JOURNAL ARTICLE

Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning

Shi DongYuanjun XiaTao Peng

Year: 2021 Journal:   IEEE Transactions on Network and Service Management Vol: 18 (4)Pages: 4197-4212   Publisher: Institute of Electrical and Electronics Engineers

Abstract

The rapid development of Internet technology has brought great convenience to our production life, and the ensuing security problems have become increasingly prominent. These problems threaten users' privacy and pose significant security risks to the normal conduct of many aspects of society, such as politics, economy, culture, and people's livelihood. The growth of the information transmission rate expands the scope of attacks and provides a more attack environment for intruders. Abnormal detection is an effective security protection technology that can monitor network transmission in real-time, effectively sense external attacks, and provide response decisions for relevant managers. The development of machine learning has also led to the development of abnormal traffic detection technology. The goal has been to use powerful and fast learning algorithms to deal with changing threats and respond in real-time. Most of the current abnormal detection research is based on simulation, using public and well-known datasets. On the one hand, the dataset contains high-dimensional massive data, which traditional machine learning methods cannot be processed. On the other hand, the labeled data scale is far behind the application requirements, and the dataset's labels are all manually labeled, so the labeling cost is exceptionally high. This paper proposes a semi-supervised Double Deep Q-Network (SSDDQN)-based optimization method for network abnormal traffic detection, mainly based on Double Deep Q-Network (DDQN), a representative of Deep Reinforcement Learning algorithm. In SSDDQN, the current network first adopts the autoencoder to reconstruct the traffic features and then uses a deep neural network as a classifier. The target network first uses the unsupervised learning algorithm K-Means clustering and then uses deep neural network prediction. The experiment uses NSL-KDD and AWID datasets for training and testing and performs a comprehensive comparison with existing machine learning models. The experimental results show that SSDDQN has certain advantages in time complexity and achieved good results in various evaluation metrics.

Keywords:
Computer science Autoencoder Deep learning Reinforcement learning Artificial intelligence Machine learning Computer security Deep belief network Network security Artificial neural network

Metrics

167
Cited By
20.54
FWCI (Field Weighted Citation Impact)
69
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Abnormal Network Traffic Detection Based on Semi-Supervised Machine Learning

Minjie ZhuNAI-WANG GUO

Journal:   DEStech Transactions on Engineering and Technology Research Year: 2018
JOURNAL ARTICLE

Network Abnormal Traffic Detection Framework Based on Deep Reinforcement Learning

Shi DongYuanjun XiaTao Wang

Journal:   IEEE Wireless Communications Year: 2024 Vol: 31 (3)Pages: 185-193
JOURNAL ARTICLE

Wireless Network Abnormal Traffic Detection Method Based on Deep Transfer Reinforcement Learning

Yuanjun XiaShi DongTao PengTao Wang

Journal:   2021 17th International Conference on Mobility, Sensing and Networking (MSN) Year: 2021 Pages: 528-535
BOOK-CHAPTER

Robust Network Intrusion Detection via Semi-supervised Deep Reinforcement Learning

Riccardo SpolaorTianhao ChenPengfei HuXiuzhen Cheng

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2025 Pages: 179-202
© 2026 ScienceGate Book Chapters — All rights reserved.