Abstract
In recent years, there are many research works focus on studying the intrusion detection systems. Several recent research works have utilized the power of supervised machine learning algorithms to achieve near-perfect predictive performance in modern intrusion datasets. However, these algorithms require huge labeled datasets that usually is not available in practice. In this paper, we analyze the possibility of using reinforcement learning in the problem of intrusion detection. Our experimental results show promising results compared to the other recent studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdi H, Williams LJ (2010) Principal component analysis. Wiley Interdisciplinary Rev Comput Stat 2(4):433–459
Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: SAC, pp 420–424. ACM
Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report
Bhamare D, Salman T, Samaka M, Erbad A, Jain R (2018) Feasibility of supervised machine learning for cloud security. CoRR arXiv:1810.09878
Bilge L, Dumitraş T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 833–844
Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: KDD, pp 785–794. ACM
Dang QV (2018) Outlier detection in network flow analysis. arXiv:1808.02024
Dang QV (2019) Reinforcement learning in stock trading. In: International conference on computer science, applied mathematics and applications, pp 311–322. Springer
Dang QV (2109) Studying machine learning techniques for intrusion detection systems. In: International conference on future data and security engineering, pp 411–426. Springer
Dang QV (2020) Active learning for intrusion detection systems. In: IEEE Research, innovation and vision for the future
Dang QV (2020) Link-sign prediction in signed directed networks from no link perspective. In: International conference on integrated science, pp 291–300. Springer
Dang QV (2020) Understanding the decision of machine learning based intrusion detection systems. In: Dang TK, Küng J, Takizawa M, Chung TM (eds) Future data and security engineering. Springer International Publishing, Cham, pp 379–396
Dang Q, Ignat C (2018) Link-sign prediction in dynamic signed directed networks. In: CIC, pp 36–45. IEEE Computer Society
Gharib A. Sharafaldin I, Lashkari AH, Ghorbani AA (2016) An evaluation framework for intrusion detection dataset. In: 2016 international conference on information science and security (ICISS), pp 1–6. IEEE
Hinton GE (2009) Deep belief networks. Scholarpedia 4(5):5947
Kausar N, Samir BB, Sulaiman SB, Ahmad I, Hussain M (2012) An approach towards intrusion detection using pca feature subsets and svm. In: 2012 international conference on computer & information science (ICCIS). vol 2, pp 569–574. IEEE
Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):20
Kreibich C, Crowcroft J (2004) Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput Commun Rev 34(1):51–56
Krügel C, Toth T (2003) Using decision trees to improve signature-based intrusion detection. In: RAID. Lecture Notes in Computer Science, vol 2820, pp 173–191. Springer
Kumar S, Arora S, et al (2019) A statistical analysis on kdd cup99 dataset for the network intrusion detection system. In: International conference on advanced communication and networking, pp 131–157. Springer
Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM international conference on data mining, pp 25–36. SIAM
Li X, Ye N (2001) Decision tree classifiers for computer intrusion detection. J Parallel Distrib Comput Pract 4(2):179–190
Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 Eighth IEEE international conference on data mining, pp 413–422. IEEE
MarÃn G, Casas P, Capdehourat G (2020) Deepmal—deep learning models for malware traffic detection and classification. CoRR arXiv:2003.04079
MarÃn G, Casas, P, Capdehourat G (2020) Deepmal–deep learning models for malware traffic detection and classification. arXiv preprint arXiv:2003.04079
Mnih V, Kavukcuoglu K, Silver D, Graves A, Antonoglou I, Wierstra D, Riedmiller MA (2013) Playing atari with deep reinforcement learning. CoRR arXiv:1312.5602
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57
Nguyen TT, Reddi VJ (2019) Deep reinforcement learning for cyber security. arXiv:1906.05799
Reddy RR, Ramadevi Y, Sunitha KVN (2016) Effective discriminant function for intrusion detection using SVM. In: ICACCI, pp 1148–1153. IEEE
Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):48:1–48:36
Roesch M et al (1999) Snort: lightweight intrusion detection for networks. Lisa 99:229–238
Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116
Stein G, Chen B, Wu AS, Hua KA (2005) Decision tree classifier for network intrusion detection with ga-based feature selection. In: ACM Southeast regional conference (2), pp 136–141. ACM
Suri R, Murty MN, Athithan G (2019) outlier detection: techniques and applications. Springer
Sutton RS, Barto AG (2018) Reinforcement learning: an introduction. MIT Press
Wu Y, Lee WW, Xu Z, Ni M (2020) Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access 8:98600–98611
Xu X, Wang X (2005) An adaptive network intrusion detection method based on pca and support vector machines. In: International conference on advanced data mining and applications, pp 696–703. Springer
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dang, QV., Vo, TH. (2022). Reinforcement Learning for the Problem of Detecting Intrusion in a Computer System. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 236. Springer, Singapore. https://doi.org/10.1007/978-981-16-2380-6_66
Download citation
DOI: https://doi.org/10.1007/978-981-16-2380-6_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2379-0
Online ISBN: 978-981-16-2380-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)