A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls

  title={A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls},
  author={Xin Xu and Tao Xie},
Intrusion detection has emerged as an important technique for network security. Due to the complex and dynamic properties of intrusion behaviors, machine learning and data mining methods have been widely employed to optimize the performance of intrusion detection systems (IDSs). However, the results of existing work still need to be improved both in accuracy and in computational efficiency. In this paper, a novel reinforcement learning approach is presented for host-based intrusion detection… CONTINUE READING
Highly Cited
This paper has 47 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 16 extracted citations

Anomaly Detection using Fuzzy Q-learning Algorithm

View 8 Excerpts
Method Support
Highly Influenced

Detecting Network Intrusions Using a Confidence-Based Reward System

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) • 2018
View 1 Excerpt

An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities

2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) • 2017
View 2 Excerpts
Method Support

Network attribute selection, classification and accuracy (NASCA) procedure for intrusion detection systems

2017 IEEE International Symposium on Technologies for Homeland Security (HST) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 11 references

Detecting Intrusions using System Calls: Alternative Data Models

IEEE Symposium on Security and Privacy • 1999
View 4 Excerpts
Highly Influenced

Learning to predict by the methods of temporal differences

Machine Learning • 1988
View 5 Excerpts
Highly Influenced

Intrusion Detection Using Neural Networks and Support Vector Machines

S. Mukkamala, G. Janoski, A. H.Sung
Proceedings of IEEE International Joint Conference on Neural Networks • 2002
View 1 Excerpt