An adversarial reinforcement learning based system for cyber security

In this paper, we proposed a reinforcement learning based system for defending the network users from malicious network traffics. By training two reinforcement learning agents: network attack generation agent and network defense agent, and based on the environment of deep neural networks, this system not only aims to outperforme the traditional machine learning algorithm (such as CNNs and LSTM), but also can to detect the adversarial example, which is the one of the biggest challenges for current machine learning based intrusion detection system.

[1]  Zenggang Xiong,et al.  Privacy-preserving multi-channel communication in Edge-of-Things , 2018, Future Gener. Comput. Syst..

[2]  Yue Wu,et al.  A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network , 2014, J. Electr. Comput. Eng..

[3]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[4]  Keke Gai,et al.  An Investigation on Cyber Security Threats and Security Models , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[5]  Audun Josang,et al.  Vulnerabilities in personal firewalls caused by poor security usability , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[6]  Meikang Qiu,et al.  Enabling real-time information service on telehealth system over cloud-based big data platform , 2017, J. Syst. Archit..

[7]  Manuel López Martín,et al.  Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.

[8]  Anamika Joshi,et al.  SQL Injection detection using machine learning , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[9]  JiSu Park,et al.  Designing online network intrusion detection using deep auto-encoder Q-learning , 2019, Comput. Electr. Eng..

[10]  Frank S. Rietta Application layer intrusion detection for SQL injection , 2006, ACM-SE 44.

[11]  Peter Mell,et al.  NIST Special Publication on Intrusion Detection Systems , 2001 .

[12]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).