IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer

نویسندگان

چکیده

<span lang="EN-US">Internet of things is a technology that allows communication between devices within network. Since this depends on network to communicate, the vulnerability exposed increased significantly. Furthermore, use internet protocol version 6 (IPv6) as successor 4 (IPv4) constituted significant problem for Hence, was exploitable flooding attacks in IPv6 As countermeasure against flood, study designed an flood attack detection by using epsilon greedy optimized Q learning algorithm. According evaluation, agent with 0.1 could reach 98% accuracy and 11,550 rewards compared other agents. When control models, also most accurate algorithms followed neural (NN), K-nearest neighbors (KNN), decision tree (DT), naive Bayes (NB), support vector machine (SVM). Besides that, used more than 99% single central processing unit (CPU). will not hinder (IoT) multiple processors. Thus, we concluded proposed has high feasibility board computer (SBC).</span>

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classes of Multiagent Q-learning Dynamics with epsilon-greedy Exploration

Q-learning in single-agent environments is known to converge in the limit given sufficient exploration. The same algorithm has been applied, with some success, in multiagent environments, where traditional analysis techniques break down. Using established dynamical systems methods, we derive and study an idealization of Q-learning in 2-player 2-action repeated general-sum games. In particular, ...

متن کامل

ON ($epsilon, epsilon vee q$)-FUZZY IDEALS OF BCI-ALGEBRAS

The aim of this paper is to introduce the notions of ($epsilon, epsilon vee q$)-fuzzy p-ideals, ($epsilon, epsilon vee q$)-fuzzy q-ideals and ($epsilon, epsilon vee q$)-fuzzy a-ideals in BCIalgebras and to investigate some of their properties. Several characterizationtheorems for these generalized fuzzy ideals are proved and the relationshipamong these generalized fuzzy ideals of BCI-algebras i...

متن کامل

An Optimized Firefly Algorithm based on Cellular Learning Automata for Community Detection in Social Networks

The structure of the community is one of the important features of social networks. A community is a sub graph which nodes have a lot of connections to nodes of inside the community and have very few connections to nodes of outside the community. The objective of community detection is to separate groups or communities that are linked more closely. In fact, community detection is the clustering...

متن کامل

An Autonomous Underwater Recorder Based on a Single Board Computer

As industrial activities continue to grow on the Brazilian coast, underwater sound measurements are becoming of great scientific importance as they are essential to evaluate the impact of these activities on local ecosystems. In this context, the use of commercial underwater recorders is not always the most feasible alternative, due to their high cost and lack of flexibility. Design and constru...

متن کامل

Efficient Computer Intrusion Detection Method Based on Artificial Bee Colony Optimized Kernel Extreme Learning Machine

With continuous development of computer networks, network attacks threat the information security of people’s daily life. For the protection against network intrusion behaviors, it is imperative to search efficient measurements to maintaining network security. Literature review indicates that taking the advantages of neural network, the network intrusion can be efficiently detected and the kern...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Power Electronics and Drive Systems

سال: 2023

ISSN: ['2722-2578', '2722-256X']

DOI: https://doi.org/10.11591/ijece.v13i5.pp5782-5791