Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 191

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_TDMA-12-1_003

تاریخ نمایه سازی: 28 فروردین 1402

چکیده مقاله:

Distributed Denial of Service (DDoS) attacks are a significant threat, especially for the Internet of Things (IoT). One approach that is practically used to protect the network against DDoS attacks is the honeypot. This study proposes a new adversarial Deep Reinforcement Learning (DRL) model that can deliver better performance using experiences gained from the environment. Further regulation of the agent's behavior is made with an adversarial goal. In such an environment, an attempt is made to increase the difficulty level of predictions deliberately. In this technique, the simulated environment acts as a second agent against the primary environment. To evaluate the performance of the proposed method, we compare it with two well-known types of DDoS attacks, including NetBIOS and LDAP. Our modeling overcomes the previous models in terms of weight accuracy criteria (> ۰.۹۸) and F-score (> ۰.۹۷). The proposed adversarial RL model can be especially suitable for highly unbalanced datasets. Another advantage of our modeling is that there is no need to segregate the reward function.

نویسندگان

Abbasgholi Pashaei

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mohammad Esmaeil Akbari

Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran

Mina Zolfy Lighvan

Department of Electrical and Computer Engineering Faculty, Tabriz University, Tabriz, Iran

Asghar Charmin

Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Tian, W., Du, M., Ji, X., Liu, G., Dai, Y. ...
  • Harikrishnan, V., Sanket, H.S., Sahazeer, K.S., Vinay, S. and Honnavalli, ...
  • Sethi, Y. V. Madhav, R. Kumar, and P. Bera, “Attention ...
  • Lopez-Martin, M., Carro, B., & Sanchez-Esguevillas, A. (۲۰۲۰). “Application of ...
  • Alavizadeh, H., Jang-Jaccard, J., & Alavizadeh, H. (۲۰۲۱). “Deep Q-Learning ...
  • Pashaei, M. E. Akbari, M. Zolfy Lighvan, and A. Charmin۴, ...
  • Yang, Z., Liu, X., Li, T., Wu, D., Wang, J., ...
  • Imran, M., Haider, N., Shoaib, M. and Razzak, I., ۲۰۲۲. ...
  • Roy, S., Li, J., Choi, B.J. and Bai, Y., ۲۰۲۲. ...
  • Teixeira, D., Malta, S. and Pinto, P., ۲۰۲۲. “A Vote-Based ...
  • Liu, H. Wang, M. Peng, J. Guan, J. Xu, and ...
  • Xu, Z. Su, and R. Lu, “Game theory and reinforcement ...
  • Gupta, G.P., ۲۰۲۲. “Intrusion Detection Framework Using an Improved Deep ...
  • Praveena, V., Vijayaraj, A., Chinnasamy, P., Ali, I., Alroobaea, R., ...
  • Naghdehforoushha, M., Dehghan Takht Fooladi, M., Rezvani, M.H., Gilanian Sadeghi, ...
  • Ma, X., & Shi, W. (۲۰۲۰). “Aesmote: Adversarial reinforcement learning ...
  • Sutton RS,”Barto AG. Reinforcement learning: An introduction”. MIT press; ۲۰۱۸ ...
  • Holgado, V. A. Villagrá, and L. Vazquez, “Real-time multistep attack ...
  • T. Nguyen and V. J. Reddi, “Deep reinforcement learning for ...
  • Pashaei, A., Akbari, M. E., Lighvan, M. Z., & Charmin, ...
  • Hu and J. Li, “Shifting deep reinforcement learning algorithm towards ...
  • Caminero, G., Lopez-Martin, M., &Carro, B. “Adversarial environment reinforcement learning ...
  • Suwannalai, Ekachai, and Chantri Polprasert. “Network Intrusion Detection Systems Using ...
  • PACHECO, Yulexis et SUN, “Weiqing. Adversarial Machine Learning: A Comparative ...
  • Ferrag MA, Shu L, Djallel H, Choo KK. “Deep learning-based ...
  • Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA. “Developing realistic ...
  • Hussain, Y.S., ۲۰۲۰. “Network Intrusion Detection for Distributed Denial-of-Service (DDoS) ...
  • Kshirsagar, D. and Kumar, S., ۲۰۲۲. “A feature reduction based ...
  • A. R. Al Amin, S. Shetty, L. Njilla, D. K. ...
  • Sethi, E. S. Rupesh, R. Kumar, P. Bera and Y. ...
  • Otoum, B. Kantarci and H. Mouftah, "Empowering Reinforcement Learning on ...
  • Veluchamy, S., & Kathavarayan, R. S. (۲۰۲۱). “Deep reinforcement learning ...
  • Wang, Q. Pei, J. Wang, G. Tang, Y. Zhang, and ...
  • Dowling, S., Schukat, M., & Barrett, E. (۲۰۱۸, September). “Using ...
  • Dang QV, Vo TH. “Reinforcement learning for the problem of ...
  • Zhao D, Wang H, Shao K, Zhu Y. “Deep reinforcement ...
  • نمایش کامل مراجع