Table 2: Reinforcement learning parameters.
Policy Epsilon greedy
Optimizer Adam
batch size 1
minibatch size 500
decay rate 0.99
gamma 0.001
Table 3: Experimental results.
Accuracy 75.65%
Precision 79.51%
F1 score 72.58%
Recall 75.65%
4 CONCLUSION
In this paper, we presented a short description of our
proposed solution for security problem in networks.
We introduced firstly the general context of this re-
search, then we listed a number of existing solution.
in literature. Next we described our solution and our
contributions. This work is an initial proposal; The
next steps are implementation and evaluation of our
proposed model using conventional metrics to show
its efficiency in the detection of zero-day attacks in
real time.
REFERENCES
Nsl kdd. https://www.unb.ca/cic/datasets/nsl.html.
Achbarou, O., Kiram, M., Bourkoukou, O., and Elbouanani,
S. (2018). A Multi-agent System-Based Distributed
Intrusion Detection System for a Cloud Comput-
ing: MEDI 2018 International Workshops, DETECT,
MEDI4SG, IWCFS, REMEDY, Marrakesh, Morocco,
October 24–26, 2018, Proceedings, pages 98–107.
Al-Yaseen, A. P. D. W., Othman, Z., and Ahmad Nazri,
M. Z. (2016). Real-time multi-agent system for an
adaptive intrusion detection system. Pattern Recogni-
tion Letters, 85.
Arel, I., Liu, C., Urbanik, T., and Kohls, A. (2010). Rein-
forcement learning-based multi-agent system for net-
work traffic signal control. Intelligent Transport Sys-
tems, IET, 4:128 – 135.
Diro, A. and Chilamkurti, N. (2017). Distributed attack de-
tection scheme using deep learning approach for inter-
net of things. Future Generation Computer Systems.
FIPA (2002). Fipa abstract architecture specifica-
tion. Available from: http://www. fipa.org/
specs/fipa00001/SC00001L.html.
Gu, T., Abhishek, A., Fu, H., Zhang, H., Basu, D., and
Mohapatra, P. (2020). Towards learning-automation
iot attack detection through reinforcement learning.
In 2020 IEEE 21st International Symposium on ”A
World of Wireless, Mobile and Multimedia Networks”
(WoWMoM), pages 88–97.
Hassan, M. M., Gumaei, A. H., Alsanad, A., Alrubaian, M.,
and Fortino, G. (2020). A hybrid deep learning model
for efficient intrusion detection in big data environ-
ment. Inf. Sci., 513:386–396.
Kukielka, P. and Kotulski, Z. (2008). Analysis of differ-
ent architectures of neural networks for application in
intrusion detection systems. 2008 International Mul-
ticonference on Computer Science and Information
Technology, pages 807–811.
Li, Y. (2017). Deep reinforcement learning: An overview.
Louati, F. and Ktata, F. (2020). A deep learning-based
multi-agent system for intrusion detection. SN Applied
Sciences, 2.
Mahmudul, H., Islam, M, Z., and M.M.A., H. (2019). At-
tack and anomaly detection in iot sensors in iot sites
using machine learning approaches. 7.
Mehmood, A., Mukherjee, M., Ahmed, S. H., Song, H., and
Malik, K. (2018). Nbc-maids: Na
¨
ıve bayesian classi-
fication technique in multi-agent system-enriched ids
for securing iot against ddos attacks. The Journal of
Supercomputing, 74.
Nie, L., Sun, W., Wang, S., Ning, Z., Rodrigues, J. J.
P. C., Wu, Y., and Li, S. (2021). Intrusion detection
in green internet of things: A deep deterministic pol-
icy gradient-based algorithm. IEEE Transactions on
Green Communications and Networking, 5(2):778–
788.
Oprea, M. (2004). Applications of multi-agent systems. In
IFIP Congress Tutorials.
Pajouh, H. H., Dehghantanha, A., Khayami, R., and Choo,
K.-K. R. (2018). A deep recurrent neural network
based approach for internet of things malware threat
hunting. Future Gener. Comput. Syst., 85:88–96.
Rathore, S. and Park, J. (2018). Semi-supervised learning
based distributed attack detection framework for iot.
Appl. Soft Comput., 72:79–89.
Ring, M., Wunderlich, S., Scheuring, D., Landes, D., and
Hotho, A. (2019). A survey of network-based intru-
sion detection data sets. Comput. Secur., 86:147–167.
Saporit, G. (2019). A deeper dive into the nsl-kdd
data set. https://towardsdatascience.com/a-deeper-
dive-into-the-nsl-kdd-data-set-15c753364657.
Servin, A. and Kudenko, D. (2007). Multi-agent reinforce-
ment learning for intrusion detection. In Adaptive
Agents and Multi-Agents Systems.
Sethi, K., Kumar, R., Prajapati, N., and Bera, P. (2020).
Deep reinforcement learning based intrusion detection
system for cloud infrastructure. In 2020 International
Conference on COMmunication Systems NETworkS
(COMSNETS), pages 1–6.
Terzi, D. S., Terzi, R., and Sagiroglu, S. (2017). Big data
analytics for network anomaly detection from netflow
data. In 2017 International Conference on Computer
Science and Engineering (UBMK), pages 592–597.
Wooldridge, M. (2009). An Introduction to MultiAgent Sys-
tems. Wiley Publishing, 2nd edition.
Zerhoudi, S., Granitzer, M., and Garchery, M. (2020). Im-
proving intrusion detection systems using zero-shot
recognition via graph embeddings. In 2020 IEEE 44th
SENSORNETS 2022 - 11th International Conference on Sensor Networks
156