Publication Cover
Cybernetics and Systems
An International Journal
Volume 55, 2024 - Issue 1
161
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

Network Intrusion Detection and Mitigation Using Hybrid Optimization Integrated Deep Q Network

, , &
 

Abstract

Secure communication between network resources is a key issue, and researchers are persistently developing new intrusion detection schemes to detect intruders to enhance security. However, the traditional intrusion detection techniques have security challenges due to their poor detection performance. Hence, an effective intrusion detection model, namely spider monkey social optimization algorithm (SMSOA)-based Deep Q network is introduced for the detection of intrusion in the network. Here, the intrusion is detected based on the following three steps, such as pre-processing, feature fusion step, and detection. Estimated value replaced the missed value using missing value imputation in the pre-processing phase. Jaccard index by means of deep belief network (DBN) is performed in feature fusion. Deep Q network is used for intrusion detection process, where SMSOA method is used for training. The developed SMSOA scheme is performed by the integration of the social optimization algorithm (SOA) and spider monkey optimization (SMO). In addition, the attack mitigation process prevents the intruder enter into the network. Moreover, the developed model attained a better performance with respect to f-measure, recall values, and precision of 0.9455, 0.9585, and 0.9590, respectively.

Data Availability Statement

The data underlying this article are available in BOT-IOT dataset, at “https://ieee-dataport.org/documents/bot-iot-dataset”.

The data underlying this article are available in NSL-KDD dataset, at “https://www.unb.ca/cic/datasets/nsl.html”.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.