{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:05:06Z","timestamp":1775469906498,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Anomaly detection is one of the biggest issues of security in the Industrial Internet of Things (IIoT) due to the increase in cyber attack dangers for distributed devices and critical infrastructure networks. To face these challenges, the Intrusion Detection System (IDS) is suggested as a robust mechanism to protect and monitor malicious activities in IIoT networks. In this work, we suggest a new mechanism to improve the efficiency and robustness of the IDS system using Distributional Reinforcement Learning (DRL) and the Generative Adversarial Network (GAN). We aim to develop realistic and equilibrated distribution for a given feature set using artificial data in order to overcome the issue of data imbalance. We show how the GAN can efficiently assist the distributional RL-based-IDS in enhancing the detection of minority attacks. To assess the taxonomy of our approach, we verified the effectiveness of our algorithm by using the Distributed Smart Space Orchestration System (DS2OS) dataset. The performance of the normal DRL and DRL-GAN models in binary and multiclass classifications was evaluated based on anomaly detection datasets. The proposed models outperformed the normal DRL in the standard metrics of accuracy, precision, recall, and F1 score. We demonstrated that the GAN introduced in the training process of DRL with the aim of improving the detection of a specific class of data achieves the best results.<\/jats:p>","DOI":"10.3390\/s22218085","type":"journal-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T10:09:23Z","timestamp":1666606163000},"page":"8085","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks"],"prefix":"10.3390","volume":"22","author":[{"given":"Hafsa","family":"Benaddi","sequence":"first","affiliation":[{"name":"Laboratory of Research in Informatics (LaRI), Faculty of Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5406-8594","authenticated-orcid":false,"given":"Mohammed","family":"Jouhari","sequence":"additional","affiliation":[{"name":"School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir 43150, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9682-9555","authenticated-orcid":false,"given":"Khalil","family":"Ibrahimi","sequence":"additional","affiliation":[{"name":"Laboratory of Research in Informatics (LaRI), Faculty of Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"given":"Jalel","family":"Ben Othman","sequence":"additional","affiliation":[{"name":"L2S Laboratory, Paris-Saclay University, CNRS, Centralesupelec, 91190 Gif-sur-Yvette, France"}]},{"given":"El Mehdi","family":"Amhoud","sequence":"additional","affiliation":[{"name":"School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir 43150, Morocco"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Thamilarasu, G., and Chawla, S. (2019). Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors, 19.","DOI":"10.3390\/s19091977"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Latif, S., Driss, M., Boulila, W., Huma, Z.e., Jamal, S.S., Idrees, Z., and Ahmad, J. (2021). Deep Learning for the Industrial Internet of Things (IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions. Sensors, 21.","DOI":"10.3390\/s21227518"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"55595","DOI":"10.1109\/ACCESS.2021.3071766","article-title":"A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things","volume":"9","author":"Huma","year":"2021","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.comcom.2021.12.015","article-title":"Graph-Based Deep Learning for Communication Networks: A Survey","volume":"185","author":"Jiang","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_5","unstructured":"Rouzbahani, H.M., Bahrami, A.H., and Karimipour, H. (2021). AI-Enabled Threat Detection and Security Analysis for Industrial IoT, Springer."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"117597","DOI":"10.1016\/j.eswa.2022.117597","article-title":"Intrusion Detection System Based on Hybridizing a Modified Binary Grey Wolf Optimization and Particle Swarm Optimization","volume":"204","author":"Alzubi","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6473507","DOI":"10.1155\/2022\/6473507","article-title":"Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm","volume":"2022","author":"Dahou","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1007\/s11276-021-02866-x","article-title":"An Enhanced Grey Wolf Optimizer Based Particle Swarm Optimizer for Intrusion Detection System in Wireless Sensor Networks","volume":"28","author":"Otair","year":"2022","journal-title":"Wirel. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Jouhari, M., Amhoud, E.M., Saeed, N., and Alouini, M.S. (2022). A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges. arXiv.","DOI":"10.1109\/COMST.2023.3274934"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Benaddi, H., Ibrahimi, K., and Benslimane, A. (2018, January 16\u201319). Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN. Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakesh, Morocco.","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Benaddi, H., Ibrahimi, K., Benslimane, A., and Qadir, J. (2019, January 26\u201327). A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things. Proceedings of the International Wireless Internet Conference, TaiChung, Taiwan.","DOI":"10.1007\/978-3-030-52988-8_7"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s42979-021-00535-6","article-title":"Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"9568","DOI":"10.1109\/JIOT.2020.3018691","article-title":"Robust Learning Enabled Intelligence for the Internet-of-Things: A Survey from the Perspectives of Noisy Data and Adversarial Examples","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., and Portmann, M. (2022, January 25\u201329). E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. Proceedings of the NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical Adversarial Attacks against Graph Neural Network Based IoT Network Intrusion Detection System","volume":"9","author":"Zhou","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_16","unstructured":"Ilahi, I., Usama, M., Qadir, J., Janjua, M.U., Al-Fuqaha, A., Hoang, D.T., and Niyato, D. (2020). Challenges and countermeasures for adversarial attacks on deep reinforcement learning. arXiv."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"106467","DOI":"10.1016\/j.knosys.2020.106467","article-title":"Comparative study on the time series forecasting of web traffic based on statistical model and Generative Adversarial model","volume":"213","author":"Zhou","year":"2021","journal-title":"Knowl.-Based Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Abusnaina, A., Khormali, A., Alasmary, H., Park, J., Anwar, A., Meteriz, U., and Mohaisen, A. (2019, January 15\u201317). Breaking graph-based IoT malware detection systems using adversarial examples: Poster. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA.","DOI":"10.1145\/3317549.3326296"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hiromoto, R.E., Haney, M., and Vakanski, A. (2017, January 21\u201323). A secure architecture for IoT with supply chain risk management. Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Bucharest, Romania.","DOI":"10.1109\/IDAACS.2017.8095118"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","article-title":"Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review","volume":"8","author":"Martins","year":"2020","journal-title":"IEEE Access"},{"key":"ref_21","unstructured":"Mavrin, B., Zhang, S., Yao, H., Kong, L., Wu, K., and Yu, Y. (2019). Distributional reinforcement learning for efficient exploration. arXiv."},{"key":"ref_22","unstructured":"Bellemare, M.G., Dabney, W., and Munos, R. (2017). A distributional perspective on reinforcement learning. arXiv."},{"key":"ref_23","unstructured":"Hu, W., and Tan, Y. (2017). Generating adversarial malware examples for black-box attacks based on gan. arXiv."},{"key":"ref_24","unstructured":"Lin, Z., Shi, Y., and Xue, Z. (2018). Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V. (2018, January 9\u201316). Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. Proceedings of the International Russian Automation Conference (RusAutoCon), Sochi, Russia.","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ferdowsi, A., and Saad, W. (2019, January 9\u201313). Generative adversarial networks for distributed intrusion detection in the internet of things. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9014102"},{"key":"ref_27","unstructured":"Clements, J., Yang, Y., Sharma, A., Hu, H., and Lao, Y. (2019). Rallying adversarial techniques against deep learning for network security. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yin, C., Zhu, Y., Liu, S., Fei, J., and Zhang, H. (2018, January 26\u201328). An enhancing framework for botnet detection using generative adversarial networks. Proceedings of the International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China.","DOI":"10.1109\/ICAIBD.2018.8396200"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ibitoye, O., Shafiq, O., and Matrawy, A. (2019, January 9\u201313). Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Shahriar, M.H., Haque, N.I., Rahman, M.A., and Alonso, M. (2020). G-ids: Generative adversarial networks assisted intrusion detection system. arXiv.","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Usama, M., Asim, M., Latif, S., and Qadir, J. (2019, January 24\u201328). Generative Adversarial Networks for Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. Proceedings of the 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Pacheco, Y., and Sun, W. (2021, January 11\u201313). Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. Proceedings of the ICISSP, Online.","DOI":"10.5220\/0010253501600171"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","article-title":"A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial Networks","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"73201","DOI":"10.1109\/ACCESS.2021.3078553","article-title":"Studies on the GAN-Based Anomaly Detection Methods for the Time Series Data","volume":"9","author":"Lee","year":"2021","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","article-title":"AttackGAN: Adversarial Attack against Black-Box IDS Using Generative Adversarial Networks","volume":"187","author":"Zhao","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","article-title":"Adversarial Attacks against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms","volume":"30","author":"Zhang","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.future.2022.02.019","article-title":"FGMD: A Robust Detector against Adversarial Attacks in the IoT Network","volume":"132","author":"Jiang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dcan.2022.02.007","article-title":"Enhancing IoT Anomaly Detection Performance for Federated Learning","volume":"8","author":"Weinger","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"ref_39","unstructured":"(2022, May 22). Ds2os Traffic Traces. Available online: https:\/\/www.kaggle.com\/francoisxa\/ds2ostraffictraces."},{"key":"ref_40","unstructured":"Pahl, M.-O., and Aubet, F.-X. (2018, January 5\u20138). All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection. Proceedings of the 14th International Conference on Network and Service Management (CNSM), Rome, Italy."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Khare, S., and Totaro, M. (2020, January 24\u201326). Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home. Proceedings of the 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA.","DOI":"10.1109\/ICDIS50059.2020.00014"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"11089","DOI":"10.1109\/TVT.2022.3186834","article-title":"Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game","volume":"71","author":"Benaddi","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Maill\u00e9, P., Reichl, P., and Tuffin, B. (2011). Of threats and costs: A game- theoretic approach to security risk management. Performance Models and Risk Management in Communications Systems, Springer.","DOI":"10.1007\/978-1-4419-0534-5_2"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1073\/pnas.43.8.749","article-title":"Dynamic programming and statistical communication theory","volume":"43","author":"Bellman","year":"1957","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_45","unstructured":"Ho, J., and Ermon, S. (2016). Generative adversarial imitation learning. arXiv."},{"key":"ref_46","first-page":"5767","article-title":"Improved training of wasserstein gans","volume":"379","author":"Gulrajani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8085\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:00:43Z","timestamp":1760144443000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,22]]},"references-count":46,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["s22218085"],"URL":"https:\/\/doi.org\/10.3390\/s22218085","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,22]]}}}