Wenyi Zhu , Xiaolong Liu , Yimeng Liu , Yizhou Shen , Xiao-Zhi Gao , Shigen Shen
{"title":"RT-A3C: Real-time Asynchronous Advantage Actor–Critic for optimally defending malicious attacks in edge-enabled Industrial Internet of Things","authors":"Wenyi Zhu , Xiaolong Liu , Yimeng Liu , Yizhou Shen , Xiao-Zhi Gao , Shigen Shen","doi":"10.1016/j.jisa.2025.104073","DOIUrl":null,"url":null,"abstract":"<div><div>The existing Asynchronous Advantage Actor–Critic (A3C) open-source training model can effectively recommend defense strategies for the edge-enabled Industrial Internet of Things (IIoT) under malware attacks. However, it faces challenges in rapidly countering large-scale IIoT network attacks. To address this issue, we develop an enhanced algorithm, RT-A3C, by innovatively integrating the A3C model into a real-time Markov game framework. This approach involves three key enhancements: incorporating prediction models, integrating adversary models, and optimizing state transition and action selection strategies. Such contributions collectively enhance the practicality and efficiency of IIoT security simulation training. The core innovation lies in converting the traditional turn-based Markov game into a real-time reactive one, showing the potential for policy optimization and strategic development in advanced IIoT network security. Through simulations, we demonstrate that the proposed RT-A3C algorithm surpasses the performance of the state-of-the-art actor–critic models. Our research clarifies that we can develop a more resilient and responsive IIoT security training model by merging real-time components with Markov games and A3C technology. This advancement significantly improves real-time monitoring and defense capabilities against large-scale IIoT network attacks, thereby strengthening the overall security of IIoT network systems.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"91 ","pages":"Article 104073"},"PeriodicalIF":3.8000,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001103","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The existing Asynchronous Advantage Actor–Critic (A3C) open-source training model can effectively recommend defense strategies for the edge-enabled Industrial Internet of Things (IIoT) under malware attacks. However, it faces challenges in rapidly countering large-scale IIoT network attacks. To address this issue, we develop an enhanced algorithm, RT-A3C, by innovatively integrating the A3C model into a real-time Markov game framework. This approach involves three key enhancements: incorporating prediction models, integrating adversary models, and optimizing state transition and action selection strategies. Such contributions collectively enhance the practicality and efficiency of IIoT security simulation training. The core innovation lies in converting the traditional turn-based Markov game into a real-time reactive one, showing the potential for policy optimization and strategic development in advanced IIoT network security. Through simulations, we demonstrate that the proposed RT-A3C algorithm surpasses the performance of the state-of-the-art actor–critic models. Our research clarifies that we can develop a more resilient and responsive IIoT security training model by merging real-time components with Markov games and A3C technology. This advancement significantly improves real-time monitoring and defense capabilities against large-scale IIoT network attacks, thereby strengthening the overall security of IIoT network systems.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.