{"id":"https://openalex.org/W4399728997","doi":"https://doi.org/10.1109/syscon61195.2024.10553626","title":"Transforming Cybersecurity Dynamics: Enhanced Self-Play Reinforcement Learning in Intrusion Detection and Prevention System","display_name":"Transforming Cybersecurity Dynamics: Enhanced Self-Play Reinforcement Learning in Intrusion Detection and Prevention System","publication_year":2024,"publication_date":"2024-04-15","ids":{"openalex":"https://openalex.org/W4399728997","doi":"https://doi.org/10.1109/syscon61195.2024.10553626"},"language":"en","primary_location":{"id":"doi:10.1109/syscon61195.2024.10553626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon61195.2024.10553626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kth.diva-portal.org/smash/get/diva2:1882693/FULLTEXT01","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003393896","display_name":"Aws Naser Jaber","orcid":"https://orcid.org/0000-0001-5206-9155"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Aws Jaber","raw_affiliation_strings":["KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden","Division of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"Division of Network and Systems Engineering, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003393896"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":2.4949,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8955263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7439177632331848},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6601028442382812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6170421838760376},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.607099175453186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5647258758544922},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5505526065826416},{"id":"https://openalex.org/keywords/dynamics","display_name":"Dynamics (music)","score":0.5007054805755615},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2563800811767578},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07178357243537903},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.06545159220695496}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7439177632331848},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6601028442382812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6170421838760376},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.607099175453186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5647258758544922},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5505526065826416},{"id":"https://openalex.org/C145912823","wikidata":"https://www.wikidata.org/wiki/Q113558","display_name":"Dynamics (music)","level":2,"score":0.5007054805755615},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2563800811767578},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07178357243537903},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.06545159220695496},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/syscon61195.2024.10553626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon61195.2024.10553626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:kth-350133","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-350133","pdf_url":"https://kth.diva-portal.org/smash/get/diva2:1882693/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:kth-350133","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-350133","pdf_url":"https://kth.diva-portal.org/smash/get/diva2:1882693/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320318377","display_name":"European Defence Fund","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399728997.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W52153049","https://openalex.org/W1530655603","https://openalex.org/W1542941925","https://openalex.org/W1966962864","https://openalex.org/W2032062767","https://openalex.org/W2032243783","https://openalex.org/W2043210121","https://openalex.org/W2059417808","https://openalex.org/W2059829651","https://openalex.org/W2098614265","https://openalex.org/W2114133631","https://openalex.org/W2116327978","https://openalex.org/W2122291740","https://openalex.org/W2133678991","https://openalex.org/W2350443001","https://openalex.org/W2735364196","https://openalex.org/W2736601468","https://openalex.org/W2792861141","https://openalex.org/W2817050390","https://openalex.org/W2912471702","https://openalex.org/W2948565504","https://openalex.org/W2959460122","https://openalex.org/W3004908285","https://openalex.org/W3107852229","https://openalex.org/W4206021272","https://openalex.org/W4224220194","https://openalex.org/W4239466562","https://openalex.org/W4287078276","https://openalex.org/W4296717257","https://openalex.org/W4306412489","https://openalex.org/W4366319733","https://openalex.org/W4378192619","https://openalex.org/W4390356158","https://openalex.org/W6741002519","https://openalex.org/W6748839928","https://openalex.org/W6798316476","https://openalex.org/W6843322030"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W1513478798","https://openalex.org/W2388497169","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W3120393658","https://openalex.org/W2133389611"],"abstract_inverted_index":{"In":[0],"the":[1,7,31,39,57,77,92,104,135,147,175,184],"rapidly":[2],"evolving":[3,117],"realm":[4],"of":[5,33,61,74,81,108,149,177,186],"cybersecurity,":[6],"need":[8],"for":[9,195],"dynamic":[10,136],"and":[11,26,70,106,141,157,166],"adaptive":[12],"defense":[13],"mechanisms":[14],"is":[15],"paramount.":[16],"This":[17,63],"article":[18],"introduces":[19],"an":[20,87,142],"innovative":[21,88],"approach":[22],"to":[23,55,76,114,182],"intrusion":[24,124,187],"detection":[25,165],"prevention":[27,125,188],"systems":[28],"(IDPS)":[29],"through":[30,152],"application":[32],"self-play":[34],"reinforcement":[35],"learning.":[36],"We":[37],"extend":[38],"existing":[40],"framework":[41],"by":[42],"integrating":[43],"a":[44,67,127,139,192],"model-free,":[45],"off-policy":[46],"algorithm,":[47],"Twin":[48],"Delayed":[49],"Deep":[50],"Deterministic":[51],"Policy":[52],"Gradients":[53],"(TD3),":[54],"enhance":[56],"automated":[58],"response":[59,110,167],"capabilities":[60],"IDPS.":[62],"advancement":[64],"results":[65],"in":[66,163,198],"more":[68],"effective":[69],"adaptable":[71],"system":[72],"capable":[73],"responding":[75],"dynamically":[78],"changing":[79],"landscape":[80,185],"cyber":[82,118],"threats.":[83,119],"Furthermore,":[84],"we":[85],"introduce":[86],"policy":[89,155,180],"strategy":[90],"within":[91],"TD3":[93],"framework,":[94],"coupled":[95],"with":[96],"substantial":[97],"auto-regression":[98],"enhancements.":[99],"These":[100],"enhancements":[101],"significantly":[102],"improve":[103],"robustness":[105],"adaptability":[107],"cybersecurity":[109],"infrastructures,":[111],"equipping":[112],"them":[113],"better":[115],"handle":[116],"Our":[120],"methodology":[121],"involves":[122],"modelling":[123],"as":[126],"zero-sum":[128],"game":[129],"using":[130],"Markov":[131],"games,":[132],"which":[133],"captures":[134],"interaction":[137],"between":[138],"defender":[140],"attacker.":[143],"The":[144,172],"paper":[145],"showcases":[146],"effectiveness":[148],"these":[150],"approaches":[151],"enhanced":[153,178],"self-play,":[154],"refinement,":[156],"simulation":[158],"scenarios,":[159],"indicating":[160],"significant":[161],"improvements":[162],"threat":[164],"over":[168],"traditional":[169],"security":[170],"mechanisms.":[171],"findings":[173],"underscore":[174],"potential":[176],"autoregressive":[179],"representation":[181],"reshape":[183],"strategies,":[189],"making":[190],"it":[191],"promising":[193],"candidate":[194],"broader":[196],"applications":[197],"cybersecurity.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
