmin

Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Tian, W., Du, M., Ji, X., Liu, G., Dai, Y. ...
  • Harikrishnan, V., Sanket, H.S., Sahazeer, K.S., Vinay, S. and Honnavalli, ...
  • Sethi, Y. V. Madhav, R. Kumar, and P. Bera, “Attention ...
  • Lopez-Martin, M., Carro, B., & Sanchez-Esguevillas, A. (۲۰۲۰). “Application of ...
  • Alavizadeh, H., Jang-Jaccard, J., & Alavizadeh, H. (۲۰۲۱). “Deep Q-Learning ...
  • Pashaei, M. E. Akbari, M. Zolfy Lighvan, and A. Charmin۴, ...
  • Yang, Z., Liu, X., Li, T., Wu, D., Wang, J., ...
  • Imran, M., Haider, N., Shoaib, M. and Razzak, I., ۲۰۲۲. ...
  • Roy, S., Li, J., Choi, B.J. and Bai, Y., ۲۰۲۲. ...
  • Teixeira, D., Malta, S. and Pinto, P., ۲۰۲۲. “A Vote-Based ...
  • Liu, H. Wang, M. Peng, J. Guan, J. Xu, and ...
  • Xu, Z. Su, and R. Lu, “Game theory and reinforcement ...
  • Gupta, G.P., ۲۰۲۲. “Intrusion Detection Framework Using an Improved Deep ...
  • Praveena, V., Vijayaraj, A., Chinnasamy, P., Ali, I., Alroobaea, R., ...
  • Naghdehforoushha, M., Dehghan Takht Fooladi, M., Rezvani, M.H., Gilanian Sadeghi, ...
  • Ma, X., & Shi, W. (۲۰۲۰). “Aesmote: Adversarial reinforcement learning ...
  • Sutton RS,”Barto AG. Reinforcement learning: An introduction”. MIT press; ۲۰۱۸ ...
  • Holgado, V. A. Villagrá, and L. Vazquez, “Real-time multistep attack ...
  • T. Nguyen and V. J. Reddi, “Deep reinforcement learning for ...
  • Pashaei, A., Akbari, M. E., Lighvan, M. Z., & Charmin, ...
  • Hu and J. Li, “Shifting deep reinforcement learning algorithm towards ...
  • Caminero, G., Lopez-Martin, M., &Carro, B. “Adversarial environment reinforcement learning ...
  • Suwannalai, Ekachai, and Chantri Polprasert. “Network Intrusion Detection Systems Using ...
  • PACHECO, Yulexis et SUN, “Weiqing. Adversarial Machine Learning: A Comparative ...
  • Ferrag MA, Shu L, Djallel H, Choo KK. “Deep learning-based ...
  • Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA. “Developing realistic ...
  • Hussain, Y.S., ۲۰۲۰. “Network Intrusion Detection for Distributed Denial-of-Service (DDoS) ...
  • Kshirsagar, D. and Kumar, S., ۲۰۲۲. “A feature reduction based ...
  • A. R. Al Amin, S. Shetty, L. Njilla, D. K. ...
  • Sethi, E. S. Rupesh, R. Kumar, P. Bera and Y. ...
  • Otoum, B. Kantarci and H. Mouftah, "Empowering Reinforcement Learning on ...
  • Veluchamy, S., & Kathavarayan, R. S. (۲۰۲۱). “Deep reinforcement learning ...
  • Wang, Q. Pei, J. Wang, G. Tang, Y. Zhang, and ...
  • Dowling, S., Schukat, M., & Barrett, E. (۲۰۱۸, September). “Using ...
  • Dang QV, Vo TH. “Reinforcement learning for the problem of ...
  • Zhao D, Wang H, Shao K, Zhu Y. “Deep reinforcement ...
  • نمایش کامل مراجع