Abstract
The cyberattack has been increased rapidly since most of the devices are connected to networks due to Internet of Things (IoT) era. In addition, artificial intelligence (AI) is booming due to its capability to adapt to most of the science fields. AI has the capability to learn, identify, and recognize certain pattern according to their training approaches. This paper aims to propose reinforcement learning for adaptive cyber defense that is capable to avoid a certain pattern of attack and identify the pattern of attack from the cyber outlaw. The algorithm will learn and identify the behavior of the attack and attackers through the training dataset and then provide a counterattack to avoid unnecessary loss. The experimental result has shown the fitness of neural network algorithm and the proposed reinforcement learning framework with a 95% confidence rate. The correct prediction from the confusion matrix has also shown high value with 96%. The future works will be focused on the real-world data testing and hard-coded reinforcement algorithm to observe adaptability of the proposed framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Apruzzese, G. et al. (2018). On the effectiveness of machine and deep learning for cyber security, the 10th international conference on cyber conflic.
Blanzieri, E., & Bryl, A. (2008) A survey of learning-based techniques of email spam filtering, Artificial Intelligence Review.
Buczak, A., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18, 1153.
Cisco. (2018). Annual cybersecurity report, Accessed May 2018. www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.Pdf
Gardiner, J., & Nagaraja, S. (2016). On the security of machine learning in malware C8C detection. ACM Computing Surveys, 49(3), 59.
Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems, 67(2), 247–267.
Hancock, J. T. (2007). Digital deception. Oxford University Press.
ITRC. (2018). Identity Theft Resource Centre data breach report, November 2018. https://www.idtheftcenter.org/wp-content/uploads/2018/12/2018-November-Data-Breach-Package.pdf Accessed Dec 2018.
Pierazzi, F., et al. (2017). Scalable architecture for online prioritization of cyber threats. In International conference on cyber conflict (CyCon).
PwC. (2017). Information security breaches survey’, Accessed Apr 2017. www.pwc.co.uk/services/audit-assurance/insights/2015-information- security-breaches-survey.html.
Rami, M., McCluskey, T. L., & Thabtah, F. A. (2014). Intelligent rule based phishing websites classification. IET Information Security, 8(3), 153–160. ISSN 1751-8709.
Sahingoza, O. K., Buberb, E., Demirb, O., & Diric, B. (2019). Machine learning based phishing detection from URLs. Expert Systems with Applications, 117(2019), 345–357, Elsevier.
SkyMind AI. (2019), https://skymind.ai/wiki/deep-reinforcement-learning, Last Accessed Jan 2019.
Stanton, K., Ellickson-Larew, S., & Watson, D. (2016). Development and validation of a measure of online deception and intimacy. Personality and Individual Differences, 88, 187–196.
Sutton, R. S., & Barto, A. G. (2017). Reinforcement learning: An introduction, a Bradford book. Cambridge/Massachusetts/London: The MIT Press.
Walta, E. V. D., Eloffa, J. H. P., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Computers & Security, 78(2018), 76–89, Elsevier.
Wilkins, J. (2018). Is artificial intelligence a help or hindrance? Network Security, 2018(5), 18–19. https://doi.org/10.1016/S1353-4858(18)30046-1.
Zeichick, A., Talwar, R., & Koury, A. (2017). AI in IT security, Network Security, https://www.imperva.com/blog/will-ai-change-the-role-of-cybersecurity/., Last Accessed Feb 2019.
Acknowledgments
This work was supported by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, Saudi Arabia. The authors, therefore, gratefully acknowledge the DSR technical and financial support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Basori, A.H., Malebary, S.J. (2020). Deep Reinforcement Learning for Adaptive Cyber Defense and Attacker’s Pattern Identification. In: Shandilya, S., Wagner, N., Nagar, A. (eds) Advances in Cyber Security Analytics and Decision Systems. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-19353-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-19353-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19352-2
Online ISBN: 978-3-030-19353-9
eBook Packages: EngineeringEngineering (R0)