Publication Cover
Cybernetics and Systems
An International Journal
Volume 55, 2024 - Issue 1
161
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

Network Intrusion Detection and Mitigation Using Hybrid Optimization Integrated Deep Q Network

, , &

References

  • Alavizadeh, H., H. Alavizadeh, and J. J. Jaccard. 2022. Deep Q-learning based reinforcement learning approach for network intrusion detection. Computers 11 (3):41. doi:10.3390/computers11030041.
  • Almomani, O. 2020. A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12 (6):1046. doi:10.3390/sym12061046.
  • Almomani, O. 2021. A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Computers, Materials & Continua 68 (1):409–29. doi:10.32604/cmc.2021.016113.
  • Alzaqebah, A. I., I. Aljarah, O. S. A. Kadi, and R. Damasevicius. 2022. A modified grey wolf optimization algorithm for an intrusion detection system. Mathematics 10 (6):999. doi:10.3390/math10060999.
  • Anand, S. 2020. Intrusion detection system for wireless mesh networks via improved whale optimization. Journal of Networking and Communication Systems 3:4.
  • Bahashwan, A. A. M. Anbar, and S. M. Hanshi. 2019. Overview of IPv6 based DDoS and DoS attacks detection mechanisms. International Conference on Advances in Cyber Security, 153–67.
  • Bansa, J. C., H. Sharma, S. S. Jadon, and M. Clerc. 2014. Spider monkey optimization algorithm for numerical optimization. Memetic Computing 6 (1):31–47. doi:10.1007/s12293-013-0128-0.
  • Bao, F., R. Chen, M. Chang, and J. H. Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management 9 (2):169–83. doi:10.1109/TCOMM.2012.031912.110179.
  • Chang, Y. W. Li, and Z. Yang. 2017. Network intrusion detection based on random forest and support vector machine. Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 1, 635–8.
  • Choudhury, S., and A. Bhowal. 2015. Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. Proceedings of 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 89–95.
  • Gavel, S., A. S. Raghuvanshi, and S. Tiwari. 2021. A novel density estimation based intrusion detection technique with Pearson's divergence for wireless sensor networks. ISA Transactions 111:180–91. doi:10.1016/j.isatra.2020.11.016.
  • Girolami, M. 2002. Mercer kernel-based clustering in feature space. IEEE Transactions on Neural Networks 13 (3):780–4. doi:10.1109/TNN.2002.1000150.
  • Iqbal, Q., N. H. Ahmad, and Z. Li. 2021. Frugal-based innovation model for sustainable development: Technological and market turbulence. Leadership & Organization Development Journal 42 (3):396–407. doi:10.1108/LODJ-06-2020-0256.
  • Ján Vojt, B. 2016. Deep neural networks and their implementation.
  • Jiang, K., W. Wang, A. Wang, and H. Wu. 2020. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464–76. doi:10.1109/ACCESS.2020.2973730.
  • Jiang, S., J. Zhao, and X. Xu. 2020. SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548–58. doi:10.1109/ACCESS.2020.3024219.
  • Karimi, N., and K. Khandani. 2020. Social optimization algorithm with application to economic dispatch problem. International Transactions on Electrical Energy Systems 30 (11):e12593. doi:10.1002/2050-7038.12593.
  • Kasongo, S. M., and Y. Sun. 2020. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security 92:101752. doi:10.1016/j.cose.2020.101752.
  • Martin, M. L., B. Carro, and A. S. Esguevillas. 2020. Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Systems with Applications 141:112963. doi:10.1016/j.eswa.2019.112963.
  • Martin, M. L., A. S. Esguevillas, J. I. Arribas, and B. Carro. 2021. Network intrusion detection based on extended RBF neural network with offline reinforcement learning. IEEE Access 9:153153–70. doi:10.1109/ACCESS.2021.3127689.
  • NSL-KDD. https://www.unb.ca/cic/datasets/nsl.html (accessed July, 2021).
  • Roy, S. S. A. Mallik, R. Gulati, M. S. Obaidat, and P. V. Krishna. 2017. A deep learning based artificial neural network approach for intrusion detection. Proceedings of International Conference on Mathematics and Computing, 44–53.
  • Safaldin, M., M. Otair, and L. Abualigah. 2021. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing 12 (2):1559–76. doi:10.1007/s12652-020-02228-z.
  • Selvakumar, K., M. Karuppiah, L. SaiRamesh, S. H. Islam, M. M. Hassan, G. Fortino, and K. K. R. Choo. 2019. Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences 497:77–90. doi:10.1016/j.ins.2019.05.040.
  • Shone, N., T. N. Ngoc, V. D. Phai, and Q. Shi. 2018. A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence 2 (1):41–50. doi:10.1109/TETCI.2017.2772792.
  • Veeraiah, N., and B. T. Krishna. 2018. Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naive Bayes rule. Multimedia Research 1 (1):27–32.
  • Vinayakumar, R., M. Alazab, K. P. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman. 2019. Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–50. doi:10.1109/ACCESS.2019.2895334.
  • Wang, H., Z. Cao, and B. Hong. 2020. A network intrusion detection system based on convolutional neural network. Journal of Intelligent & Fuzzy Systems 38 (6):7623–37. doi:10.3233/JIFS-179833.
  • Wang, X., Y. Li, T. Chen, Q. Yan, and L. Ma. 2017. Quantitative thickness prediction of tectonically deformed coal using extreme learning machine and principal component analysis: A case study. Computers & Geosciences 101:38–47. doi:10.1016/j.cageo.2017.02.001.
  • Wang, Z. 2018. Deep learning-based intrusion detection with adversaries. IEEE Access. 6:38367–84. doi:10.1109/ACCESS.2018.2854599.
  • Wang, Y., H. Liu, W. Zheng, Y. Xia, Y. Li, P. Chen, K. Guo, and H. Xie. 2019. Multi-objective workflow scheduling with deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7:39974–82. doi:10.1109/ACCESS.2019.2902846.
  • Yin, C., Y. Zhu, J. Fei, and X. He. 2017. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–61. doi:10.1109/ACCESS.2017.2762418.
  • Zeyun, L., and S. R. S. Dawood, L. 2017. Examining inter-city connections in Southeast Asia based upon interlocking city network model. International Journal of Advanced and Applied Sciences 4 (1):110–5. doi:10.21833/ijaas.2017.01.016.
  • Zhang, W., D. Han, K. C. Li, and F. I. Massetto. 2020. Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing 24 (16):12361–14. doi:10.1007/s00500-020-04678-1.
  • Zoghlami, N., A. Taghipour, C. Merlo, and M. Abed. 2016. Management of divergent production network using decentralised multi-level capacitated lot-sizing models. International Journal of Shipping and Transport Logistics 8 (5):590–604. doi:10.1504/IJSTL.2016.078686.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.