Skip to main content

2020 | OriginalPaper | Buchkapitel

Deep Reinforcement Learning for Adaptive Cyber Defense and Attacker’s Pattern Identification

verfasst von : Ahmad Hoirul Basori, Sharaf Jameel Malebary

Erschienen in: Advances in Cyber Security Analytics and Decision Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The cyberattack has been increased rapidly since most of the devices are connected to networks due to Internet of Things (IoT) era. In addition, artificial intelligence (AI) is booming due to its capability to adapt to most of the science fields. AI has the capability to learn, identify, and recognize certain pattern according to their training approaches. This paper aims to propose reinforcement learning for adaptive cyber defense that is capable to avoid a certain pattern of attack and identify the pattern of attack from the cyber outlaw. The algorithm will learn and identify the behavior of the attack and attackers through the training dataset and then provide a counterattack to avoid unnecessary loss. The experimental result has shown the fitness of neural network algorithm and the proposed reinforcement learning framework with a 95% confidence rate. The correct prediction from the confusion matrix has also shown high value with 96%. The future works will be focused on the real-world data testing and hard-coded reinforcement algorithm to observe adaptability of the proposed framework.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Apruzzese, G. et al. (2018). On the effectiveness of machine and deep learning for cyber security, the 10th international conference on cyber conflic. Apruzzese, G. et al. (2018). On the effectiveness of machine and deep learning for cyber security, the 10th international conference on cyber conflic.
Zurück zum Zitat Blanzieri, E., & Bryl, A. (2008) A survey of learning-based techniques of email spam filtering, Artificial Intelligence Review. Blanzieri, E., & Bryl, A. (2008) A survey of learning-based techniques of email spam filtering, Artificial Intelligence Review.
Zurück zum Zitat Buczak, A., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18, 1153.CrossRef Buczak, A., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18, 1153.CrossRef
Zurück zum Zitat Gardiner, J., & Nagaraja, S. (2016). On the security of machine learning in malware C8C detection. ACM Computing Surveys, 49(3), 59.CrossRef Gardiner, J., & Nagaraja, S. (2016). On the security of machine learning in malware C8C detection. ACM Computing Surveys, 49(3), 59.CrossRef
Zurück zum Zitat Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems, 67(2), 247–267.CrossRef Gupta, B. B., Arachchilage, N. A. G., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems, 67(2), 247–267.CrossRef
Zurück zum Zitat Hancock, J. T. (2007). Digital deception. Oxford University Press. Hancock, J. T. (2007). Digital deception. Oxford University Press.
Zurück zum Zitat Pierazzi, F., et al. (2017). Scalable architecture for online prioritization of cyber threats. In International conference on cyber conflict (CyCon). Pierazzi, F., et al. (2017). Scalable architecture for online prioritization of cyber threats. In International conference on cyber conflict (CyCon).
Zurück zum Zitat Rami, M., McCluskey, T. L., & Thabtah, F. A. (2014). Intelligent rule based phishing websites classification. IET Information Security, 8(3), 153–160. ISSN 1751-8709.CrossRef Rami, M., McCluskey, T. L., & Thabtah, F. A. (2014). Intelligent rule based phishing websites classification. IET Information Security, 8(3), 153–160. ISSN 1751-8709.CrossRef
Zurück zum Zitat Sahingoza, O. K., Buberb, E., Demirb, O., & Diric, B. (2019). Machine learning based phishing detection from URLs. Expert Systems with Applications, 117(2019), 345–357, Elsevier.CrossRef Sahingoza, O. K., Buberb, E., Demirb, O., & Diric, B. (2019). Machine learning based phishing detection from URLs. Expert Systems with Applications, 117(2019), 345–357, Elsevier.CrossRef
Zurück zum Zitat Stanton, K., Ellickson-Larew, S., & Watson, D. (2016). Development and validation of a measure of online deception and intimacy. Personality and Individual Differences, 88, 187–196.CrossRef Stanton, K., Ellickson-Larew, S., & Watson, D. (2016). Development and validation of a measure of online deception and intimacy. Personality and Individual Differences, 88, 187–196.CrossRef
Zurück zum Zitat Sutton, R. S., & Barto, A. G. (2017). Reinforcement learning: An introduction, a Bradford book. Cambridge/Massachusetts/London: The MIT Press. Sutton, R. S., & Barto, A. G. (2017). Reinforcement learning: An introduction, a Bradford book. Cambridge/Massachusetts/London: The MIT Press.
Zurück zum Zitat Walta, E. V. D., Eloffa, J. H. P., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Computers & Security, 78(2018), 76–89, Elsevier.CrossRef Walta, E. V. D., Eloffa, J. H. P., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Computers & Security, 78(2018), 76–89, Elsevier.CrossRef
Metadaten
Titel
Deep Reinforcement Learning for Adaptive Cyber Defense and Attacker’s Pattern Identification
verfasst von
Ahmad Hoirul Basori
Sharaf Jameel Malebary
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-19353-9_2

Neuer Inhalt