Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks

被引:2
|
作者
Louati, Faten [1 ]
Ktata, Farah Barika [2 ]
Amous, Ikram [3 ]
机构
[1] Univ Sfax, FSEG Sfax, MIRACL Lab, Sfax, Tunisia
[2] Univ Sousse, MIRACL Lab, ISSATSo, Sousse, Tunisia
[3] Univ Sfax, MIRACL Lab, Enet'com, Sfax, Tunisia
关键词
Intrusion detection system; Multi agent reinforcement learning; Cyber security; Big data; Anomaly detection; Cloud computing; INTERNET; THINGS;
D O I
10.1007/s10586-024-04306-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing complexity of security threats and the pervasive prevalence of cyberattacks have become more apparent in the present era, and the advent of big data, characterized by its distinctive features, has introduced layers of complexity to security tasks. Intrusion Detection Systems (IDSs) constitute a crucial line of defense, but their adaptation to the realm of big data is imperative. While traditional Machine Learning (ML)-based IDSs have been pivotal in detecting malicious patterns, they are often incapable to keep pace with the demands of expansive big data networks. This paper proposes a novel decentralized Multi-Agent Reinforcement Learning (MARL)-based IDS designed to address the specific challenges posed by big data. Our solution employs decentralized cooperative MARL, securing communicative channels throughout the detection process and concurrent data preprocessing which significantly reduces the overall processing time. Furthermore, the integration of Cloud computing and Big Data streaming techniques further facilitates real-time intrusion detection as cloud's resources allow rapid pre-process and analyse of massive data streams using powerful clusters. Likewise, Big Data streaming techniques ensure that potential intrusions are identified and addressed as they occur. Experimental results, conducted on the widely recognized NSLKDD benchmark dataset, demonstrate the superiority of our solution over other state-of-the-art approaches for big data networks, achieving an accuracy rate of 97.44%.
引用
收藏
页码:6823 / 6841
页数:19
相关论文
共 50 条
  • [21] A Multi-agent Approach for Intrusion Detection in Distributed Systems
    Forestiero, Agostino
    MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, MCSS 2015, 2015, 566 : 72 - 82
  • [22] Big data analysis and distributed deep learning for next-generation intrusion detection system optimization
    Al Jallad, Khloud
    Aljnidi, Mohamad
    Desouki, Mohammad Said
    JOURNAL OF BIG DATA, 2019, 6 (01)
  • [23] Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment
    Chen, Rong
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [24] Multi-Agent Distributed Reinforcement Learning for Making Decentralized Offloading Decisions
    Tan, Jing
    Khalili, Ramin
    Karl, Holger
    Hecker, Artur
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 2098 - 2107
  • [25] Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment
    Chen, Rong
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [26] Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment
    Chen, Rong
    Computational Intelligence and Neuroscience, 2022, 2022
  • [27] Applying Big Data Based Deep Learning System to Intrusion Detection
    Zhong, Wei
    Yu, Ning
    Ai, Chunyu
    BIG DATA MINING AND ANALYTICS, 2020, 3 (03): : 181 - 195
  • [28] Applying Big Data Based Deep Learning System to Intrusion Detection
    Wei Zhong
    Ning Yu
    Chunyu Ai
    Big Data Mining and Analytics, 2020, 3 (03) : 181 - 195
  • [29] Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning
    Kazari, Kiarash
    Shereen, Ezzeldin
    Dan, Gyorgy
    PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 162 - 170
  • [30] Scalable malware detection system using big data and distributed machine learning approach
    Manish Kumar
    Soft Computing, 2022, 26 : 3987 - 4003