Double DQN Method For Botnet Traffic Detection System

被引:0
|
作者
Hu, Yutao [1 ]
Zhao, Yuntao [1 ]
Feng, Yongxin [2 ]
Ma, Xiangyu [1 ]
机构
[1] Shenyang Ligong Univ, Sch Informat Sci & Engn, Shenyang 110159, Peoples R China
[2] Shenyang Ligong Univ, Grad Sch, Shenyang 110159, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
DQN; DDQN; deep reinforcement learning; botnet detection; feature classification;
D O I
10.32604/cmc.2024.042216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the face of the increasingly severe Botnet problem on the Internet, how to effectively detect Botnet traffic in realtime has become a critical problem. Although the existing deep Q network (DQN) algorithm in Deep reinforcement learning can solve the problem of real-time updating, its prediction results are always higher than the actual results. In Botnet traffic detection, although it performs well in the training set, the accuracy rate of predicting traffic is as high as%; however, in the test set, its accuracy has declined, and it is impossible to adjust its prediction strategy on time based on new data samples. However, in the new dataset, its accuracy has declined significantly. Therefore, this paper proposes a Botnet traffic detection system based on double-layer DQN (DDQN). Two Q-values are designed to adjust the model in policy and action, respectively, to achieve real-time model updates and improve the universality and robustness of the model under different data sets. Experiments show that compared with the DQN model, when using DDQN, the Q-value is not too high, and the detection model has improved the accuracy and precision of Botnet traffic. Moreover, when using Botnet data sets other than the test set, the accuracy and precision of the DDQN model are still higher than DQN.
引用
下载
收藏
页码:509 / 530
页数:22
相关论文
共 50 条
  • [1] An advanced method for detection of botnet traffic using Intrusion Detection System
    Koli, Manoj S.
    Chavan, Manik K.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 481 - 485
  • [2] Double DQN Method For Object Detection
    Zuo, Guoyu
    Du, Tingting
    Lu, Jiahao
    2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 6727 - 6732
  • [3] A Novel HTTP Botnet Traffic Detection Method
    Tyagi, Rohit
    Paul, Tuhin
    Manoj, B. S.
    Thanudas, B.
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [4] Distributed System for Botnet Traffic Analysis and Anomaly Detection
    Kozik, Rafal
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 330 - 335
  • [5] OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning
    Hu Y.
    Zhao Y.
    Feng Y.
    Ma X.
    International Journal of Security and Networks, 2024, 19 (01) : 31 - 42
  • [6] Botnet Detection Based on Traffic Monitoring
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Bt
    Vahdani, Payam
    Tabatabaei, Farzaneh
    Zamani, Mazdak
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 97 - 101
  • [7] Centralized Botnet Detection by Traffic Aggregation
    Wang, Tao
    Yu, Shun-Zheng
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 86 - 93
  • [8] IRC traffic analysis for botnet detection
    Mazzariello, Claudio
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 318 - 323
  • [9] BotDet: A System for Real Time Botnet Command and Control Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Baker, Thar
    Jabbar, Sohail
    Khalid, Shehzad
    Jaf, Sardar
    IEEE ACCESS, 2018, 6 : 38947 - 38958
  • [10] PsyBoG: A scalable botnet detection method for large-scale DNS traffic
    Kwon, Jonghoon
    Lee, Jehyun
    Lee, Heejo
    Perrig, Adrian
    COMPUTER NETWORKS, 2016, 97 : 48 - 73