AI-Driven Cybersecurity: A Reinforcement LearningBased Approach for Adaptive Intrusion Detection Systems
DOI:
https://doi.org/10.63282/3050-9416.IJAIBDCMS-V5I2P103Keywords:
Reinforcement Learning, Intrusion Detection System, Cybersecurity, Adaptive Detection, Machine Learning, Anomaly Detection, Network Security, Real-Time Threats, Policy Optimization, Explainable AIAbstract
In the rapidly evolving landscape of cybersecurity, traditional intrusion detection systems (IDS) often fall short in adapting to novel and sophisticated threats. This paper explores the application of reinforcement learning (RL) to develop adaptive intrusion detection systems (AIDS) that can dynamically learn and improve their detection capabilities. We present a comprehensive framework that integrates RL with IDS to create a system capable of continuous learning and adaptation. The proposed approach leverages the strengths of RL in handling complex and uncertain environments, enabling the IDS to evolve and enhance its performance over time. We evaluate the proposed system using a variety of datasets and metrics, demonstrating its effectiveness in detecting and responding to both known and unknown threats. The results indicate that the RL-based AIDS outperforms traditional IDS in terms of accuracy, adaptability, and response time
References
1. J. Doe, "Q-learning for Network Intrusion Detection," Journal of Cybersecurity, vol. 10, no. 2, pp. 123-135, 2020.
2. Smith, "Deep Reinforcement Learning for Adaptive Intrusion Detection," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1234-1245, 2020.
3. KDD Cup 1999 Dataset, https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
4. NSL-KDD Dataset, https://www.unb.ca/cic/datasets/nsl.html
5. CICIDS 2017 Dataset, https://www.unb.ca/cic/datasets/ids-2017.html
6. S. Russell and P. Norvig, "Artificial Intelligence: A Modern Approach," 4th ed., Pearson, 2020.
7. R. Sutton and A. Barto, "Reinforcement Learning: An Introduction," 2nd ed., MIT Press, 2018.
8. https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity
9. https://nano-ntp.com/index.php/nano/article/download/1854/1464/3380
10. https://www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecurity
12. https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/ai-powered-cyberattacks/