{"id":"https://openalex.org/W3217115371","doi":"https://doi.org/10.3390/computers11030041","title":"Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection","display_name":"Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection","publication_year":2022,"publication_date":"2022-03-11","ids":{"openalex":"https://openalex.org/W3217115371","doi":"https://doi.org/10.3390/computers11030041","mag":"3217115371"},"language":"en","primary_location":{"id":"doi:10.3390/computers11030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11030041","pdf_url":"https://www.mdpi.com/2073-431X/11/3/41/pdf?version=1647278705","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/11/3/41/pdf?version=1647278705","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012892246","display_name":"Hooman Alavizadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I4210088705","display_name":"Imam Reza International University","ror":"https://ror.org/007jfm765","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210088705"]}],"countries":["AU","IR"],"is_corresponding":true,"raw_author_name":"Hooman Alavizadeh","raw_affiliation_strings":["Computer Engineering Department, Imam Reza International University, Mashhad 553-91735, Iran","UNSW Institute for Cyber Security, University of New South Wales, Canberra 2612, Australia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Imam Reza International University, Mashhad 553-91735, Iran","institution_ids":["https://openalex.org/I4210088705"]},{"raw_affiliation_string":"UNSW Institute for Cyber Security, University of New South Wales, Canberra 2612, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062163307","display_name":"Hootan Alavizadeh","orcid":"https://orcid.org/0000-0003-0344-4494"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]},{"id":"https://openalex.org/I4210088705","display_name":"Imam Reza International University","ror":"https://ror.org/007jfm765","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210088705"]}],"countries":["AU","IR"],"is_corresponding":false,"raw_author_name":"Hootan Alavizadeh","raw_affiliation_strings":["Computer Engineering Department, Imam Reza International University, Mashhad 553-91735, Iran","UNSW Institute for Cyber Security, University of New South Wales, Canberra 2612, Australia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Imam Reza International University, Mashhad 553-91735, Iran","institution_ids":["https://openalex.org/I4210088705"]},{"raw_affiliation_string":"UNSW Institute for Cyber Security, University of New South Wales, Canberra 2612, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007979944","display_name":"Julian Jang\u2010Jaccard","orcid":"https://orcid.org/0000-0002-1002-057X"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Julian Jang-Jaccard","raw_affiliation_strings":["Cybersecurity Laboratory, School of Information Technology and Electrical Engineering, Massey University, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Laboratory, School of Information Technology and Electrical Engineering, Massey University, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012892246"],"corresponding_institution_ids":["https://openalex.org/I31746571","https://openalex.org/I4210088705"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":27.4048,"has_fulltext":false,"cited_by_count":204,"citation_normalized_percentile":{"value":0.99870249,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"11","issue":"3","first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8140382766723633},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8101625442504883},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7726933360099792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7156864404678345},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6451238393783569},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.5627240538597107},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5013265609741211},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4979248046875},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47285059094429016},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32417064905166626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8140382766723633},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8101625442504883},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7726933360099792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7156864404678345},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6451238393783569},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.5627240538597107},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5013265609741211},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4979248046875},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47285059094429016},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32417064905166626},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers11030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11030041","pdf_url":"https://www.mdpi.com/2073-431X/11/3/41/pdf?version=1647278705","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8e5c19b63c76475ba66068faddcd4baa","is_oa":true,"landing_page_url":"https://doaj.org/article/8e5c19b63c76475ba66068faddcd4baa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 11, Iss 3, p 41 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers11030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers11030041","pdf_url":"https://www.mdpi.com/2073-431X/11/3/41/pdf?version=1647278705","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8952932116","display_name":null,"funder_award_id":"MAUX1912","funder_id":"https://openalex.org/F4320321983","funder_display_name":"Ministry of Business, Innovation and Employment"}],"funders":[{"id":"https://openalex.org/F4320321983","display_name":"Ministry of Business, Innovation and Employment","ror":"https://ror.org/02jtq1b51"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3217115371.pdf","grobid_xml":"https://content.openalex.org/works/W3217115371.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1996342777","https://openalex.org/W2028070713","https://openalex.org/W2057405971","https://openalex.org/W2065776696","https://openalex.org/W2099940443","https://openalex.org/W2755588949","https://openalex.org/W2787887017","https://openalex.org/W2801735406","https://openalex.org/W2810087077","https://openalex.org/W2896760688","https://openalex.org/W2897830718","https://openalex.org/W2901561143","https://openalex.org/W2908403421","https://openalex.org/W2913497771","https://openalex.org/W2946127746","https://openalex.org/W2952298682","https://openalex.org/W2968232309","https://openalex.org/W2973862992","https://openalex.org/W2980588984","https://openalex.org/W2986055611","https://openalex.org/W2991722918","https://openalex.org/W2993999308","https://openalex.org/W2998658470","https://openalex.org/W3004099454","https://openalex.org/W3005805195","https://openalex.org/W3006537789","https://openalex.org/W3011524935","https://openalex.org/W3012637289","https://openalex.org/W3025125719","https://openalex.org/W3033044509","https://openalex.org/W3037958117","https://openalex.org/W3088376608","https://openalex.org/W3092637398","https://openalex.org/W3097543155","https://openalex.org/W3102376457","https://openalex.org/W3111112931","https://openalex.org/W3118181167","https://openalex.org/W3123212791","https://openalex.org/W3130637594","https://openalex.org/W3130991947","https://openalex.org/W3133958367","https://openalex.org/W3184395191","https://openalex.org/W3192468199","https://openalex.org/W3198991722","https://openalex.org/W3203072121","https://openalex.org/W3210309835","https://openalex.org/W6751468275","https://openalex.org/W6753259544","https://openalex.org/W6798829740"],"related_works":["https://openalex.org/W4390421286","https://openalex.org/W4280563792","https://openalex.org/W2140186469","https://openalex.org/W4389724018","https://openalex.org/W4318719684","https://openalex.org/W2775233965","https://openalex.org/W4318559728","https://openalex.org/W4360995913","https://openalex.org/W4281847915","https://openalex.org/W3000635674"],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,6,22,30,58,103,121,160],"the":[3,28,59,119,127,142,148,163],"new":[4,56],"generation":[5,57],"cyber":[7,14],"threats":[8],"demands":[9],"more":[10,131],"sophisticated":[11],"and":[12,111,184],"intelligent":[13],"defense":[15],"solutions":[16],"equipped":[17],"with":[18,71],"autonomous":[19],"agents":[20],"capable":[21],"learning":[23,35,70,189],"to":[24,135],"make":[25],"decisions":[26],"without":[27],"knowledge":[29],"human":[31],"experts.":[32],"Several":[33],"reinforcement":[34,69],"methods":[36],"(e.g.,":[37],"Markov)":[38],"for":[39,79,94,130],"automated":[40,108],"network":[41,60,77,80,96,104],"intrusion":[42,61,81,182],"tasks":[43],"have":[44],"been":[45],"proposed":[46,84,174],"in":[47,126,179],"recent":[48],"years.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,145],"introduce":[54],"a":[55,66,72,95],"detection":[62,115],"method,":[63],"which":[64,152],"combines":[65],"Q-learning":[67],"based":[68,140],"deep":[73],"feed":[74],"forward":[75],"neural":[76],"method":[78],"detection.":[82],"Our":[83,167],"Deep":[85],"Q-Learning":[86],"(DQL)":[87],"model":[88,129],"provides":[89],"an":[90,107],"ongoing":[91],"auto-learning":[92],"capability":[93],"environment":[97],"that":[98,147,172],"can":[99],"detect":[100],"different":[101,123,181],"types":[102],"intrusions":[105],"using":[106],"trial-error":[109],"approach":[110],"continuously":[112],"enhance":[113],"its":[114],"capabilities.":[116],"We":[117],"provide":[118],"details":[120],"fine-tuning":[122],"hyperparameters":[124],"involved":[125],"DQL":[128,175],"effective":[132,178],"self-learning.":[133],"According":[134],"our":[136,173],"extensive":[137],"experimental":[138,168],"results":[139,169],"on":[141],"NSL-KDD":[143],"dataset,":[144],"confirm":[146],"lower":[149],"discount":[150],"factor,":[151],"is":[153,176],"set":[154],"as":[155],"0.001":[156],"under":[157],"250":[158],"episodes":[159],"training,":[161],"yields":[162],"best":[164],"performance":[165],"results.":[166],"also":[170],"show":[171],"highly":[177],"detecting":[180],"classes":[183],"outperforms":[185],"other":[186],"similar":[187],"machine":[188],"approaches.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":11},{"year":2025,"cited_by_count":71},{"year":2024,"cited_by_count":61},{"year":2023,"cited_by_count":43},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2021-12-06T00:00:00"}
