2020
DOI: 10.1007/978-3-030-52988-8_7
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 18 publications
0
8
0
1
Order By: Relevance
“…Proposed schemes deployed in real-world settings will be subject to a highly variable behavior of the underlying network, making it unfeasible to be reproduced in a training dataset -demanding that the proposed scheme generalize the behavior of the network traffic [6], [7]. In practice, the network traffic behavior will change over time [34], [37], demanding model updates to be performed periodically. However, model updates are also a challenging task that often demands huge amounts of labeled training data to be provided.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Proposed schemes deployed in real-world settings will be subject to a highly variable behavior of the underlying network, making it unfeasible to be reproduced in a training dataset -demanding that the proposed scheme generalize the behavior of the network traffic [6], [7]. In practice, the network traffic behavior will change over time [34], [37], demanding model updates to be performed periodically. However, model updates are also a challenging task that often demands huge amounts of labeled training data to be provided.…”
Section: Discussionmentioning
confidence: 99%
“…The authors provided higher detection accuracy compared to traditional ML techniques while neglecting the challenges related to the actual deployment of their proposed scheme in production environments, such as the behavior changes in network traffic. Benaddi et al [37] proposed a RL scheme to detect malicious adversaries in wireless sensor networks. Their proposed approach was able to increase accuracy when compared to traditional ML techniques.…”
Section: Reinforcement Learning For Intrusion Detectionmentioning
confidence: 99%
“…O comportamento não estático do tráfego de rede foi também considerado por Ying-Feng Hsu e Morito Matsuoka [Benaddi et al 2020]. Os autores criaram uma mudanc ¸a de comportamento do tráfego de rede através da aplicac ¸ão de vários lotes do conjunto de dados de detecc ¸ão de intrusão enquanto avaliavam a sua técnica de acordo com cada lote.…”
Section: Trabalhos Relacionadosunclassified
“…Referred publications Markov decision process [12,23,24,37,64,70,75,84,96,100,101,104,127,130,133,138,144,153,165,167,170,177,188,191,199], [203, 207, 211, 212, 214, 217, 220, 231, 252, 256-259, 263, 264, 272, 274, 281, 291, 309, 313, 320, 340, 343, 346], [369][370][371][372][373][374][375][376] Multiarmed bandit [61,66,102,198,351,377,378] Dynamic programming [16,19,27,52,68,70,84,90,93,…”
Section: Approachmentioning
confidence: 99%