2 results
Search Results
Now showing 1 - 2 of 2
Conference Object Citation - Scopus: 2Reinforcement Learning for Intrusion Detection(Springer Science and Business Media Deutschland GmbH, 2023) Saad,A.M.S.E.; Yildiz,B.Network-based technologies such as cloud computing, web services, and Internet of Things systems are becoming widely used due to their flexibility and preeminence. On the other hand, the exponential proliferation of network-based technologies exacerbated network security concerns. Intrusion takes an important share in the security concerns surrounding network-based technologies. Developing a robust intrusion detection system is crucial to solving the intrusion problem and ensuring the secure delivery of network-based technologies and services. In this paper, we propose a novel approach using deep reinforcement learning to detect intrusions to make network applications more secure, reliable, and efficient. As for the reinforcement learning approach, Deep Q-learning is used alongside a custom-built Gym environment that mimics network attacks and guides the learning process. The NSL-KDD dataset is used to create the reinforcement learning environment to train and evaluate the proposed model. The experimental results show that our proposed reinforcement learning approach outperforms other related solutions in the literature, achieving an accuracy that exceeds 93%. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.Conference Object A Comparison of Neural Network Approaches for Network Intrusion Detection(Springer international Publishing Ag, 2020) Oney, Mehmet Ugur; Peker, SerhatNowadays, network intrusion detection is an important area of research in computer network security, and the use of artificial neural networks (ANNs) have become increasingly popular in this field. Despite this, the research concerning comparison of artificial neural network architectures in the network intrusion detection is a relatively insufficient. To make up for this lack, this study aims to examine the neural network architectures in network intrusion detection to determine which architecture performs best, and to examine the effects of the architectural components, such as optimization functions, activation functions, learning momentum on the performance. For this purpose, 6480 neural networks were generated, their performances were evaluated by conducting a series of experiments on KDD99 dataset, and the results were reported. This study will be a useful reference to researchers and practitioners hoping to use ANNs in network intrusion detection.

