Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection

被引:0
|
作者
Otoum, Safa [1 ]
Kantarci, Burak [1 ]
Mouftah, Hussein [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
基金
加拿大自然科学与工程研究理事会;
关键词
Big data; intrusion detection; wireless sensor networks; reinforcement learning; machine learning; Q-learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor and actuator networks are widely adopted in various applications such as critical infrastructure monitoring where sensory data in big volumes and velocity are prone to security vulnerabilities for the network and the monitored infrastructure. Despite the vulnerabilities of the big data phenomenon, intelligent data analytics technique can enable the analysis of huge amount of data and identification of intrusive behavior in real time. The main performance targets for any Intrusion Detection System (IDS) involve accuracy, detection, precision, F-1 score and Receiver Operating Characteristics. Pursuant to these, this paper proposes a big data-driven IDS approach in Wireless Sensor Networks by harnessing reinforcement learning techniques on a hybrid IDS framework. We study the performance of RL-IDS and compare it to the previously proposed Adaptive Machine Learning-based IDS (AML-IDS) namely the Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS). The experimental results show that RL-IDS can achieve approximate to 100% success in detection, accuracy and precision- recall rates whereas its predecessor ASCH-IDS performs with an accuracy level that is slightly above 99%.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] FC-Trans: Deep learning methods for network intrusion detection in big data environments
    Zhu, Yuedi
    Wang, Yong
    Zhou, Lin
    Xia, Yuan
    COMPUTERS & SECURITY, 2025, 154
  • [22] Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach
    Mahzad Mahdavisharif
    Shahram Jamali
    Reza Fotohi
    Journal of Grid Computing, 2021, 19
  • [23] A Distributed Intelligent Intrusion Detection System based on Parallel Machine Learning and Big Data Analysis
    Louati, Faten
    Ktata, Farah Barika
    Ben Amor, Ikram Amous
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS (SENSORNETS), 2021, : 152 - 157
  • [24] Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
    Alaketu, Muyideen Ayodeji
    Oguntimilehin, Abiodun
    Olatunji, Kehinde Adebola
    Abiola, Oluwatoyin Bunmi
    Badeji-Ajisafe, Bukola
    Akinduyite, Christiana Olanike
    Obamiyi, Stephen Eyitayo
    Babalola, Gbemisola Olutosin
    Okebule, Toyin
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (02) : 326 - 337
  • [25] Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning
    Choi, Seul-Gi
    Cho, Sung-Bae
    INTERNATIONAL JOINT CONFERENCE SOCO'17- CISIS'17-ICEUTE'17 PROCEEDINGS, 2018, 649 : 547 - 556
  • [26] Application of deep reinforcement learning to intrusion detection for supervised problems
    Lopez-Martin, Manuel
    Carro, Belen
    Sanchez-Esguevillas, Antonio
    EXPERT SYSTEMS WITH APPLICATIONS, 2020, 141
  • [27] Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning
    Tiyas, Indah Yulia Prafitaning
    Barakbah, Ali Ridho
    Harsono, Tri
    Sudarsono, Amang
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2014, 2 (01) : 39 - 49
  • [28] Feature Selection with Deep Reinforcement Learning for Intrusion Detection System
    Priya S.
    Pradeep Mohan Kumar K.
    Computer Systems Science and Engineering, 2023, 46 (03): : 3339 - 3353
  • [29] Intelligent intrusion detection based on fuzzy Big Data classification
    Farah Jemili
    Cluster Computing, 2023, 26 : 3719 - 3736
  • [30] Intelligent intrusion detection based on fuzzy Big Data classification
    Jemili, Farah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3719 - 3736