Skip to main content

Advertisement

Log in

Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system

  • Optimization
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The new generation of Intrusion Detection Systems (IDS) progressively requires automatic and intellectual network ID strategies for managing security risks made by a rising amount of advanced attackers from the cyber environment. Specifically, there were huge demands for autonomous agent-related IDS solution which need some human intervention as possible whereas can progress and enhance themselves (by making suitable acts for a presented environment) and turns out to be highly powerful to effective threats that were not seen before (for instance, zero-day attacks). Recently, DRL methods were presented that can learns from the environment with uncontrollable massive amount of states for addressing the major drawbacks of prevailing RL methods. This article introduces a Binary Bat Algorithm-based Feature Selection with Deep Reinforcement Learning (BBAFS-DRL) system for IDSs. The major intention of the BBAFS-DRL approach is the recognition and classification of intrusion systems. In the projected BBAFS-DRL method, data pre-processed was primarily executed to change the data as suitable format. Furthermore, the BBAFS system can be utilized for the effectual feature selection. Next, deep Q-network is applied for the effectual identification and classification of intrusion. At last, the root means square propagation (RMSProp) optimizer is utilized for the effectual hyperparameter tuning procedure. The experimental analysis of the BBAFS-DRL algorithm can be tested by utilize of benchmark database and the outcome can be analyzed on many measures. The comparison outcome demonstrated the improvement of the BBAFS-DRL methodology over other existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  • Akila S, Christe SA (2022) A wrapper based binary bat algorithm with greedy crossover for attribute selection. Expert Syst Appl 187:115828

    Article  Google Scholar 

  • Alavizadeh H, Alavizadeh H, Jang-Jaccard J (2022) Deep Q-learning based reinforcement learning approach for network intrusion detection. Computers 11(3):41

    Article  Google Scholar 

  • Alawsi ASS, Kurnaz S (2022) Quality of service system that is self-updating by intrusion detection systems using reinforcement learning. Appl Nanosci 13:1–8

    Google Scholar 

  • Bouhamed O, Bouachir O, Aloqaily M, Al Ridhawi I (2021) Lightweight ids for uav networks: a periodic deep reinforcement learning-based approach. In: 2021 IFIP/IEEE international symposium on integrated network management (IM). IEEE. pp 1032–1037

  • Caminero G, Lopez-Martin M, Carro B (2019) Adversarial environment reinforcement learning algorithm for intrusion detection. Comput Netw 159:96–109

    Article  Google Scholar 

  • Dang QV, Vo TH (2022) Reinforcement learning for the problem of detecting intrusion in a computer system. In: Proceedings of sixth international congress on information and communication technology. Springer, Singapore. pp 755–762

  • Gupta GP (2022) Intrusion detection framework using an improved deep reinforcement learning technique for IoT network. In: Soft Computing for Security Applications. Springer, Singapore. pp 765–779

  • Hsu YF, Matsuoka M (2020) A deep reinforcement learning approach for anomaly network intrusion detection system. In: 2020 IEEE 9th international conference on cloud networking (CloudNet). IEEE. pp 1–6

  • https://github.com/Bee-Mar/AWID-Intrusion-Detection/blob/master/final_documents/resources/dataset-headers-reduced-removed-null.zip

  • https://www.kaggle.com/datasets/mrwellsdavid/unsw-nb15

  • Liang W, Huang W, Long J, Zhang K, Li KC, Zhang D (2020) Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J 7(7):6392–6401

    Article  Google Scholar 

  • Lopez-Martin M, Carro B, Sanchez-Esguevillas A (2020) Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst Appl 141:112963

    Article  Google Scholar 

  • Mirjalili S, Mirjalili SM, Yang XS (2014) Binary bat algorithm. Neural Comput Appl 25(3):663–681

    Article  Google Scholar 

  • Nguyen TT, Reddi VJ (2019) Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems

  • Om Prakash PG, Maram B, Nalinipriya G, Cristin R (2021) Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization. Int J Wavelets Multiresolut Inf Process 19(04):2050093

    Article  MATH  Google Scholar 

  • Praveena V, Praveena V, Ponnusamy C, Ihsan A, Alroobaea R, Yahya S, Raza MA (2022) Optimal deep reinforcement learning for intrusion detection in UAVs. Comput Mater Contin 70:2639–2653

    Google Scholar 

  • Priya S, PradeepMohankumar K (2021) Intelligent outlier detection with optimal deep reinforcement learning model for intrusion detection. In: 2021 4th international conference on computing and communications technologies (ICCCT). IEEE. pp 336–341

  • Saadna Y, Boudhir AA, Ben Ahmed M (2022) An analysis of ResNet50 model and RMSprop optimizer for education platform using an intelligent chatbot system. In: Networking, Intelligent Systems and Security. Springer, Singapore. pp 577–590

  • Sethi K, Madhav YV, Kumar R, Bera P (2021) Attention based multi-agent intrusion detection systems using reinforcement learning. J Inf Secur Appl 61:102923

    Google Scholar 

  • Sharma K, Singh B, Herman E, Regine R, Rajest SS, Mishra VP (2021) Maximum information measure policies in reinforcement learning with deep energy-based model. In: 2021 International conference on computational intelligence and knowledge economy (ICCIKE). IEEE. pp 19–24

  • Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial Internet of Things based on deep reinforcement learning. Wireless Commun Mob Comput 2022:1–8

    Article  Google Scholar 

  • Venturi A, Apruzzese G, Andreolini M, Colajanni M, Marchetti M (2021) Drelab-deep reinforcement learning adversarial botnet: a benchmark dataset for adversarial attacks against botnet intrusion detection systems. Data Brief 34:106631

    Article  Google Scholar 

  • Wang Y, Liu H, Zheng W, Xia Y, Li Y, Chen P, Guo K, Xie H (2019) Multi-objective workflow scheduling with deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7:39974–39982

    Article  Google Scholar 

  • Wang A, Wang W, Zhou H, Zhang J (2021) Network intrusion detection algorithm combined with group convolution network and snapshot ensemble. Symmetry 13(10):1814

    Article  Google Scholar 

Download references

Funding

Enquiries about data availability should be directed to the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Priya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Informed consent

It was obtained from all authors of this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Priya, S., Kumar, K.P.M. Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system. Soft Comput 27, 10777–10788 (2023). https://doi.org/10.1007/s00500-023-08678-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-08678-9

Keywords

Navigation