{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:38:15Z","timestamp":1775540295446,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811623790","type":"print"},{"value":"9789811623806","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_66","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:02:47Z","timestamp":1631782967000},"page":"755-762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Reinforcement Learning for the Problem of Detecting Intrusion in a Computer System"],"prefix":"10.1007","author":[{"given":"Quang-Vinh","family":"Dang","sequence":"first","affiliation":[]},{"given":"Thanh-Hai","family":"Vo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"issue":"4","key":"66_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi H, Williams LJ (2010) Principal component analysis. Wiley Interdisciplinary Rev Comput Stat 2(4):433\u2013459","journal-title":"Wiley Interdisciplinary Rev Comput Stat"},{"key":"66_CR2","doi-asserted-by":"crossref","unstructured":"Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: SAC, pp 420\u2013424. ACM","DOI":"10.1145\/967900.967989"},{"key":"66_CR3","unstructured":"Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report"},{"key":"66_CR4","unstructured":"Bhamare D, Salman T, Samaka M, Erbad A, Jain R (2018) Feasibility of supervised machine learning for cloud security. CoRR arXiv:1810.09878"},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Bilge L, Dumitra\u015f T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 833\u2013844","DOI":"10.1145\/2382196.2382284"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: KDD, pp 785\u2013794. ACM","DOI":"10.1145\/2939672.2939785"},{"key":"66_CR7","unstructured":"Dang QV (2018) Outlier detection in network flow analysis. arXiv:1808.02024"},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Dang QV (2019) Reinforcement learning in stock trading. In: International conference on computer science, applied mathematics and applications, pp 311\u2013322. Springer","DOI":"10.1007\/978-3-030-38364-0_28"},{"key":"66_CR9","doi-asserted-by":"crossref","unstructured":"Dang QV (2109) Studying machine learning techniques for intrusion detection systems. In: International conference on future data and security engineering, pp 411\u2013426. Springer","DOI":"10.1007\/978-3-030-35653-8_28"},{"key":"66_CR10","doi-asserted-by":"crossref","unstructured":"Dang QV (2020) Active learning for intrusion detection systems. In: IEEE Research, innovation and vision for the future","DOI":"10.1109\/RIVF48685.2020.9140751"},{"key":"66_CR11","doi-asserted-by":"crossref","unstructured":"Dang QV (2020) Link-sign prediction in signed directed networks from no link perspective. In: International conference on integrated science, pp 291\u2013300. Springer","DOI":"10.1007\/978-3-030-49264-9_26"},{"key":"66_CR12","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-030-63924-2_22","volume-title":"Future data and security engineering","author":"QV Dang","year":"2020","unstructured":"Dang QV (2020) Understanding the decision of machine learning based intrusion detection systems. In: Dang TK, K\u00fcng J, Takizawa M, Chung TM (eds) Future data and security engineering. Springer International Publishing, Cham, pp 379\u2013396"},{"key":"66_CR13","doi-asserted-by":"crossref","unstructured":"Dang Q, Ignat C (2018) Link-sign prediction in dynamic signed directed networks. In: CIC, pp 36\u201345. IEEE Computer Society","DOI":"10.1109\/CIC.2018.00-42"},{"key":"66_CR14","doi-asserted-by":"crossref","unstructured":"Gharib A. Sharafaldin I, Lashkari AH, Ghorbani AA (2016) An evaluation framework for intrusion detection dataset. In: 2016 international conference on information science and security (ICISS), pp 1\u20136. IEEE","DOI":"10.1109\/ICISSEC.2016.7885840"},{"issue":"5","key":"66_CR15","doi-asserted-by":"publisher","first-page":"5947","DOI":"10.4249\/scholarpedia.5947","volume":"4","author":"GE Hinton","year":"2009","unstructured":"Hinton GE (2009) Deep belief networks. Scholarpedia 4(5):5947","journal-title":"Scholarpedia"},{"key":"66_CR16","doi-asserted-by":"crossref","unstructured":"Kausar N, Samir BB, Sulaiman SB, Ahmad I, Hussain M (2012) An approach towards intrusion detection using pca feature subsets and svm. In: 2012 international conference on computer & information science (ICCIS). vol\u00a02, pp 569\u2013574. IEEE","DOI":"10.1109\/ICCISci.2012.6297095"},{"issue":"1","key":"66_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):20","journal-title":"Cybersecurity"},{"issue":"1","key":"66_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/972374.972384","volume":"34","author":"C Kreibich","year":"2004","unstructured":"Kreibich C, Crowcroft J (2004) Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Comput Commun Rev 34(1):51\u201356","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"66_CR19","doi-asserted-by":"crossref","unstructured":"Kr\u00fcgel C, Toth T (2003) Using decision trees to improve signature-based intrusion detection. In: RAID. Lecture Notes in Computer Science, vol\u00a02820, pp 173\u2013191. Springer","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"66_CR20","doi-asserted-by":"crossref","unstructured":"Kumar S, Arora S, et\u00a0al (2019) A statistical analysis on kdd cup99 dataset for the network intrusion detection system. In: International conference on advanced communication and networking, pp 131\u2013157. Springer","DOI":"10.1007\/978-981-15-3852-0_9"},{"key":"66_CR21","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM international conference on data mining, pp 25\u201336. SIAM","DOI":"10.1137\/1.9781611972733.3"},{"issue":"2","key":"66_CR22","first-page":"179","volume":"4","author":"X Li","year":"2001","unstructured":"Li X, Ye N (2001) Decision tree classifiers for computer intrusion detection. J Parallel Distrib Comput Pract 4(2):179\u2013190","journal-title":"J Parallel Distrib Comput Pract"},{"key":"66_CR23","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 Eighth IEEE international conference on data mining, pp 413\u2013422. IEEE","DOI":"10.1109\/ICDM.2008.17"},{"key":"66_CR24","doi-asserted-by":"crossref","unstructured":"Mar\u00edn G, Casas P, Capdehourat G (2020) Deepmal\u2014deep learning models for malware traffic detection and classification. CoRR arXiv:2003.04079","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"66_CR25","doi-asserted-by":"crossref","unstructured":"Mar\u00edn G, Casas, P, Capdehourat G (2020) Deepmal\u2013deep learning models for malware traffic detection and classification. arXiv preprint arXiv:2003.04079","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"66_CR26","unstructured":"Mnih V, Kavukcuoglu K, Silver D, Graves A, Antonoglou I, Wierstra D, Riedmiller MA (2013) Playing atari with deep reinforcement learning. CoRR arXiv:1312.5602"},{"issue":"1","key":"66_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42\u201357","journal-title":"J Netw Comput Appl"},{"key":"66_CR28","unstructured":"Nguyen TT, Reddi VJ (2019) Deep reinforcement learning for cyber security. arXiv:1906.05799"},{"key":"66_CR29","doi-asserted-by":"crossref","unstructured":"Reddy RR, Ramadevi Y, Sunitha KVN (2016) Effective discriminant function for intrusion detection using SVM. In: ICACCI, pp 1148\u20131153. IEEE","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"66_CR30","doi-asserted-by":"crossref","unstructured":"Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):48:1\u201348:36","DOI":"10.1145\/3178582"},{"key":"66_CR31","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch M et al (1999) Snort: lightweight intrusion detection for networks. Lisa 99:229\u2013238","journal-title":"Lisa"},{"key":"66_CR32","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116","DOI":"10.5220\/0006639801080116"},{"key":"66_CR33","doi-asserted-by":"crossref","unstructured":"Stein G, Chen B, Wu AS, Hua KA (2005) Decision tree classifier for network intrusion detection with ga-based feature selection. In: ACM Southeast regional conference (2), pp 136\u2013141. ACM","DOI":"10.1145\/1167253.1167288"},{"key":"66_CR34","unstructured":"Suri R, Murty MN, Athithan G (2019) outlier detection: techniques and applications. Springer"},{"key":"66_CR35","unstructured":"Sutton RS, Barto AG (2018) Reinforcement learning: an introduction. MIT Press"},{"key":"66_CR36","doi-asserted-by":"publisher","first-page":"98600","DOI":"10.1109\/ACCESS.2020.2994947","volume":"8","author":"Y Wu","year":"2020","unstructured":"Wu Y, Lee WW, Xu Z, Ni M (2020) Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access 8:98600\u201398611","journal-title":"IEEE Access"},{"key":"66_CR37","doi-asserted-by":"crossref","unstructured":"Xu X, Wang X (2005) An adaptive network intrusion detection method based on pca and support vector machines. In: International conference on advanced data mining and applications, pp 696\u2013703. Springer","DOI":"10.1007\/11527503_82"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:32:32Z","timestamp":1631784752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_66","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}