{"title":"基于强化学习的网络入侵检测系统","authors":"Malika Malik, Kamaljit Singh Saini","doi":"10.1109/INCET57972.2023.10170630","DOIUrl":null,"url":null,"abstract":"Our research on the efficacy of deep reinforcement learning helps us comprehend the challenges encountered by NIDS (DRL). To find network anomalies, we suggest integrating Adversarial/Multi Agent Reinforcement Learning with Deep QLearning (AE-DQN). We compare our suggestions on the NSL-KDD dataset with the KDDTest+ dataset. In this article, we take a look at the difficulty of reducing an infinite number of possible categories down to only five. Our strategy yielded an overall F1 score of 79% and an accuracy of 80% across the board. Furthermore, our proposed method outperforms the Recurrent Neural Network (RNN) IDS (2) and the Adversarial Reinforcement Learning with SMOTE (AESMOTE) IDS in terms of the variety of assaults it can identify, as shown by its performance on the NSL-KDD dataset (3). Our major aim going forward is to enhance detection efficiency against different kinds of threats.","PeriodicalId":403008,"journal":{"name":"2023 4th International Conference for Emerging Technology (INCET)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Intrusion Detection System using Reinforcement learning\",\"authors\":\"Malika Malik, Kamaljit Singh Saini\",\"doi\":\"10.1109/INCET57972.2023.10170630\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Our research on the efficacy of deep reinforcement learning helps us comprehend the challenges encountered by NIDS (DRL). To find network anomalies, we suggest integrating Adversarial/Multi Agent Reinforcement Learning with Deep QLearning (AE-DQN). We compare our suggestions on the NSL-KDD dataset with the KDDTest+ dataset. In this article, we take a look at the difficulty of reducing an infinite number of possible categories down to only five. Our strategy yielded an overall F1 score of 79% and an accuracy of 80% across the board. Furthermore, our proposed method outperforms the Recurrent Neural Network (RNN) IDS (2) and the Adversarial Reinforcement Learning with SMOTE (AESMOTE) IDS in terms of the variety of assaults it can identify, as shown by its performance on the NSL-KDD dataset (3). Our major aim going forward is to enhance detection efficiency against different kinds of threats.\",\"PeriodicalId\":403008,\"journal\":{\"name\":\"2023 4th International Conference for Emerging Technology (INCET)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference for Emerging Technology (INCET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCET57972.2023.10170630\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference for Emerging Technology (INCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCET57972.2023.10170630","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Intrusion Detection System using Reinforcement learning
Our research on the efficacy of deep reinforcement learning helps us comprehend the challenges encountered by NIDS (DRL). To find network anomalies, we suggest integrating Adversarial/Multi Agent Reinforcement Learning with Deep QLearning (AE-DQN). We compare our suggestions on the NSL-KDD dataset with the KDDTest+ dataset. In this article, we take a look at the difficulty of reducing an infinite number of possible categories down to only five. Our strategy yielded an overall F1 score of 79% and an accuracy of 80% across the board. Furthermore, our proposed method outperforms the Recurrent Neural Network (RNN) IDS (2) and the Adversarial Reinforcement Learning with SMOTE (AESMOTE) IDS in terms of the variety of assaults it can identify, as shown by its performance on the NSL-KDD dataset (3). Our major aim going forward is to enhance detection efficiency against different kinds of threats.