Skip to main content

A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things

  • Conference paper
  • First Online:
Wireless Internet (WiCON 2019)

Abstract

Many modern infrastructures incorporate a number of sensors and actuators interconnected via wireless links using Wireless Sensor Network (WSN) and Internet of Things (IoT) technology. With a number of mission-critical infrastructures embracing these technologies, the security of such infrastructures assumes paramount importance. A motivated malicious adversary, if not kept in check by a strong defense, can cause much damage in such settings by taking actions that compromise the availability, integrity, confidentiality of network services as well as the privacy of users. This motivates the development of a strong Intrusion Detection System (IDS). In this paper, we have proposed a new Deep Reinforcement Learning (DRL)-based IDS for WSNs and IoTs that uses the formalism of Markov decision process (MDP) to improve the IDS decision performance. To evaluate the performance of our scheme, we compare our scheme against the baseline benchmark of standard reinforcement learning (RL) and the supervised algorithm of machine learning K-Nearest Neighbors (KNN). Through our a thorough simulation-based performance analysis, we demonstrate that our model DRL-IDS returns superior performance in terms of improved detection rate and enhancement the production of accuracy with reduced number of false alarms compared with this current approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ghosh, A., Khalid, O., Rais, R.N.B., Rehman, A., Malik, S.U.R., Khan, I.A.: Data offloading in IoT environment: modeling, analysis, and verification. EURASIP J. Wireless Commun. Networking 2019, 53 (2019)

    Article  Google Scholar 

  2. Mandayam, P., Liu, L., Saha, S., Tan, P., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: Proceedings of IEEE INFOCOM, pp. 2070–2078 (2013)

    Google Scholar 

  3. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Network Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  4. Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Chalmers University of Technology, pp. 1–27 (2000)

    Google Scholar 

  5. Hamid, Y., Sugumaran, M., Balasaraswathi, V.: IDS using machine learning - current state of art and future directions. Br. J. Appl. Sci. Technol. 15(3), 1–22 (2016)

    Article  Google Scholar 

  6. Mitchell, R., Chen, I.-R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 1–29 (2014). 55

    Article  Google Scholar 

  7. Ibrahimi, K., Ouaddane, M.: Management of intrusion detection systems based-KDD99: analysis with LDA and PCA. In: International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–6 (2017)

    Google Scholar 

  8. Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: Proceedings of the First International Conference on Availability Reliability and Security (ARES 2006), pp. 270–279 (2006)

    Google Scholar 

  9. Benaddi, H., Ibrahimi, K., Benslimane, A.: Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN. In: Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1–6 (2018)

    Google Scholar 

  10. Siddiqui, M.K., Naahid, S.: Analysis of KDD CUP 99 dataset using clustering based data mining. Int. J. Database Theory Appl. 6(5), 23–34 (2013)

    Article  Google Scholar 

  11. Chen, W., Liu, Y., Guan, Y.: Cardinality change-based early detection of large-scale cyber-attacks. In: Proceedings of IEEE INFOCOM, pp. 1836–1844 (2013)

    Google Scholar 

  12. Zhou, Y., Han, M., Liu, L., He, J., Wang, Y.: Deep learning approach for cyber-attack detection. In: Conference on Computer Communications Workshops (INFOCOM WKSHPS): IEEE Infocom MiseNet Workshop, pp. 262–267 (2018)

    Google Scholar 

  13. Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wireless Commun. Networking 2018(1), 1–7 (2018). https://doi.org/10.1186/s13638-018-1128-z

    Article  Google Scholar 

  14. Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: International Conference on New Trends in Computing Sciences (ICTCS), pp. 167–172 (2017)

    Google Scholar 

  15. Otoum, S., Kantarci, B., Mouftah, H.: Empowering reinforcement learning on big sensed data for intrusion detection. In: International Conference on Communications (2019)

    Google Scholar 

  16. Yu, F.R., He, Y.: Deep Reinforcement Learning for Wireless Networks. SECE. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10546-4

    Book  Google Scholar 

  17. Mohammadi, M., Al-Fuqaha, A., Guizani, M., Oh, J.-S.: Semi supervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Things J. PP(99), 1–12 (2017)

    Google Scholar 

  18. Xu, X., Xie, T.: A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 995–1003. Springer, Heidelberg (2005). https://doi.org/10.1007/11538059_103

    Chapter  Google Scholar 

  19. Servin, A., Kudenko, D.: Multi-agent reinforcement learning for intrusion detection. In: Tuyls, K., Nowe, A., Guessoum, Z., Kudenko, D. (eds.) AAMAS/ALAMAS 2005-2007. LNCS (LNAI), vol. 4865, pp. 211–223. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77949-0_15

    Chapter  Google Scholar 

  20. Alpcan, T., Basar, T.: An intrusion detection game with limited observations. In: Proceedings of the 12th International Symposium on Dynamic Games and Applications. Citeseer (2006)

    Google Scholar 

  21. Shen, S., Han, R., Guo, L., Li, W., Cao, Q.: Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain. Appl. Soft Comput. 12(5), 1467–1476 (2012)

    Article  Google Scholar 

  22. Liu, J., Yue, G., Shen, S., Shang, H., Li, H.: A game-theoretic response strategy for coordinator attack in wireless sensor networks. Sci. World J. 2014, Article ID 950618, 10 pages (2014). https://doi.org/10.1155/2014/950618

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abderrahim Benslimane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Benaddi, H., Ibrahimi, K., Benslimane, A., Qadir, J. (2020). A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things. In: Deng, DJ., Pang, AC., Lin, CC. (eds) Wireless Internet. WiCON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 317. Springer, Cham. https://doi.org/10.1007/978-3-030-52988-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52988-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52987-1

  • Online ISBN: 978-3-030-52988-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics