Proceedings of the International Conference on Applications of Machine Intelligence and Data Analytics (ICAMIDA 2022)

Cyber Attack Detection Using Bellman Optimality Equation in Reinforcement Learning

Authors
Monali Shetty1, *, Sharvari Tamane2
1MGM University, Aurangabad, India
2UDICT, MGM University, Aurangabad, India
*Corresponding author. Email: shettymonalin@gmail.com
Corresponding Author
Monali Shetty
Available Online 1 May 2023.
DOI
10.2991/978-94-6463-136-4_19How to use a DOI?
Keywords
cyber-attack; detection; reinforcement learning; DDOS
Abstract

Cyber-attacks have been always a part of any application that is run on internet. It is a quintessential need to protect vulnerable data from being attacked by malicious people. Along with that it is also necessary to prevent any mishap that has been planned by hackers to destroy or tamper a company’s progress or ongoing work. This research gives a solution that uses reinforcement learning to understand and learn the attack beforehand so that whenever the attack is performed in the future, it will be caught by the system and the authorities can perform preventative measures to avoid the damage. The main objective of this research is dealing with Denial of Service attack in network. The research provides an in-depth view of how attacks can be manifested by malicious individuals. It is also to be noted that the simulation of attacks has also been carried out to understand it better and provide solution for the same in the form of detection mechanism. The use of artificial intelligence, reinforcement learning provides the agent a freedom to explore the environment and understand what an attack is and what is not unlike traditional machine learning algorithms that are restricted to a particular dataset which requires a lot of maintenance and storage.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Applications of Machine Intelligence and Data Analytics (ICAMIDA 2022)
Series
Advances in Computer Science Research
Publication Date
1 May 2023
ISBN
978-94-6463-136-4
ISSN
2352-538X
DOI
10.2991/978-94-6463-136-4_19How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Monali Shetty
AU  - Sharvari Tamane
PY  - 2023
DA  - 2023/05/01
TI  - Cyber Attack Detection Using Bellman Optimality Equation in Reinforcement Learning
BT  - Proceedings of the International Conference on Applications of Machine Intelligence and Data Analytics (ICAMIDA 2022)
PB  - Atlantis Press
SP  - 188
EP  - 200
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-136-4_19
DO  - 10.2991/978-94-6463-136-4_19
ID  - Shetty2023
ER  -