{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T22:16:48Z","timestamp":1776464208931,"version":"3.51.2"},"reference-count":74,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>In an increasingly digital and interconnected world, the need for robust network intrusion detection systems is crucial to ensure cybersecurity. This article presents a novel approach to network intrusion detection that integrates both traditional machine learning methods and advanced reinforcement learning techniques to enhance detection capabilities and accuracy. The proposed system uses Proximal Policy Optimization, a reinforcement learning algorithm, to dynamically adjust ensemble weights, thereby optimizing the contributions of base learners, such as Random Forest and CatBoost. Additionally, a Multi-layer Perceptron-based meta-learner is employed to refine the predictions, leading to an overall improvement in detection performance. The model was evaluated on five diverse datasets, including NSL-KDD, CICIDS, TON IoT, DDoS, and UNSW-NB15, achieving an average accuracy of 97.16%, and an average precision, recall, and F1-score of 97% across all datasets. The proposed work is compared with the existing state-of-the-art detection methods demonstrating its better performance in detecting both known and novel attack types. Furthermore, the integration of reinforcement learning allowed for dynamic and context-sensitive decision-making, enabling the system to handle complex attack patterns that traditional models struggle with. The training and validation results across all datasets showed rapid convergence and minimal overfitting, further supporting the model\u2019s robustness.<\/jats:p>","DOI":"10.1145\/3764586","type":"journal-article","created":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T11:32:20Z","timestamp":1756380740000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Adaptive Network Intrusion Detection Using Reinforcement Learning with Proximal Policy Optimization"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1578-2443","authenticated-orcid":false,"given":"Akshaya","family":"Suresh","sequence":"first","affiliation":[{"name":"Cyber Security, Indian Institute of Information Technology Kottayam","place":["Kottayam, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0381-2138","authenticated-orcid":false,"given":"Arun","family":"Cyril Jose","sequence":"additional","affiliation":[{"name":"Cyber Security, Indian Institute of Information Technology Kottayam","place":["Kottayam, India"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,27]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2537210"},{"key":"e_1_3_1_3_2","volume-title":"Categorical Data Analysis","author":"Agresti Alan","year":"2012","unstructured":"Alan Agresti. 2012. Categorical Data Analysis. John Wiley & Sons."},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"52181","DOI":"10.1109\/ACCESS.2019.2912115","article-title":"Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection","volume":"7","author":"Alhakami Wajdi","year":"2019","unstructured":"Wajdi Alhakami, Abdullah ALharbi, Sami Bourouis, Roobaea Alroobaea, and Nizar Bouguila. 2019. Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection. IEEE Access 7 (2019), 52181\u201352190.","journal-title":"IEEE Access"},{"issue":"4","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/0925-2312(93)90006-O","article-title":"Backpropagation and stochastic gradient descent method","volume":"5","author":"Amari Shun-ichi","year":"1993","unstructured":"Shun-ichi Amari. 1993. Backpropagation and stochastic gradient descent method. Neurocomputing 5, 4-5 (1993), 185\u2013196.","journal-title":"Neurocomputing"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/3299815.3314450","volume-title":"Proceedings of the 2019 ACM Southeast Conference","author":"Banerjee Chaity","year":"2019","unstructured":"Chaity Banerjee, Tathagata Mukherjee, and Eduardo Pasiliao Jr. 2019. An empirical study on generalizations of the ReLU activation function. In Proceedings of the 2019 ACM Southeast Conference. ACM, 164\u2013167."},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine Learning 45, 1 (2001), 5\u201332.","journal-title":"Machine Learning"},{"issue":"1","key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1006\/jmps.1999.1279","article-title":"Cross-validation methods","volume":"44","author":"Browne Michael W","year":"2000","unstructured":"Michael W Browne. 2000. Cross-validation methods. Journal of Mathematical Psychology 44, 1 (2000), 108\u2013132.","journal-title":"Journal of Mathematical Psychology"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1145\/2939672.2939785","volume-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Chen Tianqi","year":"2016","unstructured":"Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 785\u2013794."},{"issue":"2","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3424155","article-title":"On generating network traffic datasets with synthetic attacks for intrusion detection","volume":"24","author":"Cordero Carlos Garcia","year":"2021","unstructured":"Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max M\u00fchlh\u00e4user, and Simin Nadjm-Tehrani. 2021. On generating network traffic datasets with synthetic attacks for intrusion detection. ACM Transactions on Privacy and Security 24, 2 (2021), 1\u201339.","journal-title":"ACM Transactions on Privacy and Security"},{"issue":"6","key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1002\/wics.1278","article-title":"Decision trees","volume":"5","author":"Ville Barry De","year":"2013","unstructured":"Barry De Ville. 2013. Decision trees. Wiley Interdisciplinary Reviews: Computational Statistics 5, 6 (2013), 448\u2013455.","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"key":"e_1_3_1_12_2","first-page":"567","article-title":"HIDS: A host based intrusion detection system for cloud computing environment","volume":"9","author":"Deshpande Prachi","year":"2018","unstructured":"Prachi Deshpande, Subhash Chander Sharma, Sateesh Kumar Peddoju, and S. Junaid. 2018. HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management 9, 3 (2018), 567\u2013576.","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"e_1_3_1_13_2","first-page":"1","volume-title":"Proceedings of the International Workshop on Multiple Classifier Systems","author":"Dietterich Thomas G.","year":"2000","unstructured":"Thomas G. Dietterich. 2000. Ensemble methods in machine learning. In Proceedings of the International Workshop on Multiple Classifier Systems. Springer, 1\u201315."},{"issue":"1","key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"6658724","DOI":"10.1155\/2021\/6658724","article-title":"Averaged soft actor-critic for deep reinforcement learning","volume":"2021","author":"Ding Feng","year":"2021","unstructured":"Feng Ding, Guanfeng Ma, Zhikui Chen, Jing Gao, and Peng Li. 2021. Averaged soft actor-critic for deep reinforcement learning. Complexity 2021, 1 (2021), 6658724.","journal-title":"Complexity"},{"issue":"1","key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.swevo.2011.02.001","article-title":"Parameter tuning for configuring and analyzing evolutionary algorithms","volume":"1","author":"Eiben Agoston E.","year":"2011","unstructured":"Agoston E. Eiben and Selmar K. Smit. 2011. Parameter tuning for configuring and analyzing evolutionary algorithms. Swarm and Evolutionary Computation 1, 1 (2011), 19\u201331.","journal-title":"Swarm and Evolutionary Computation"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Jonas Eschmann. 2021. Reward function design in reinforcement learning. In Reinforcement Learning Algorithms: Analysis and Applications. Lecture Notes in Computer Science 883 (2021) 25\u201333.","DOI":"10.1007\/978-3-030-41188-6_3"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/3415959.3415998","volume-title":"Proceedings of the Recommender Systems Challenge 2020","author":"Felicioni Nicol\u00f2","year":"2020","unstructured":"Nicol\u00f2 Felicioni, Andrea Donati, Luca Conterio, Luca Bartoccioni, Davide Yi Xian Hu, Cesare Bernardis, and Maurizio Ferrari Dacrema. 2020. Multi-objective blended ensemble for highly imbalanced sequence aware tweet engagement prediction. In Proceedings of the Recommender Systems Challenge 2020. ACM, 29\u201333."},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"200495","DOI":"10.1016\/j.iswa.2025.200495","article-title":"Multi-agent reinforcement learning for cybersecurity: Classification and survey","author":"Finistrella Salvo","year":"2025","unstructured":"Salvo Finistrella, Stefano Mariani, and Franco Zambonelli. 2025. Multi-agent reinforcement learning for cybersecurity: Classification and survey. Intelligent Systems with Applications 26 (2025), 200495.","journal-title":"Intelligent Systems with Applications"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2523813","article-title":"A survey on concept drift adaptation","volume":"46","author":"Gama Jo\u00e3o","year":"2014","unstructured":"Jo\u00e3o Gama, Indr\u0117 \u017dliobait\u0117, Albert Bifet, Mykola Pechenizkiy, and A. Bouchachia. 2014. A survey on concept drift adaptation. ACM Computing Surveys 46, 4 (2014), 1\u201337. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:201087802","journal-title":"ACM Computing Surveys"},{"issue":"19","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"12777","DOI":"10.1007\/s11042-019-08453-9","article-title":"Dropout vs. batch normalization: An empirical study of their impact to deep learning","volume":"79","author":"Garbin Christian","year":"2020","unstructured":"Christian Garbin, Xingquan Zhu, and Oge Marques. 2020. Dropout vs. batch normalization: An empirical study of their impact to deep learning. Multimedia Tools and Applications 79, 19 (2020), 12777\u201312815.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/3345768.3355908","volume-title":"Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","author":"Gaw\u0142owicz Piotr","year":"2019","unstructured":"Piotr Gaw\u0142owicz and Anatolij Zubow. 2019. Ns-3 meets openai gym: The playground for machine learning in networking research. In Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. 113\u2013120."},{"issue":"1","key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1186\/s40537-020-00369-8","article-title":"CatBoost for big data: An interdisciplinary review","volume":"7","author":"Hancock John T.","year":"2020","unstructured":"John T. Hancock and Taghi M. Khoshgoftaar. 2020. CatBoost for big data: An interdisciplinary review. Journal of Big Data 7, 1 (2020), 94.","journal-title":"Journal of Big Data"},{"issue":"7825","key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","article-title":"Array programming with NumPy","volume":"585","author":"Harris Charles R.","year":"2020","unstructured":"Charles R. Harris, K. Jarrod Millman, St\u00e9fan J. Van Der Walt, Ralf Gommers, Pauli Virtanen, David Cournapeau, Eric Wieser, Julian Taylor, Sebastian Berg, Nathaniel J. Smith, et\u00a0al. 2020. Array programming with NumPy. Nature 585, 7825 (2020), 357\u2013362.","journal-title":"Nature"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"2477","DOI":"10.1109\/TNSM.2024.3352586","article-title":"Reinforcement learning meets network intrusion detection: A transferable and adaptable framework for anomaly behavior identification","volume":"21","author":"He Mingshu","year":"2024","unstructured":"Mingshu He, Xiaojuan Wang, Peng Wei, Liu Yang, Yinglei Teng, and Renjian Lyu. 2024. Reinforcement learning meets network intrusion detection: A transferable and adaptable framework for anomaly behavior identification. IEEE Transactions on Network and Service Management 21, 2 (2024), 2477\u20132492. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:266979873","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"9","key":"e_1_3_1_25_2","first-page":"5149","article-title":"Meta-learning in neural networks: A survey","volume":"44","author":"Hospedales Timothy","year":"2021","unstructured":"Timothy Hospedales, Antreas Antoniou, Paul Micaelli, and Amos Storkey. 2021. Meta-learning in neural networks: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 9 (2021), 5149\u20135169.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"e_1_3_1_26_2","first-page":"3150","article-title":"Reinforcement learning-based adaptive feature boosting for smart grid intrusion detection","volume":"14","author":"Hu Chengming","year":"2022","unstructured":"Chengming Hu, Jun Yan, and Xue Liu. 2022. Reinforcement learning-based adaptive feature boosting for smart grid intrusion detection. IEEE Transactions on Smart Grid 14, 4 (2022), 3150\u20133163.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"2","key":"e_1_3_1_27_2","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1109\/TNSM.2020.3014929","article-title":"Multi-stage optimized machine learning framework for network intrusion detection","volume":"18","author":"Injadat MohammadNoor","year":"2020","unstructured":"MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, and Abdallah Shami. 2020. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management 18, 2 (2020), 1803\u20131816.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"10","key":"e_1_3_1_28_2","first-page":"978","article-title":"Methods to avoid over-fitting and under-fitting in supervised machine learning (comparative study)","volume":"70","author":"Jabbar H.","year":"2015","unstructured":"H. Jabbar and Rafiqul Zaman Khan. 2015. Methods to avoid over-fitting and under-fitting in supervised machine learning (comparative study). Computer Science, Communication and Instrumentation Devices 70, 10.3850 (2015), 978\u2013981.","journal-title":"Computer Science, Communication and Instrumentation Devices"},{"key":"e_1_3_1_29_2","first-page":"209","volume-title":"Proceedings of the 2017 Artificial Intelligence and Signal Processing Conference.","author":"Jahromi Ali Haghpanah","year":"2017","unstructured":"Ali Haghpanah Jahromi and Mohammad Taheri. 2017. A non-parametric mixture of gaussian naive bayes classifiers based on local independent features. In Proceedings of the 2017 Artificial Intelligence and Signal Processing Conference. IEEE, 209\u2013212."},{"key":"e_1_3_1_30_2","doi-asserted-by":"crossref","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","article-title":"Network intrusion detection combined hybrid sampling with deep hierarchical network","volume":"8","author":"Jiang Kaiyuan","year":"2020","unstructured":"Kaiyuan Jiang, Wenya Wang, Aili Wang, and Haibin Wu. 2020. Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8 (2020), 32464\u201332476.","journal-title":"IEEE Access"},{"issue":"2","key":"e_1_3_1_31_2","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.techfore.2011.07.004","article-title":"Using the multi-level perspective on socio-technical transitions to assess innovation policy","volume":"79","author":"Kern Florian","year":"2012","unstructured":"Florian Kern. 2012. Using the multi-level perspective on socio-technical transitions to assess innovation policy. Technological Forecasting and Social Change 79, 2 (2012), 298\u2013310.","journal-title":"Technological Forecasting and Social Change"},{"issue":"4","key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.3390\/s22041335","article-title":"Static analysis of information systems for IoT cyber security: A survey of machine learning approaches","volume":"22","author":"Kotenko Igor","year":"2022","unstructured":"Igor Kotenko, Konstantin Izrailov, and Mikhail Buinevich. 2022. Static analysis of information systems for IoT cyber security: A survey of machine learning approaches. Sensors 22, 4 (2022), 1335.","journal-title":"Sensors"},{"issue":"4","key":"e_1_3_1_33_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3210311","article-title":"Technological and human factors of malware attacks: A computer security clinical trial approach","volume":"21","author":"L\u00e9vesque Fanny Lalonde","year":"2018","unstructured":"Fanny Lalonde L\u00e9vesque, Sonia Chiasson, Anil Somayaji, and Jos\u00e9 M. Fernandez. 2018. Technological and human factors of malware attacks: A computer security clinical trial approach. ACM Transactions on Privacy and Security 21, 4 (2018), 1\u201330.","journal-title":"ACM Transactions on Privacy and Security"},{"key":"e_1_3_1_34_2","article-title":"A comprehensive survey on design and application of autoencoder in deep learning","volume":"138","author":"Li Pengzhi","year":"2023","unstructured":"Pengzhi Li, Yan Pei, and Jianqiang Li. 2023. A comprehensive survey on design and application of autoencoder in deep learning. Applied Soft Computing 138, Article No. 110176 (2023).","journal-title":"Applied Soft Computing"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.patcog.2018.03.005","article-title":"Adaptive batch normalization for practical domain adaptation","volume":"80","author":"Li Yanghao","year":"2018","unstructured":"Yanghao Li, Naiyan Wang, Jianping Shi, Xiaodi Hou, and Jiaying Liu. 2018. Adaptive batch normalization for practical domain adaptation. Pattern Recognition 80 (2018), 109\u2013117.","journal-title":"Pattern Recognition"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Mianfen Lin Kaixiang Yang Zhiwen Yu Yifan Shi and C. L. Philip Chen. 2023. Hybrid ensemble broad learning system for network intrusion detection. IEEE Transactions on Industrial Informatics 20 4 (2023) 5622\u20135633. DOI:10.1109\/TII.2023.3236472","DOI":"10.1109\/TII.2023.3236472"},{"key":"e_1_3_1_37_2","article-title":"ELAT: Ensemble learning with adversarial training in defending against evaded intrusions","volume":"71","author":"Lin Ying-Dar","year":"2022","unstructured":"Ying-Dar Lin, Jehoshua-Hanky Pratama, Didik Sudyana, Yuan-Cheng Lai, Ren-Hung Hwang, Po-Ching Lin, Hsuan-Yu Lin, Wei-Bin Lee, and Chen-Kuo Chiang. 2022. ELAT: Ensemble learning with adversarial training in defending against evaded intrusions. Journal of Information Security and Applications 71, Article No. 103348 (2022).","journal-title":"Journal of Information Security and Applications"},{"issue":"20","key":"e_1_3_1_38_2","doi-asserted-by":"crossref","first-page":"4396","DOI":"10.3390\/app9204396","article-title":"Machine learning and deep learning methods for intrusion detection systems: A survey","volume":"9","author":"Liu Hongyu","year":"2019","unstructured":"Hongyu Liu and Bo Lang. 2019. Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences 9, 20 (2019), 4396.","journal-title":"Applied Sciences"},{"issue":"1","key":"e_1_3_1_39_2","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1023\/A:1018064306595","article-title":"Average reward reinforcement learning: Foundations, algorithms, and empirical results","volume":"22","author":"Mahadevan Sridhar","year":"1996","unstructured":"Sridhar Mahadevan. 1996. Average reward reinforcement learning: Foundations, algorithms, and empirical results. Machine Learning 22, 1 (1996), 159\u2013195.","journal-title":"Machine Learning"},{"issue":"7","key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10462-024-10819-x","article-title":"An experimental evaluation of deep reinforcement learning algorithms for HVAC control","volume":"57","author":"Manjavacas Antonio","year":"2024","unstructured":"Antonio Manjavacas, Alejandro Campoy-Nieves, Javier Jim\u00e9nez-Raboso, Miguel Molina-Solana, and Juan G\u00f3mez-Romero. 2024. An experimental evaluation of deep reinforcement learning algorithms for HVAC control. Artificial Intelligence Review 57, 7 (2024), 173.","journal-title":"Artificial Intelligence Review"},{"key":"e_1_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Manuel L\u00f3pez Mart\u00edn Antonio J. S\u00e1nchez-Esguevillas Juan Ignacio Arribas and Bel\u00e9n Carro. 2021. Network intrusion detection based on extended RBF neural network with offline reinforcement learning. IEEE Access 9 (2021) 153153\u2013153170. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:244063959","DOI":"10.1109\/ACCESS.2021.3127689"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","unstructured":"Ghulam Mohi-ud-din. 2018. NSL-KDD. IEEE Dataport. December 29 2018. DOI:10.21227\/425a-3e55","DOI":"10.21227\/425a-3e55"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Nour Moustafa. 2019. ToN_IoT datasets. IEEE Dataport. October 16 2019. DOI:10.21227\/fesz-dm97","DOI":"10.21227\/fesz-dm97"},{"key":"e_1_3_1_44_2","first-page":"1","volume-title":"Proceedings of the 2015 Military Communications and Information Systems Conference","author":"Moustafa Nour","year":"2015","unstructured":"Nour Moustafa and Jill Slay. 2015. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proceedings of the 2015 Military Communications and Information Systems Conference. 1\u20136. DOI:10.1109\/MilCIS.2015.7348942"},{"issue":"3","key":"e_1_3_1_45_2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network intrusion detection","volume":"8","author":"Mukherjee Biswanath","year":"1994","unstructured":"Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levitt. 1994. Network intrusion detection. IEEE Network 8, 3 (1994), 26\u201341.","journal-title":"IEEE Network"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","unstructured":"Todd G. Nick and Kathleen M. Campbell. 2007. Logistic regression. In Topics in Biostatistics. Methods in Molecular Biology\u2122 W. T. Ambrosius (Ed.). Vol. 404. Humana Press. 10.1007\/978-1-59745-530-5_14","DOI":"10.1007\/978-1-59745-530-5_14"},{"key":"e_1_3_1_47_2","first-page":"255","volume-title":"Proceedings of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing","author":"Pavlyshenko Bohdan","year":"2018","unstructured":"Bohdan Pavlyshenko. 2018. Using stacking approaches for machine learning models. In Proceedings of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing. IEEE, 255\u2013258."},{"issue":"268","key":"e_1_3_1_48_2","first-page":"1","article-title":"Stable-baselines3: Reliable reinforcement learning implementations","volume":"22","author":"Raffin Antonin","year":"2021","unstructured":"Antonin Raffin, Ashley Hill, Adam Gleave, Anssi Kanervisto, Maximilian Ernestus, and Noah Dormann. 2021. Stable-baselines3: Reliable reinforcement learning implementations. Journal of Machine Learning Research 22, 268 (2021), 1\u20138.","journal-title":"Journal of Machine Learning Research"},{"issue":"7","key":"e_1_3_1_49_2","first-page":"1","article-title":"A study on cyber crimes cyber criminals and major security breaches","volume":"6","author":"Rai Mahima","year":"2019","unstructured":"Mahima Rai and Hardwari Mandoria. 2019. A study on cyber crimes cyber criminals and major security breaches. International Journal of Research in Engineering and Technology 6, 7 (2019), 1\u20138.","journal-title":"International Journal of Research in Engineering and Technology"},{"issue":"4","key":"e_1_3_1_50_2","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1007\/s40435-023-01227-0","article-title":"Decentralized multi-agent control of a three-tank hybrid system based on twin delayed deep deterministic policy gradient reinforcement learning algorithm","volume":"12","author":"Rajasekhar N.","year":"2024","unstructured":"N. Rajasekhar, TK Radhakrishnan, and N. Samsudeen. 2024. Decentralized multi-agent control of a three-tank hybrid system based on twin delayed deep deterministic policy gradient reinforcement learning algorithm. International Journal of Dynamics and Control 12, 4 (2024), 1098\u20131115.","journal-title":"International Journal of Dynamics and Control"},{"issue":"9","key":"e_1_3_1_51_2","doi-asserted-by":"crossref","first-page":"9768","DOI":"10.1007\/s10489-021-02968-1","article-title":"A tree-based stacking ensemble technique with feature selection for network intrusion detection","volume":"52","author":"Rashid Mamunur","year":"2022","unstructured":"Mamunur Rashid, Joarder Kamruzzaman, Tasadduq Imam, Santoso Wibowo, and Steven Gordon. 2022. A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence 52, 9 (2022), 9768\u20139781.","journal-title":"Applied Intelligence"},{"key":"e_1_3_1_52_2","doi-asserted-by":"crossref","first-page":"4821","DOI":"10.1109\/TNSM.2021.3138457","article-title":"Network intrusion detection and comparative analysis using ensemble machine learning and feature selection","volume":"19","author":"Das Ph.D. Saikat","year":"2022","unstructured":"Ph.D. Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, Anwar Haque, and Sajjan G. Shiva. 2022. Network intrusion detection and comparative analysis using ensemble machine learning and feature selection. IEEE Transactions on Network and Service Management 19, 4 (2022), 4821\u20134833. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:245535175","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"e_1_3_1_53_2","article-title":"Cybersecurity data science: An overview from machine learning perspective","volume":"7","author":"Sarker Iqbal H.","year":"2020","unstructured":"Iqbal H. Sarker, ASM Kayes, Shahriar Badsha, Hamed Alqahtani, Paul Watters, and Alex Ng. 2020. Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data 7, 1 (2020), 41.","journal-title":"Journal of Big Data"},{"key":"e_1_3_1_54_2","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization.","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, Ali A Ghorbani, et\u00a0al. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108\u2013116.","journal-title":"ICISSp"},{"key":"e_1_3_1_55_2","first-page":"1","volume-title":"Proceedings of the 2019 International Carnahan Conference on Security Technology","author":"Sharafaldin Iman","year":"2019","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A Ghorbani. 2019. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology. IEEE, 1\u20138."},{"issue":"1","key":"e_1_3_1_56_2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A deep learning approach to network intrusion detection","volume":"2","author":"Shone Nathan","year":"2018","unstructured":"Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, and Qi Shi. 2018. A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence 2, 1 (2018), 41\u201350.","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"issue":"12","key":"e_1_3_1_57_2","first-page":"354","article-title":"Python\u2013the fastest growing programming language","volume":"4","author":"Srinath KR","year":"2017","unstructured":"KR Srinath. 2017. Python\u2013the fastest growing programming language. International Research Journal of Engineering and Technology 4, 12 (2017), 354\u2013357.","journal-title":"International Research Journal of Engineering and Technology"},{"key":"e_1_3_1_58_2","unstructured":"Statista. 2024. Cyber Crime and Security. Retrieved October 24 2024 from https:\/\/www.statista.com\/markets\/424\/topic\/1065\/cyber-crime-security\/#overview"},{"issue":"3","key":"e_1_3_1_59_2","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/TBDATA.2017.2723570","article-title":"Big data for cybersecurity: Vulnerability disclosure trends and dependencies","volume":"5","author":"Tang MingJian","year":"2017","unstructured":"MingJian Tang, Mamoun Alazab, and Yuxiu Luo. 2017. Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data 5, 3 (2017), 317\u2013329.","journal-title":"IEEE Transactions on Big Data"},{"issue":"5","key":"e_1_3_1_60_2","doi-asserted-by":"crossref","first-page":"5693","DOI":"10.1007\/s40747-023-01013-7","article-title":"A novel ensemble learning-based model for network intrusion detection","volume":"9","author":"Thockchom Ngamba","year":"2023","unstructured":"Ngamba Thockchom, Moirangthem Marjit Singh, and Utpal Nandi. 2023. A novel ensemble learning-based model for network intrusion detection. Complex and Intelligent Systems 9, 5 (2023), 5693\u20135714.","journal-title":"Complex and Intelligent Systems"},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jbi.2018.07.014","article-title":"Relief-based feature selection: Introduction and review","volume":"85","author":"Urbanowicz Ryan J.","year":"2018","unstructured":"Ryan J. Urbanowicz, Melissa Meeker, William La Cava, Randal S. Olson, and Jason H. Moore. 2018. Relief-based feature selection: Introduction and review. Journal of Biomedical Informatics 85 (2018), 189\u2013203.","journal-title":"Journal of Biomedical Informatics"},{"key":"e_1_3_1_62_2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10270-008-0106-z","article-title":"Process mining: A two-step approach to balance between underfitting and overfitting","volume":"9","author":"Aalst Wil MP Van der","year":"2010","unstructured":"Wil MP Van der Aalst, Vladimir Rubin, HMW Verbeek, Boudewijn F. van Dongen, Ekkart Kindler, and Christian W. G\u00fcnther. 2010. Process mining: A two-step approach to balance between underfitting and overfitting. Software and Systems Modeling 9, 1 (2010), 87\u2013111.","journal-title":"Software and Systems Modeling"},{"issue":"3","key":"e_1_3_1_63_2","doi-asserted-by":"crossref","first-page":"3915","DOI":"10.1109\/TNSM.2023.3259474","article-title":"A novel multi-stage approach for hierarchical intrusion detection","volume":"20","author":"Verkerken Miel","year":"2023","unstructured":"Miel Verkerken, Laurens D\u2019hooge, Didik Sudyana, Ying-Dar Lin, Tim Wauters, Bruno Volckaert, and Filip De Turck. 2023. A novel multi-stage approach for hierarchical intrusion detection. IEEE Transactions on Network and Service Management 20, 3 (2023), 3915\u20133929.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","unstructured":"Monika Vishwakarma and Nishtha Kesswani. 2022. DIDS: A deep neural network based real-time intrusion detection system for IoT. Decision Analytics Journal 5 Article 100142 (2022). DOI:10.1016\/j.dajour.2022.100142","DOI":"10.1016\/j.dajour.2022.100142"},{"key":"e_1_3_1_65_2","doi-asserted-by":"crossref","first-page":"4828","DOI":"10.1145\/3534678.3542636","volume-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","author":"Wang Chi","year":"2022","unstructured":"Chi Wang, Qingyun Wu, Xueqing Liu, and Luis Quintanilla. 2022. Automated machine learning and tuning with flaml. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. ACM, 4828\u20134829."},{"key":"e_1_3_1_66_2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/ICNNB.2005.1614615","volume-title":"Proceedings of the 2005 International Conference on Neural Networks and Brain","author":"Wang Haifeng","year":"2005","unstructured":"Haifeng Wang and Dejin Hu. 2005. Comparison of SVM and LS-SVM for regression. In Proceedings of the 2005 International Conference on Neural Networks and Brain. IEEE, 279\u2013283."},{"issue":"1","key":"e_1_3_1_67_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3634914","article-title":"DEEPFAKER: A unified evaluation platform for facial deepfake and detection models","volume":"27","author":"Wang Li","year":"2024","unstructured":"Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, and Shanqing Guo. 2024. DEEPFAKER: A unified evaluation platform for facial deepfake and detection models. ACM Transactions on Privacy and Security 27, 1 (2024), 1\u201334.","journal-title":"ACM Transactions on Privacy and Security"},{"issue":"4","key":"e_1_3_1_68_2","doi-asserted-by":"crossref","first-page":"5064","DOI":"10.1109\/TNNLS.2022.3207346","article-title":"Deep reinforcement learning: A survey","volume":"35","author":"Wang Xu","year":"2022","unstructured":"Xu Wang, Sen Wang, Xingxing Liang, Dawei Zhao, Jincai Huang, Xin Xu, Bin Dai, and Qiguang Miao. 2022. Deep reinforcement learning: A survey. IEEE Transactions on Neural Networks and Learning Systems 35, 4 (2022), 5064\u20135078.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"3","key":"e_1_3_1_69_2","first-page":"729","article-title":"Reinforcement learning","volume":"12","author":"Wiering Marco A.","year":"2012","unstructured":"Marco A. Wiering and Martijn Van Otterlo. 2012. Reinforcement learning. Adaptation, Learning, and Optimization 12, 3 (2012), 729.","journal-title":"Adaptation, Learning, and Optimization"},{"key":"e_1_3_1_70_2","doi-asserted-by":"crossref","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","article-title":"A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM","volume":"9","author":"Wisanwanichthan Treepop","year":"2021","unstructured":"Treepop Wisanwanichthan and Mason Thammawichai. 2021. A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access 9 (2021), 138432\u2013138450.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_1_71_2","first-page":"153","article-title":"Automatic evasion of machine learning-based network intrusion detection systems","volume":"21","author":"Yan Haonan","year":"2023","unstructured":"Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, and Xiaodong Lin. 2023. Automatic evasion of machine learning-based network intrusion detection systems. IEEE Transactions on Dependable and Secure Computing 21, 1 (2023), 153\u2013167.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_72_2","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.inffus.2017.10.006","article-title":"A survey on deep learning for big data","volume":"42","author":"Zhang Qingchen","year":"2018","unstructured":"Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2018. A survey on deep learning for big data. Information Fusion 42 (2018), 146\u2013157.","journal-title":"Information Fusion"},{"issue":"3","key":"e_1_3_1_73_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2990508","article-title":"Learning k for knn classification","volume":"8","author":"Zhang Shichao","year":"2017","unstructured":"Shichao Zhang, Xuelong Li, Ming Zong, Xiaofeng Zhu, and Debo Cheng. 2017. Learning k for knn classification. ACM Transactions on Intelligent Systems and Technology 8, 3 (2017), 1\u201319.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"e_1_3_1_75_2","doi-asserted-by":"crossref","unstructured":"Jinming Zou Yi Han and Sung-Sau So. 2009. Overview of artificial neural networks. In Artificial Neural Networks: Methods and Applications Methods in Molecular Biology 458 (2009) 14\u201322.","DOI":"10.1007\/978-1-60327-101-1_2"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3764586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T12:12:32Z","timestamp":1758975152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3764586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,27]]},"references-count":74,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3764586"],"URL":"https:\/\/doi.org\/10.1145\/3764586","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,27]]},"assertion":[{"value":"2024-12-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}