Abstract
Many modern infrastructures incorporate a number of sensors and actuators interconnected via wireless links using Wireless Sensor Network (WSN) and Internet of Things (IoT) technology. With a number of mission-critical infrastructures embracing these technologies, the security of such infrastructures assumes paramount importance. A motivated malicious adversary, if not kept in check by a strong defense, can cause much damage in such settings by taking actions that compromise the availability, integrity, confidentiality of network services as well as the privacy of users. This motivates the development of a strong Intrusion Detection System (IDS). In this paper, we have proposed a new Deep Reinforcement Learning (DRL)-based IDS for WSNs and IoTs that uses the formalism of Markov decision process (MDP) to improve the IDS decision performance. To evaluate the performance of our scheme, we compare our scheme against the baseline benchmark of standard reinforcement learning (RL) and the supervised algorithm of machine learning K-Nearest Neighbors (KNN). Through our a thorough simulation-based performance analysis, we demonstrate that our model DRL-IDS returns superior performance in terms of improved detection rate and enhancement the production of accuracy with reduced number of false alarms compared with this current approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ghosh, A., Khalid, O., Rais, R.N.B., Rehman, A., Malik, S.U.R., Khan, I.A.: Data offloading in IoT environment: modeling, analysis, and verification. EURASIP J. Wireless Commun. Networking 2019, 53 (2019)
Mandayam, P., Liu, L., Saha, S., Tan, P., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: Proceedings of IEEE INFOCOM, pp. 2070–2078 (2013)
Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Network Comput. Appl. 36(1), 16–24 (2013)
Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Chalmers University of Technology, pp. 1–27 (2000)
Hamid, Y., Sugumaran, M., Balasaraswathi, V.: IDS using machine learning - current state of art and future directions. Br. J. Appl. Sci. Technol. 15(3), 1–22 (2016)
Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014). 55
Ibrahimi, K., Ouaddane, M.: Management of intrusion detection systems based-KDD99: analysis with LDA and PCA. In: International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–6 (2017)
Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: Proceedings of the First International Conference on Availability Reliability and Security (ARES 2006), pp. 270–279 (2006)
Benaddi, H., Ibrahimi, K., Benslimane, A.: Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN. In: Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–6 (2018)
Siddiqui, M.K., Naahid, S.: Analysis of KDD CUP 99 dataset using clustering based data mining. Int. J. Database Theory Appl. 6(5), 23–34 (2013)
Chen, W., Liu, Y., Guan, Y.: Cardinality change-based early detection of large-scale cyber-attacks. In: Proceedings of IEEE INFOCOM, pp. 1836–1844 (2013)
Zhou, Y., Han, M., Liu, L., He, J., Wang, Y.: Deep learning approach for cyber-attack detection. In: Conference on Computer Communications Workshops (INFOCOM WKSHPS): IEEE Infocom MiseNet Workshop, pp. 262–267 (2018)
Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wireless Commun. Networking 2018(1), 1–7 (2018). https://doi.org/10.1186/s13638-018-1128-z
Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: International Conference on New Trends in Computing Sciences (ICTCS), pp. 167–172 (2017)
Otoum, S., Kantarci, B., Mouftah, H.: Empowering reinforcement learning on big sensed data for intrusion detection. In: International Conference on Communications (2019)
Yu, F.R., He, Y.: Deep Reinforcement Learning for Wireless Networks. SECE. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10546-4
Mohammadi, M., Al-Fuqaha, A., Guizani, M., Oh, J.-S.: Semi supervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Things J. PP(99), 1–12 (2017)
Xu, X., Xie, T.: A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 995–1003. Springer, Heidelberg (2005). https://doi.org/10.1007/11538059_103
Servin, A., Kudenko, D.: Multi-agent reinforcement learning for intrusion detection. In: Tuyls, K., Nowe, A., Guessoum, Z., Kudenko, D. (eds.) AAMAS/ALAMAS 2005-2007. LNCS (LNAI), vol. 4865, pp. 211–223. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77949-0_15
Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications. Citeseer (2006)
Shen, S., Han, R., Guo, L., Li, W., Cao, Q.: Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain. Appl. Soft Comput. 12(5), 1467–1476 (2012)
Liu, J., Yue, G., Shen, S., Shang, H., Li, H.: A game-theoretic response strategy for coordinator attack in wireless sensor networks. Sci. World J. 2014, Article ID 950618, 10 pages (2014). https://doi.org/10.1155/2014/950618
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Benaddi, H., Ibrahimi, K., Benslimane, A., Qadir, J. (2020). A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things. In: Deng, DJ., Pang, AC., Lin, CC. (eds) Wireless Internet. WiCON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 317. Springer, Cham. https://doi.org/10.1007/978-3-030-52988-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-52988-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52987-1
Online ISBN: 978-3-030-52988-8
eBook Packages: Computer ScienceComputer Science (R0)