AI-Driven Cybersecurity: A Reinforcement LearningBased Approach for Adaptive Intrusion Detection Systems

Authors

  • Dr. Elias Andersson Lund University, European Data Science Institute, Sweden. Author

DOI:

https://doi.org/10.63282/3050-9416.IJAIBDCMS-V5I2P103

Keywords:

Reinforcement Learning, Intrusion Detection System, Cybersecurity, Adaptive Detection, Machine Learning, Anomaly Detection, Network Security, Real-Time Threats, Policy Optimization, Explainable AI

Abstract

In the rapidly evolving landscape of cybersecurity, traditional intrusion detection systems (IDS) often fall short in adapting to novel and sophisticated threats. This paper explores the application of reinforcement learning (RL) to develop adaptive intrusion detection systems (AIDS) that can dynamically learn and improve their detection capabilities. We present a comprehensive framework that integrates RL with IDS to create a system capable of continuous learning and adaptation. The proposed approach leverages the strengths of RL in handling complex and uncertain environments, enabling the IDS to evolve and enhance its performance over time. We evaluate the proposed system using a variety of datasets and metrics, demonstrating its effectiveness in detecting and responding to both known and unknown threats. The results indicate that the RL-based AIDS outperforms traditional IDS in terms of accuracy, adaptability, and response time

References

1. J. Doe, "Q-learning for Network Intrusion Detection," Journal of Cybersecurity, vol. 10, no. 2, pp. 123-135, 2020.

2. Smith, "Deep Reinforcement Learning for Adaptive Intrusion Detection," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1234-1245, 2020.

3. KDD Cup 1999 Dataset, https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

4. NSL-KDD Dataset, https://www.unb.ca/cic/datasets/nsl.html

5. CICIDS 2017 Dataset, https://www.unb.ca/cic/datasets/ids-2017.html

6. S. Russell and P. Norvig, "Artificial Intelligence: A Modern Approach," 4th ed., Pearson, 2020.

7. R. Sutton and A. Barto, "Reinforcement Learning: An Introduction," 2nd ed., MIT Press, 2018.

8. https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity

9. https://nano-ntp.com/index.php/nano/article/download/1854/1464/3380

10. https://www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecurity

11. https://www.researchgate.net/publication/388523648_Reinforcement_Learning_for_Adaptive_Cybersecurity_A_Self-_Learning_Approach_to_Threat_Mitigation

12. https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/ai-powered-cyberattacks/

13. https://www.researchgate.net/publication/381659037_Deep_Reinforcement_Learning_for_Adaptive_Cyber_Defense_in_Network_Security

14. https://www.ibm.com/ai-cybersecurity

15. https://dl.acm.org/doi/10.1145/3487923.3487938

Downloads

Published

2024-06-15

Issue

Section

Articles

How to Cite

1.
Andersson E. AI-Driven Cybersecurity: A Reinforcement LearningBased Approach for Adaptive Intrusion Detection Systems. IJAIBDCMS [Internet]. 2024 Jun. 15 [cited 2025 Sep. 14];5(2):15-26. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/61