Deep Reinforcement Learning Approach for Cyberattack Detection

Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty;

Abstract


Recently, there has been a growing concern regarding the detrimental effects of cyberattacks on both infrastructure and users. Conventional safety measures, such as encryption, firewalls, and intrusion detection, are inadequate to safeguard cyber systems against emerging and evolving threats. To address this issue, researchers have turned to reinforcement learning (RL) as a potential solution for complex decision-making problems in cybersecurity. However, the application of RL faces various obstacles, including a lack of suitable training data, dynamic attack scenarios, and challenges in modeling real-world complexities. This paper suggests applying deep reinforcement learning (DRL), a deep framework, to simulate mali-cious cyberattacks and enhance cybersecurity. Our framework utilizes an agent-based model that is capable of continuous learning and adaptation within a dynamic network security environment. The agent determines the most optimal course of action based on the network’s state and the corresponding rewards received for its decisions. We present the outcomes of our experimentation with the application of DRL on a specific model, double deep Q-network (DDQN), utilizing policy gradient (PG) on three distinct datasets: NSL-KDD, CIC-IDS-2018, and AWID. Our research demonstrates that DRL can effectively improve cyberattack detection outcomes through our model and specific parameter adjustments.


Other data

Title Deep Reinforcement Learning Approach for Cyberattack Detection
Authors Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty 
Keywords cyber defense;cyberattacks;deep reinforcement learning (DRL);double deep Q-network (DDQN);network security;policy gradient (PG)
Issue Date 1-Jan-2024
Journal International journal of online and biomedical engineering 
Volume 20
Issue 5
ISSN 2626-8493
DOI 10.3991/ijoe.v20i05.48229
Scopus ID 2-s2.0-85188469295

Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check



Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.