Double DQN Method For Botnet Traffic Detection System

被引:0
|
作者
Hu, Yutao [1 ]
Zhao, Yuntao [1 ]
Feng, Yongxin [2 ]
Ma, Xiangyu [1 ]
机构
[1] Shenyang Ligong Univ, Sch Informat Sci & Engn, Shenyang 110159, Peoples R China
[2] Shenyang Ligong Univ, Grad Sch, Shenyang 110159, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
DQN; DDQN; deep reinforcement learning; botnet detection; feature classification;
D O I
10.32604/cmc.2024.042216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the face of the increasingly severe Botnet problem on the Internet, how to effectively detect Botnet traffic in realtime has become a critical problem. Although the existing deep Q network (DQN) algorithm in Deep reinforcement learning can solve the problem of real-time updating, its prediction results are always higher than the actual results. In Botnet traffic detection, although it performs well in the training set, the accuracy rate of predicting traffic is as high as%; however, in the test set, its accuracy has declined, and it is impossible to adjust its prediction strategy on time based on new data samples. However, in the new dataset, its accuracy has declined significantly. Therefore, this paper proposes a Botnet traffic detection system based on double-layer DQN (DDQN). Two Q-values are designed to adjust the model in policy and action, respectively, to achieve real-time model updates and improve the universality and robustness of the model under different data sets. Experiments show that compared with the DQN model, when using DDQN, the Q-value is not too high, and the detection model has improved the accuracy and precision of Botnet traffic. Moreover, when using Botnet data sets other than the test set, the accuracy and precision of the DDQN model are still higher than DQN.
引用
下载
收藏
页码:509 / 530
页数:22
相关论文
共 50 条
  • [21] Automated Botnet Traffic Detection via Machine Learning
    Wai, Fok Kar
    Zheng Lilei
    Wai, Watt Kwong
    Le, Su
    Thing, Vrizlynn L. L.
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 0038 - 0043
  • [22] Deep Graph Embedding for IoT Botnet Traffic Detection
    Zhang, Bonan
    Li, Jingjin
    Ward, Lindsay
    Zhang, Ying
    Chen, Chao
    Zhang, Jun
    Security and Communication Networks, 2023, 2023
  • [23] A Botnet Detection Method Based on SCBRNN
    Xu, Yafeng
    Zhang, Kailiang
    Zhou, Qi
    Cui, Ping
    SIMULATION TOOLS AND TECHNIQUES, SIMUTOOLS 2021, 2022, 424 : 123 - 131
  • [24] A lightweight hybrid detection method for botnet
    Ma W.
    Wang X.
    Wang J.
    Chen Q.
    International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 960 - 969
  • [25] An Efficient Botnet Detection System for P2P Botnet
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1217 - 1221
  • [26] Peer to Peer Botnet Detection Based on Network Traffic Analysis
    Almutairi, Suzan
    Mahfoudh, Saoucene
    Alowibdi, Jalal S.
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [27] Botnet Detection on TCP Traffic Using Supervised Machine Learning
    Velasco-Mata, Javier
    Fidalgo, Eduardo
    Gonzalez-Castro, Victor
    Alegre, Enrique
    Blanco-Medina, Pablo
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2019, 2019, 11734 : 444 - 455
  • [28] Botnet detection based on traffic behavior analysis and flow intervals
    Zhao, David
    Traore, Issa
    Sayed, Bassam
    Lu, Wei
    Saad, Sherif
    Ghorbani, Ali
    Garant, Dan
    COMPUTERS & SECURITY, 2013, 39 : 2 - 16
  • [29] A Review of Botnet Detection Approaches Based on DNS Traffic Analysis
    Al-Mashhadi, Saif
    Anbar, Mohammed
    Karuppayah, Shankar
    Al-Ani, Ahmed K.
    INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 305 - 321
  • [30] Detection of Botnet Command and Control Traffic by the Identification of Untrusted Destinations
    Burghouwt, Pieter
    Spruit, Marcel
    Sips, Henk
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 174 - 182