skip to main content
10.1145/3660853.3660930acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaicconfConference Proceedingsconference-collections
research-article

Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security

Published: 23 June 2024 Publication History

Abstract

In the labyrinthine world of cybersecurity, the ever-evolving specter of cyber-attacks offers an inevitable challenge to the fortifications of protection measures. Past investigations have underlined the exigency for adaptive and aggressive strategies in the arena of cyber defense, with a conspicuous lacuna in leveraging advanced machine learning paradigms for real-time threat discernment and neutralization. In response to this gap, our investigation strives to probe the depths of deep reinforcement learning (DRL) efficacy in the domain of adaptive cyber protection. Imbibing the essence of cutting-edge DRL techniques such as Deep Q-Networks (DQN), Proximal Policy Optimization (PPO), and Twin Delayed Deep Deterministic Policy Gradient (TD3), we fashioned a revolutionary schema tailored towards parsing and fighting cyber threats in real-time. Our expedition traversed the terra incognita of a comprehensive dataset, teeming with varied cyber threat scenarios covering the gamut from malware invasions to phishing machinations, intrusion intrusions, and adversarial assaults, to incubate and examine the performance of our DRL models. Through a crucible of extensive experimentation, we unfurl promising ensigns, with our algorithms evincing a lofty accuracy and effectiveness quotient in the classification and abatement of cyber threats. This research purports to accelerate the vanguard of cyber defense by exposing the latent potential of DRL in sculpting adaptive and robust bulwarks against the unrelenting tide of developing cyber threats.
CCS CONCEPTS • Computing methodologies∼ Artificial intelligence∼Machine learning

References

[1]
Eriksson, J., & Giacomello, G. (Eds.). (2007). International relations and security in the digital age (Vol. 52). London: Routledge.
[2]
Umar, A. (2003). Information Security and Auditing in the Digital Age: A Practical Managerial Perspective. nge solutions, inc.
[3]
Cavelty, M. D., & Mauer, V. (2016). Power and security in the information age: Investigating the role of the state in cyberspace. Routledge.
[4]
S. R. Ahmed, E. Sonuc, M. R. Ahmed, and A. D. Duru, “Analysis Survey on Deepfake detection and Recognition with Convolutional Neural Networks,” 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2022.‏
[5]
B. T. Yaseen, S. Kurnaz, and S. R. Ahmed, “Detecting and Classifying Drug Interaction using Data mining Techniques,” 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Oct. 2022.‏
[6]
S. R. Ahmed, A. K. Ahmed, and S. J. Jwmaa, “Analyzing The Employee Turnover by Using Decision Tree Algorithm,” 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun. 2023.
[7]
DeVries, Will Thomas. "Protecting privacy in the digital age." Berkeley technology law journal 18, no. 1 (2003): 283-311.
[8]
Nguyen, T. T., & Reddi, V. J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779-3795.
[9]
Sewak, M., Sahay, S. K., & Rathore, H. (2023). Deep reinforcement learning in the advanced cybersecurity threat detection and protection. Information Systems Frontiers, 25(2), 589-611.
[10]
Zhao, J., Hu, F., & Hei, X. (2023). Defensive Schemes for Cyber Security of Deep Reinforcement Learning. In AI, Machine Learning and Deep Learning (pp. 139-149). CRC Press.
[11]
Adawadkar, A. M. K., & Kulkarni, N. (2022). Cyber-security and reinforcement learning—A brief survey. Engineering Applications of Artificial Intelligence, 114, 105116.
[12]
Haydari, A., Zhang, M., & Chuah, C. N. (2021). Adversarial attacks and defense in deep reinforcement learning (DRL)-based traffic signal controllers. IEEE Open Journal of Intelligent Transportation Systems, 2, 402-416.
[13]
Chen, W., Qiu, X., Cai, T., Dai, H. N., Zheng, Z., & Zhang, Y. (2021). Deep reinforcement learning for Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 23(3), 1659-1692.
[14]
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., ... & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. Ieee access, 6, 35365-35381.
[15]
Martínez Torres, J., Iglesias Comesaña, C., & García-Nieto, P. J. (2019). Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics, 10(10), 2823-2836.
[16]
Shaukat, K., Luo, S., Chen, S., & Liu, D. (2020, October). Cyber threat detection using machine learning techniques: A performance evaluation perspective. In 2020 international conference on cyber warfare and security (ICCWS) (pp. 1-6). IEEE.
[17]
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., Chen, S., Liu, D., & Li, J. (2020). Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies, 13(10), 2509.
[18]
S. R. Ahmed and E. Sonuç, “Evaluating the effectiveness of rationale-augmented convolutional neural networks for deepfake detection,” Soft Computing, Oct. 2023.
[19]
N. Z. Mahmood, S. R. Ahmed, A. F. Al-Hayaly, S. Algburi and J. Rasheed, "The Evolution of Administrative Information Systems: Assessing the Revolutionary Impact of Artificial Intelligence," 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-7.
[20]
B. A. Abubaker, S. R. Ahmed, A. T. Guron, M. Fadhil, S. Algburi, and B. F. Abdulrahman, “Spiking Neural Network for Enhanced Mobile Robots’ Navigation Control,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[21]
Bharadiya, J. (2023). Machine learning in cybersecurity: Techniques and challenges. European Journal of Technology, 7(2), 1-14.
[22]
Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M. A., Al-Turjman, F., & Mostarda, L. (2019). Cyber security threats detection in internet of things using deep learning approach. IEEE access, 7, 124379-124389.
[23]
Dalal, K. R., & Rele, M. (2018, October). Cyber Security: Threat Detection Model based on Machine learning Algorithm. In 2018 3rd International Conference on Communication and Electronics Systems (ICCES) (pp. 239-243). IEEE.
[24]
Mushtaq, A. S., Ali Ihsan, A. A., & Qasim, N. (2015). 2D-DWT vs. FFT OFDM Systems in fading AWGN channels. Radioelectronics and Communications Systems, 58(5), 228-233.‏
[25]
Bashar, B. S., Rhazali, Z. A., Misran, H., Ismail, M. M., & Al-Sharify, M. T. (2023, July). Gain enhancement for patch antenna loading with slotted parasite antenna based on metasurface super substrate. In AIP Conference Proceedings (Vol. 2787, No. 1). AIP Publishing.‏.
[26]
Kilincer, I. F., Ertam, F., & Sengur, A. (2021). Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks, 188, 107840.
[27]
Farooq, H. M., & Otaibi, N. M. (2018, March). Optimal machine learning algorithms for cyber threat detection. In 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim) (pp. 32-37). IEEE.
[28]
Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., & Connolly, J. F. (2022). Cybersecurity threats and their mitigation approaches using Machine Learning—A Review. Journal of Cybersecurity and Privacy, 2(3), 527-555.
[29]
Bouchama, F., & Kamal, M. (2021). Enhancing Cyber Threat Detection through Machine Learning-Based Behavioral Modeling of Network Traffic Patterns. International Journal of Business Intelligence and Big Data Analytics, 4(9), 1-9.
[30]
He, J., Yang, J., Ren, K., Zhang, W., & Li, G. (2019). Network Security Threat Detection under Big Data by Using Machine Learning. Int. J. Netw. Secur., 21(5), 768-773.
[31]
Nguyen, T. T., & Reddi, V. J. (2021). Deep reinforcement learning for cyber security. IEEE Transactions on Neural Networks and Learning Systems, 34(8), 3779-3795.
[32]
Sewak, M., Sahay, S. K., & Rathore, H. (2023). Deep reinforcement learning in the advanced cybersecurity threat detection and protection. Information Systems Frontiers, 25(2), 589-611.
[33]
A. K. Ahmed, S. Q. Younus, S. R. Ahmed, S. Algburi, and M. A. Fadhel, “A Machine Learning Approach to Employee Performance Prediction within Administrative Information Systems,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[34]
M. H. B. A. Alkareem, F. Q. Nasif, S. R. Ahmed, L. D. Miran, S. Algburi, and M. T. ALmashhadany, “Linguistics for Crimes in the World by AI-Based Cyber Security,” 2023 7th International Symposium on Innovative Approaches in Smart Technologies (ISAS), Nov. 2023.
[35]
Abdulmohsin, Z. S., Ahmed, S. R., & Hussein, K. A. (2024). Implementation of Patch-Wise Illumination Estimation for Multi-Exposure Image Fusion utilizing Convolutional Neural Network. Journal of Baghdad College of Economic sciences University, (75).‏
[36]
ABBOOD, Zainab Ali, Speaker identification model based on deep neural networks. Iraqi Journal for Computer Science and Mathematics, 2022, 3.1: 108-114.
[37]
Haydari, A., Zhang, M., & Chuah, C. N. (2021). Adversarial attacks and defense in deep reinforcement learning (DRL)-based traffic signal controllers. IEEE Open Journal of Intelligent Transportation Systems, 2, 402-416.
[38]
CENGİZ, E., & Murat, G. Ö. K. (2023). Reinforcement Learning Applications in Cyber Security: A Review. Sakarya University Journal of Science, 27(2), 481-503.
[39]
Liu, Y., Tsang, K. F., Wu, C. K., Wei, Y., Wang, H., & Zhu, H. (2022). IEEE P2668-compliant multi-layer IoT-DDoS defense system using deep reinforcement learning. IEEE Transactions on Consumer Electronics, 69(1), 49-64.
[40]
Rouzbahani, H. M., Karimipour, H., & Lei, L. (2023). Multi-layer defense algorithm against deep reinforcement learning-based intruders in smart grids. International Journal of Electrical Power & Energy Systems, 146, 108798.
[41]
https://github.com/shramos/Awesome-Cybersecurity-Datasets

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AICCONF '24: Proceedings of the Cognitive Models and Artificial Intelligence Conference
May 2024
367 pages
ISBN:9798400716928
DOI:10.1145/3660853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Deep Q-Networks (DQN)
  2. Proximal Policy Optimization (PPO)
  3. attacks
  4. cybersecurity
  5. deep reinforcement learning

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

AICCONF '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 65
    Total Downloads
  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)41
Reflects downloads up to 24 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media