{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:31:41Z","timestamp":1772199101980,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_14","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:58:50Z","timestamp":1760363930000},"page":"255-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Intrusion Detection System Based on\u00a0Reinforcement Learning Technique Optimization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7815-9907","authenticated-orcid":false,"given":"Sukkarin","family":"Ruensukont","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6098-6228","authenticated-orcid":false,"given":"Karin","family":"Sumonkayothin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9023-3208","authenticated-orcid":false,"given":"Prarinya","family":"Siritanawan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3714-8482","authenticated-orcid":false,"given":"Narit","family":"Hnoohom","sequence":"additional","affiliation":[]},{"given":"Setthawhut","family":"Saennam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4109-3763","authenticated-orcid":false,"given":"Razvan","family":"Beuran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"14_CR1","unstructured":"A., A.H., et\u00a0al.: Machine learning-based intrusion detection system. J. Cybersecur. Res. (2020)"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Alikhanov, J., Jang, R., Abuhamad, M., Mohaisen, D., Nyang, D., Noh, Y.: Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches. IEEE Access 10, 5801\u20135823 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2021.3137318","DOI":"10.1109\/ACCESS.2021.3137318"},{"issue":"10","key":"14_CR3","doi-asserted-by":"publisher","first-page":"11089","DOI":"10.1109\/TVT.2022.3186834","volume":"71","author":"H Benaddi","year":"2022","unstructured":"Benaddi, H., Ibrahimi, K., Benslimane, A., Jouhari, M., Qadir, J.: Robust enhancement of intrusion detection systems using deep reinforcement learning and stochastic game. IEEE Trans. Veh. Technol. 71(10), 11089\u201311102 (2022)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Damasevicius, R., Venckauskas, A., Grigaliunas, S., Toldinas, J., Morkevicius, N., Aleliunas, T., Smuikys, P.: LITNET-2020: an annotated real-world network flow dataset for network intrusion detection. Electronics 9(5) (2020). https:\/\/doi.org\/10.3390\/electronics9050800","DOI":"10.3390\/electronics9050800"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Dang, Q.V., Vo, T.H.: Studying the reinforcement learning techniques for the problem of intrusion detection. Int. J. Cybersecur. (2021)","DOI":"10.1109\/ICAIBD51990.2021.9459006"},{"issue":"4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1109\/TNSM.2021.3120804","volume":"18","author":"S Dong","year":"2021","unstructured":"Dong, S., Xia, Y., Peng, T.: Network abnormal traffic detection model based on semi-supervised deep reinforcement learning. IEEE Trans. Netw. Serv. Manage. 18(4), 4197\u20134212 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"14_CR7","unstructured":"Grigaliunas, F.N.O.I.: LITNET-2020: an annotated real-world network flow dataset for network intrusion detection (2020). https:\/\/github.com\/Grigaliunas\/electronics9050800. Accessed 24 Mar 2025"},{"key":"14_CR8","unstructured":"Han, H., et\u00a0al.: Reinforcement learning in cybersecurity. Symmetry (2021). https:\/\/www.mdpi.com\/2073-8994\/14\/1\/161"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Hsu, Y.F., Matsuoka, M.: A deep reinforcement learning approach for anomaly network intrusion detection system. In: 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/CloudNet51028.2020.9335796"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Kabir, E., Hu, J., Wang, H., Zhuo, G.: A novel statistical technique for intrusion detection systems. Futur. Gener. Comput. Syst. 79, 303\u2013318 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.01.029, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X17301371","DOI":"10.1016\/j.future.2017.01.029"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"103502","DOI":"10.1016\/j.cose.2023.103502","volume":"135","author":"Z Li","year":"2023","unstructured":"Li, Z., Huang, C., Deng, S., Qiu, W., Gao, X.: A soft actor-critic reinforcement learning algorithm for network intrusion detection. Comput. Secur. 135, 103502 (2023)","journal-title":"Comput. Secur."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"153153","DOI":"10.1109\/ACCESS.2021.3127689","volume":"9","author":"M Lopez-Martin","year":"2021","unstructured":"Lopez-Martin, M., Sanchez-Esguevillas, A., Arribas, J.I., Carro, B.: Network intrusion detection based on extended RBF neural network with offline reinforcement learning. IEEE Access 9, 153153\u2013153170 (2021)","journal-title":"IEEE Access"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Masum, M., et al.: Bayesian hyperparameter optimization for deep neural network-based network intrusion detection (2022). https:\/\/doi.org\/10.48550\/arXiv.2207.09902. arXiv preprint","DOI":"10.48550\/arXiv.2207.09902"},{"issue":"5","key":"14_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.3390\/jsan12050068","volume":"12","author":"M Mouyart","year":"2023","unstructured":"Mouyart, M., Machado, G.M., Jun, J.Y.: A multi-agent intrusion detection system optimized by a deep reinforcement learning approach with a dataset enlarged using a generative model to reduce the bias effect. J. Sens. Actuator Netw. 12(5), 68 (2023)","journal-title":"J. Sens. Actuator Netw."},{"key":"14_CR15","unstructured":"Organizers, T.K.C..: KDD cup 1999 data. The third international knowledge discovery and data mining tools competition (1999). https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html, accessed: 2025-03-21"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Powell, B.K.M., Machalek, D., Quah, T.: Real-time optimization using reinforcement learning. Comput. Chem. Eng. 143, 107077 (2020). https:\/\/doi.org\/10.1016\/j.compchemeng.2020.107077, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0098135420305500","DOI":"10.1016\/j.compchemeng.2020.107077"},{"key":"14_CR17","unstructured":"Rejimol\u00a0Robinson, R.R., Anagha\u00a0Madhav, K.P., Thomas, C.: Improved minority attack detection in intrusion detection system using efficient feature selection algorithms. Expert Syst. 41(7), 1\u201320 (2024). https:\/\/research.ebsco.com\/linkprocessor\/plink?id=9da677a7-ab90-3108-b348-9f7d9777d131"},{"issue":"1","key":"14_CR18","doi-asserted-by":"publisher","first-page":"15370","DOI":"10.1038\/s41598-022-19366-3","volume":"12","author":"K Ren","year":"2022","unstructured":"Ren, K., Zeng, Y., Cao, Z., Zhang, Y.: ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model. Sci. Rep. 12(1), 15370 (2022)","journal-title":"Sci. Rep."},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1186\/s40537-023-00814-4","volume":"10","author":"K Ren","year":"2023","unstructured":"Ren, K., Zeng, Y., Zhong, Y., Sheng, B., Zhang, Y.: MAFSIDS: a reinforcement learning-based intrusion detection model for multi-agent feature selection networks. J. Big Data 10(1), 137 (2023)","journal-title":"J. Big Data"},{"key":"14_CR20","unstructured":"Roshan, K., et\u00a0al.: A novel deep learning-based model to defend network intrusion detection systems against adversarial attacks. IEEE Trans. Inf. Forensics Secur. (2022)"},{"key":"14_CR21","first-page":"102923","volume":"61","author":"K Sethi","year":"2021","unstructured":"Sethi, K., Madhav, Y.V., Kumar, R., Bera, P.: Attention based multi-agent intrusion detection systems using reinforcement learning. J. Inf. Secur. Appl. 61, 102923 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s10207-019-00482-7","volume":"19","author":"K Sethi","year":"2020","unstructured":"Sethi, K., Rupesh, E.S., Kumar, R., Bera, P., Madhav, Y.V.: A context-aware robust intrusion detection system: a reinforcement learning-based approach. Int. J. Inf. Secur. 19, 657\u2013678 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, January 2018 (2018). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html, accessed: 2025-03-21","DOI":"10.5220\/0006639801080116"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Vembu, G., Rd, R.: Optimized deep learning-based intrusion detection for wireless sensor networks. Int. J. Commun. Syst. 36 (2022). https:\/\/doi.org\/10.1002\/dac.5254","DOI":"10.1002\/dac.5254"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Wang, L., Pan, Z., Wang, J.: A review of reinforcement learning based intelligent optimization for manufacturing scheduling. Complex Syst. Model. Simul. 1(4), 257\u2013270 (2021). https:\/\/doi.org\/10.23919\/CSMS.2021.0027","DOI":"10.23919\/CSMS.2021.0027"},{"key":"14_CR26","unstructured":"Yang, W., Acuto, A., Zhou, Y., Wojtczak, D.: A survey for deep reinforcement learning based network intrusion detection (2024). arXiv:2410.07612v1 [cs.CR]. Accessed 25 Sep 2024"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:53Z","timestamp":1772196473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}