2021
DOI: 10.1109/tgcn.2021.3073714
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Green Internet of Things: A Deep Deterministic Policy Gradient-Based Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Further, Q-learning [15], TCNN [22] and MCRNN [23] are used as comparative methods for experimental verification of algorithm optimization. All NIDS methods run separately in the same environment.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, Q-learning [15], TCNN [22] and MCRNN [23] are used as comparative methods for experimental verification of algorithm optimization. All NIDS methods run separately in the same environment.…”
Section: Resultsmentioning
confidence: 99%
“…Statistical learning-based methods use the statistical features of normal activity to capture network traffic activity and create profiles that represent its random behavior [12]. Siddiqi et al [13] combines normalization methods with statistical learning methods to enhance the performance of supervised classifiers and achieve network traffic intrusion monitoring; Alzubi [14] constructs a network monitoring model based on the statistical Dirichlet model to ensure the stable operation of industrial wireless sensor networks; Nie et al [15] statistically analyzes the features of network traffic, and uses deep reinforcement learning (Q-learning) as the backbone network to build an NIDS model to provide various services for users. However, these models are difficult to break through the limitations of high-dimensional curse.…”
Section: A R T I C L Ementioning
confidence: 99%
“…Park et al (2) not only adopted an autoencoder for intrusion detection but also utilized a generative adversarial network (GAN) to produce synthetic data to address data imbalance issues found in common AI-based network IDS system design. Nie et al (3) proposed an intrusion detection algorithm to tackle specifically distributed denial of service (DDoS) with deep reinforcement learning to predict past network statistical features. Wu et al (4) introduced big data mining into an intelligent intrusion detection algorithm, which was implemented first by feature selection using a fuzzy rough set, feature extraction using a deep convolutional neural network (DCNN), and also GAN.…”
Section: Introductionmentioning
confidence: 99%
“…The conventional DL methods deep belief network (DBN) stacked noise autoencoder (SNAE), stacked sparse autoencoder (SSAE), stacked contractive autoencoder (SCAE), stacked autoencoder (SAE)], were presented for executing the comparative simulation with the method in this study. Nie et al [16] formulated an identifier (ID) method that depends on deep reinforcement learning (DRL) that follows the trend of traffic flow through the extraction of statistical features of previous network traffic for traffic prediction. Afterwards, uses traffic predictors for employing ID.…”
Section: Introductionmentioning
confidence: 99%