2022
DOI: 10.3390/sym14010161
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Hyperparameter Control Method for a Network Intrusion Detection System Based on Proximal Policy Optimization

Abstract: The complexity of network intrusion detection systems (IDSs) is increasing due to the continuous increases in network traffic, various attacks and the ever-changing network environment. In addition, network traffic is asymmetric with few attack data, but the attack data are so complex that it is difficult to detect one. Many studies on improving intrusion detection performance using feature engineering have been conducted. These studies work well in the dataset environment; however, it is challenging to cope w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…In comparison with the other studies using deep learning models, Zhu et al [7] proposed the AMF-LSTM model to identify abnormal flow and Han et al [22] used a deep neural network as a feature extractor and uses a k-means clustering module to classify attack types, we used a deep learning model based on the LSTM model to learn hidden features and detect abnormal flow and we also used KNN, AdaBoost, and Random Forest models in combination with the deep learning model to increase performance, [22] 0.9356 Ahmim et al [5] 0.9448 Sharafaldin et al [4] 0.9800 Our proposal method 0.9977 so our result is better than Zhu et al [7]. To classify attack types, our proposal model used both forward and backward flows, so our result is better than Han et al [22]. Our results are also better than the result of studies using traditional machine models as the results of Sharafaldin et al [4] and Ahmim et al [5].…”
Section: Experiments Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In comparison with the other studies using deep learning models, Zhu et al [7] proposed the AMF-LSTM model to identify abnormal flow and Han et al [22] used a deep neural network as a feature extractor and uses a k-means clustering module to classify attack types, we used a deep learning model based on the LSTM model to learn hidden features and detect abnormal flow and we also used KNN, AdaBoost, and Random Forest models in combination with the deep learning model to increase performance, [22] 0.9356 Ahmim et al [5] 0.9448 Sharafaldin et al [4] 0.9800 Our proposal method 0.9977 so our result is better than Zhu et al [7]. To classify attack types, our proposal model used both forward and backward flows, so our result is better than Han et al [22]. Our results are also better than the result of studies using traditional machine models as the results of Sharafaldin et al [4] and Ahmim et al [5].…”
Section: Experiments Results and Discussionmentioning
confidence: 99%
“…Han et al [22] performed the most recent study. They used proximal policy optimization as a reinforcement learning model that trains a deep neural network as a feature extractor and uses a k-means clustering module to classify attack types.…”
Section: Related Workmentioning
confidence: 99%
“…In the era of big data, machine learning approaches have been widely implemented in intrusion detection systems (IDS), and part of the research has employed classic machine learning algorithms or their enhancements, such as SVM, K-means, KNN, RF, and so on 1 , 18 20 , and deep learning algorithms, such as ANN, CNN, LSTM, etc 21 27 . In the literature 28 , the authors suggest an IDS based on spark and Conv-AE that employs public datasets such as KDD99 for performance evaluation, and the findings indicate that imbalanced datasets affect model performance.…”
Section: Related Workmentioning
confidence: 99%
“…In the era of big data, machine learning approaches have been widely implemented in intrusion detection systems (IDS), and part of the research has employed classic machine learning algorithms or their enhancements, such as SVM, K-means, KNN, RF, and so on 1,[7][8][9] , and deep learning algorithms, such as ANN, CNN, LSTM, etc [10][11][12][13][14][15][16] . In the literature 17 , the authors suggest an IDS based on spark and Conv-AE that employs public datasets such as KDD99 for performance evaluation, and the findings indicate that imbalanced datasets affect model performance.…”
Section: Related Workmentioning
confidence: 99%