2019
DOI: 10.1007/s10207-019-00482-7
|View full text |Cite
|
Sign up to set email alerts
|

A context-aware robust intrusion detection system: a reinforcement learning-based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
53
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(53 citation statements)
references
References 45 publications
0
53
0
Order By: Relevance
“…In particular, the data analysis for detection (DataAnalysisForDetecion) and the data analysis for optimization (DataAnalysisForOptimization) are well represented: respectively 14 and 17 instances. For example, in Sethi et al (2019), an instance of DataAnalysisForDetection is presented to prevent and detect intrusions in enterprise network. In Chen & Chen (2017), an instance of DataAnalysisForOptimization is described to optimize scheduling; • almost all articles are applied to a specific domain (AgentMiningApplicationDomain).…”
Section: Agentminingapproachmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, the data analysis for detection (DataAnalysisForDetecion) and the data analysis for optimization (DataAnalysisForOptimization) are well represented: respectively 14 and 17 instances. For example, in Sethi et al (2019), an instance of DataAnalysisForDetection is presented to prevent and detect intrusions in enterprise network. In Chen & Chen (2017), an instance of DataAnalysisForOptimization is described to optimize scheduling; • almost all articles are applied to a specific domain (AgentMiningApplicationDomain).…”
Section: Agentminingapproachmentioning
confidence: 99%
“…),Thanudas et al (2019),Yang et al (2019); • AgentMiningAlgorithm, AgentMiningModel and AgentMiningProcess can be found in several papers. Some papers even include instances for each of these three concepts (e.g Larsen et al (2019),Roldán et al (2018),Sethi et al (2019)…”
mentioning
confidence: 99%
“…Extant research has not proposed using RL to ensure security in the 6LoWPAN network. However, there are several studies [12]- [17] where RL is used to enhance IDS performance in detecting application-based attacks. They employ Q-learning [13] and a centralised hybrid IDS to perform the detection task over the data received through cluster heads in the WSN.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…In their proposed model RL is used to enhance anomaly IDS detection performance. Similarly, [12] investigates different RL methods, [16], [17]. In [17], researchers employ distributed DRL to boost IDS performance and prepare it against adversarial attack.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…Speed and also the ability to run adversarial attacks with limited resources are important criteria for real-life deployment of neural networks [16][17][18]. JSMA obeys these constraints making its use widespread beyond computer vision applications such as in cybersecurity, anomaly detection and intrusion detection [19][20][21]. Later on, [11] proposes the second example of targeted L 0 attacks known as CW L 0 .…”
Section: Introductionmentioning
confidence: 99%