CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks

عنوان مقاله: Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks
شناسه ملی مقاله: JR_TDMA-12-1_003
منتشر شده در در سال 1401
مشخصات نویسندگان مقاله:

Abbasgholi Pashaei - Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran
Mohammad Esmaeil Akbari - Department of Electrical Engineering, Ahar Branch, Islamic, Azad University, Ahar, Iran
Mina Zolfy Lighvan - Department of Electrical and Computer Engineering Faculty, Tabriz University, Tabriz, Iran
Asghar Charmin - Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran

خلاصه مقاله:
Distributed Denial of Service (DDoS) attacks are a significant threat, especially for the Internet of Things (IoT). One approach that is practically used to protect the network against DDoS attacks is the honeypot. This study proposes a new adversarial Deep Reinforcement Learning (DRL) model that can deliver better performance using experiences gained from the environment. Further regulation of the agent's behavior is made with an adversarial goal. In such an environment, an attempt is made to increase the difficulty level of predictions deliberately. In this technique, the simulated environment acts as a second agent against the primary environment. To evaluate the performance of the proposed method, we compare it with two well-known types of DDoS attacks, including NetBIOS and LDAP. Our modeling overcomes the previous models in terms of weight accuracy criteria (> ۰.۹۸) and F-score (> ۰.۹۷). The proposed adversarial RL model can be especially suitable for highly unbalanced datasets. Another advantage of our modeling is that there is no need to segregate the reward function.

کلمات کلیدی:
intrusion detection, Honeypot, Markov Decision Process, adversarial learning

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1634328/