Deep Reinforcement Learning Approach for Cyberattack Detection
Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty;
Abstract
Recently, there has been a growing concern regarding the detrimental effects of cyberattacks on both infrastructure and users. Conventional safety measures, such as encryption, firewalls, and intrusion detection, are inadequate to safeguard cyber systems against emerging and evolving threats. To address this issue, researchers have turned to reinforcement learning (RL) as a potential solution for complex decision-making problems in cybersecurity. However, the application of RL faces various obstacles, including a lack of suitable training data, dynamic attack scenarios, and challenges in modeling real-world complexities. This paper suggests applying deep reinforcement learning (DRL), a deep framework, to simulate mali-cious cyberattacks and enhance cybersecurity. Our framework utilizes an agent-based model that is capable of continuous learning and adaptation within a dynamic network security environment. The agent determines the most optimal course of action based on the network’s state and the corresponding rewards received for its decisions. We present the outcomes of our experimentation with the application of DRL on a specific model, double deep Q-network (DDQN), utilizing policy gradient (PG) on three distinct datasets: NSL-KDD, CIC-IDS-2018, and AWID. Our research demonstrates that DRL can effectively improve cyberattack detection outcomes through our model and specific parameter adjustments.
Other data
| Title | Deep Reinforcement Learning Approach for Cyberattack Detection | Authors | Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty | Keywords | cyber defense;cyberattacks;deep reinforcement learning (DRL);double deep Q-network (DDQN);network security;policy gradient (PG) | Issue Date | 1-Jan-2024 | Journal | International journal of online and biomedical engineering | Volume | 20 | Issue | 5 | ISSN | 2626-8493 | DOI | 10.3991/ijoe.v20i05.48229 | Scopus ID | 2-s2.0-85188469295 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.