Advertisement

Q-Learning Classifier

Chapter
  • 418 Downloads
Part of the Cognitive Intelligence and Robotics book series (CIR)

Abstract

Machine learning (ML) is aimed at autonomous extraction of knowledge from raw real-world data or exemplar instances. Machine learning (Barreno et al. in Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16–25, 2006 [1]) matches the learned pattern with the objects and predicts the outcome.

References

  1. 1.
    M. Barreno, B. Nelson, R. Sears, A.D. Joseph, J.D. Tygar, Can machine learning be secure?, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16–25 (2006)Google Scholar
  2. 2.
    I. Kononenko, Naive Bayesian classifier and continuous attributes. Informatica 16(1), 1–8 (1992)Google Scholar
  3. 3.
    KDD Cup 1999 Data Data Set, UCI Machine Learning Repository. http://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data
  4. 4.
    S. Zanero, S.M. Savaresi, Unsupervised learning techniques for an intrusion detection system, in SAC’04, 14–17 Mar 2004Google Scholar
  5. 5.
    Y. Liao, Machine learning in intrusion detection. PhD Thesis, University of California (2005)Google Scholar
  6. 6.
    A. Patcha, J.-M. Park, An overview of anomaly detection techniques: existing solutions and latest technological trends. J. Comput. Netw. (2007)Google Scholar
  7. 7.
    T.P. Tran, P. Tsai, T. Jan, X. Kong, Network intrusion detection using machine learning and voting techniques, in Machine Learning, ed. by Y. Zhang. ISBN 978-953-307-033-9, Hard cover (InTech, 2010), 438 pGoogle Scholar
  8. 8.
    X. Xu, Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction. Int. J. Web Serv. Pract. 2(1-2), 49–58 (2006)Google Scholar
  9. 9.
    X. Du, J. Zhai, K. Lv, Algorithm Trading Using Q-Learning and Recurrent Reinforcement Learning. Stanford University, Course CS 229 (Machine Learning), Final Projects (2009)Google Scholar
  10. 10.
    T. Kohri, K. Matsubayashi, M. Tokoro, An adaptive architecture for modular Q-learning, in Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, vol. 2. ISBN:1-555860-480-4 (Morgan Kaufmann Publishers Inc., San Francisco, pp. 820–825, 1997)Google Scholar
  11. 11.
    A.L. Servin, Distributed network defence and reinforcement learning. Thesis (2006)Google Scholar
  12. 12.
    Q. Zhu, T. Basar, Dynamic policy-based IDS configuration, in Proceedings of the 48th IEEE Conference on Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference. CDC/CCC 2009 (2009), pp. 8600–8605Google Scholar
  13. 13.
    A. Servin, D. Kudenko, Multi-agent reinforcement learning for intrusion detection, in Proceedings of the 5th, 6th and 7th European Conference on Adaptive and Learning Agents and Multi-Agent Systems: Adaptation and Multi-Agent Learning (Springer, Berlin, 2008), pp. 211–223Google Scholar
  14. 14.
    N. Sengupta, J. Sen, J. Sil, M. Saha, Designing of on line intrusion detection system using rough set theory and Q learning algorithm. Neurocomputing 111, 161–168 (2013)CrossRefGoogle Scholar
  15. 15.
    N. Sengupta, J. Sil, Comparison of different rule calculation method for rough set theory. Int. J. Inf. Electron. Eng. 2(3) (2012)Google Scholar
  16. 16.
    J. Visumathi, K.L. Shunmuganathan, A computational intelligence for evaluation of intrusion detection system. Indian J. Sci. Technol. 4(1), 0974–6846 (2011)Google Scholar
  17. 17.
    D.A. Karras, V. Zorkadis, Neural network techniques for improved intrusion detection in communication systems, in Proceedings of the 5th WSES International Conference on Circuits, Systems, Communications and Computers (CSCC 2001). ISBN: 960–8052-33-5 (2001)Google Scholar
  18. 18.
    S.G. Bhirud, V. Katkar, Novel architecture for intrusion-tolerant distributed intrusion detection system using packet filter firewall and state transition tables. Int. J. Comput. Appl. 8(11) (2010)CrossRefGoogle Scholar
  19. 19.
    D. Lee, D. Kim, J. Jung, Multi-stage intrusion detection system using hidden markov model algorithm. IEEE Int. Conf. Inf. Sci. Secur. 72–77 (2008)Google Scholar
  20. 20.
    D. Dal, S. Abraham, A. Abraham, S. Sanyal, M. Sanglikar, Evolution induced secondary immunity: an artificial immune system based intrusion detection system, in IEEE, 7th Computer Information Systems & Industrial Management Applications, pp. 65–70 (2008)Google Scholar
  21. 21.
    M.-Y. Su, K.-C. Chang, H.-F. Wei, C.-Y. Lin: A real-time network intrusion detection system based on incremental mining approach, in IEEE International Conference on Intelligence and Security Informatics, pp. 179–184 (2008)Google Scholar
  22. 22.
    M.H. Hansen, B. Yu, Model selection and the principle of minimum description length. J. Am. Stat. Assoc. 96, 454 (2001)MathSciNetCrossRefGoogle Scholar
  23. 23.
    L. Breiman, J. Friedman, R. Olshen, C. Stone, Classification and Regression Trees (CRC Press 1998)Google Scholar
  24. 24.
    J. Cannady, Applying CMAC-based on-line learning to intrusion detection, in Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN’00), vol. 5.ISBN:0–7695-0619-4 (IEEE Computer Society Washington, DC, USA, 2000)Google Scholar
  25. 25.
    W. Wang, X.-H. Guan, X.-L. Zhang, Modeling program behaviors by hidden Markov models for intrusion detection, in Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26–29 Aug 2004Google Scholar
  26. 26.
    H. Tang, Z. Cao, Machine learning-based intrusion detection algorithms. J. Comput. Inf. Syst. 5(6), 1825–1831 (2009)Google Scholar
  27. 27.
    D.L. Davies, D.W. Bouldin, A cluster separation measure. IEEE Trans. Patt. Recogn. Mach. Intell. 1(2), 224–227 (1979)CrossRefGoogle Scholar
  28. 28.
    M.A. Rassam, M.A. Maarof, A. Zainal, Intrusion detection system using unsupervised immune network clustering with reduced features. Int. J. Adv. Soft Comput. Appl. 2(3) (2010)Google Scholar
  29. 29.
    M. Saha, J. Sil, N. Sengupta, Designing of an efficient classifier using hierarchical reinforcement learning, in ICGST Conference on Computer Science and Engineering, Dubai, UAE, 16–19 July 2012Google Scholar
  30. 30.
    A. Chouchoulas, Q. Shen, Rough set-aided keyword reduction for text categorisation. Appl Artif Intell 15(9), 843–873 (2001)CrossRefGoogle Scholar
  31. 31.
    N. Zhong, J. Dong, S. Ohsuga, Using rough sets with heuristics for feature selection. J. Intell. Inf. Syst. 16, 199–214 (2001)CrossRefGoogle Scholar
  32. 32.
    R. Jensen, Q. Shen, Fuzzy-rough sets for descriptive dimensionality reduction, in Proceedings of the 11th International Conference on Fuzzy Systems (2002), pp. 29–34Google Scholar
  33. 33.
    F. Abu-Amara, I. Abdel-Qader, Hybrid mammogram classification using rough set and fuzzy classifier. Int. J. Biomed. Imaging 2009 (2009)CrossRefGoogle Scholar
  34. 34.
    Nsl-kdd data set for network-based intrusion detection systems. http://nsl.cs.unb.ca/KDD/NSL-KDD.html, Mar 2009
  35. 35.
    M. Baykal-Gürsoy, Semi-markov decision processes. Probab. Eng. Inf. Sci. 21, 635–657 (2007)MathSciNetCrossRefGoogle Scholar
  36. 36.
    H. Xiong, S. Shekhar, P.-N. Tan, V. Kumar, Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs, in KDD’04, 22–25 Aug 2004Google Scholar
  37. 37.
    S.M. Kakade, On the sample complexity of reinforcement learning. Ph.D. thesis (Gatsby Computational Neuroscience Unit, University College London, 2003)Google Scholar
  38. 38.
    B.R. Leffler, M.L. Littman, T. Edmunds, Efficient reinforcement learning with re locatable action models, in Proceedings of the Twenty-Second Conference on Artificial Intelligence (2007), p 572577Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Information TechnologyUniversity College of BahrainManamaBahrain
  2. 2.Department of Computer Science and TechnologyIndian Institute of Engineering Science and Technology (IIEST), ShibpurHowrahIndia

Personalised recommendations