2022
DOI: 10.1038/s41598-022-19366-3
|View full text |Cite
|
Sign up to set email alerts
|

ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model

Abstract: Network assaults pose significant security concerns to network services; hence, new technical solutions must be used to enhance the efficacy of intrusion detection systems. Existing approaches pay insufficient attention to data preparation and inadequately identify unknown network threats. This paper presents a network intrusion detection model (ID-RDRL) based on RFE feature extraction and deep reinforcement learning. ID-RDRL filters the optimum subset of features using the RFE feature selection technique, fee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 37 publications
0
14
0
Order By: Relevance
“…It has been shown earlier that all the features extracted from a protein are not relevant, and there is a need to select only the useful ones from a big set of features [35]. To achieve the same, we applied the Recursive Feature Elimination (RFE) feature selection technique using the Scikit-learn package in Python programming language using Logistic Regression as the estimator [36].…”
Section: Feature Selectionmentioning
confidence: 99%
“…It has been shown earlier that all the features extracted from a protein are not relevant, and there is a need to select only the useful ones from a big set of features [35]. To achieve the same, we applied the Recursive Feature Elimination (RFE) feature selection technique using the Scikit-learn package in Python programming language using Logistic Regression as the estimator [36].…”
Section: Feature Selectionmentioning
confidence: 99%
“…It is important to determine the few significant features out of the plethora of vast number of features [13]. To do that, we utilised the Python programming language's Scikit-learn package and the Recursive Feature Elimination (RFE) technique, with Logistic Regression serving as the estimator [14].…”
Section: Feature Generation and Selectionmentioning
confidence: 99%
“…ML-based solutions (along with RL-based solutions [87,99,107]) have also been utilised solely for quick incident and intrusion response over the years [50,89,118]. Specifically, Zago et al [126] utilise ML techniques to analyse, detect and react against existing and upcoming cyber threats, including botnets.…”
Section: Resiliencementioning
confidence: 99%