Paper 3
Paper 3
Article
Anomaly Detection in Industrial IoT Using Distributional
Reinforcement Learning and Generative Adversarial Networks
Hafsa Benaddi 1 , Mohammed Jouhari 2 , Khalil Ibrahimi 1 , Jalel Ben Othman 3, * and El Mehdi Amhoud 2
Abstract: Anomaly detection is one of the biggest issues of security in the Industrial Internet of Things
(IIoT) due to the increase in cyber attack dangers for distributed devices and critical infrastructure
networks. To face these challenges, the Intrusion Detection System (IDS) is suggested as a robust
mechanism to protect and monitor malicious activities in IIoT networks. In this work, we suggest
a new mechanism to improve the efficiency and robustness of the IDS system using Distributional
Reinforcement Learning (DRL) and the Generative Adversarial Network (GAN). We aim to develop
realistic and equilibrated distribution for a given feature set using artificial data in order to overcome
the issue of data imbalance. We show how the GAN can efficiently assist the distributional RL-
based-IDS in enhancing the detection of minority attacks. To assess the taxonomy of our approach,
we verified the effectiveness of our algorithm by using the Distributed Smart Space Orchestration
System (DS2OS) dataset. The performance of the normal DRL and DRL-GAN models in binary and
multiclass classifications was evaluated based on anomaly detection datasets. The proposed models
outperformed the normal DRL in the standard metrics of accuracy, precision, recall, and F1 score. We
Citation: Benaddi, H.; Jouhari, M.;
demonstrated that the GAN introduced in the training process of DRL with the aim of improving the
Ibrahimi, K.; Ben Othman, J.;
detection of a specific class of data achieves the best results.
Amhoud, E.M. Anomaly Detection in
Industrial IoT Using Distributional
Keywords: Industrial Internet of Things; anomaly detection; DS2OS; Generative Adversarial
Reinforcement Learning and
Network; Distributional Reinforcement Learning; adversarial machine learning
Generative Adversarial Networks.
Sensors 2022, 22, 8085. https://
doi.org/10.3390/s22218085
attracted large companies from around the world because of the emerging applications [2].
A critical challenge for IIoT systems is security, because of the growing number of different
departments and clients on IIoT systems. There are inherent vulnerabilities in IIoT systems
arising from safety issues at different layers of IIoT [3]. The surveillance and analysis of
the traffic can assist in managing networks and identifying security issues. Many national
governments are investing in information and communications technology infrastructure
to solve traditional public management problems. The implementation of a smart city is
one of the most progressive and effective solutions. Transitioning from traditional public
services and resources to a smart city model has several benefits, including improved
service quality and reduced administrative expenses.
However, a strong network is required to manage government infrastructure in a
smart city. Among the major issues facing smart environments in the real world are
IoT security and complexity, as well as interoperability with other IoT technologies [4].
Therefore, several mechanisms have been suggested to find security issues in numerous
domains. The intrusion detection system (IDS), as an effective information safety control
system, has recently undergone an important development. Confidentiality, integrity,
and availability are three crucial security concepts for programs and services in IIoT
environments [5]. The IDSs have been widely used to identify harmful network traffic
to defeat malicious behavior, especially when preventive approaches at the IoT endpoint
fail. With the increasing complexity and furtiveness of hackers on IoT networks, improved
intrusion detection methods are required to keep up with the changing threats [6–8].
Some kinds of unstructured data, including text, image, voice, video, etc. [9], cannot
be processed using traditional machine learning (ML) methods [10]. IoT systems generate
unstructured data that need to be processed by a powerful pattern recognition engine for
anomaly detection in order to find and classify anomalies. Deep learning (DL) algorithms
can be trained on a variety of data types [11]. In order to ensure that data are transferred se-
curely and reliably in IoT networks, deep learning algorithms may be successfully deployed
to discover anomalous behaviors in different IoT networks [12,13]. Adversarial machine
learning (AML) applications on anomalies and malware are focused on the performance
evaluation of detecting the new attacks [14]. The Generative Adversarial Network (GAN)
has been frequently used in anomaly detection to combat adversarial perturbations from
hackers [15]. Cybercriminals, for example, try to create typical data in order to trick the IDS
into classifying the data in a bogus category [16]. However, one of the benefits of a GAN is
that it can generate more training data in order to deal with unbalanced and missing data
sets [17]. The GAN was able to amplify and enhance known and unknown adversarial
disruptions in the context of anomaly detection, as well as strengthening the IDS against
attacks. It also has a huge capacity for learning adversarial attacks in real-time streaming
data, which aids the IDS in detecting malicious behavior [18].
As a result, the use of a GAN-based IDS aims to improve the feasibility and efficiency
of the IDS in classifying normal and abnormal data, as well as reducing malicious supply
chain risk management in the IoT security field, with the goal of detecting malicious
activities on the network communication from unauthorized resources [19,20]. In addition,
reinforcement learning (RL) is considered one of the most used methods recently in machine
learning (ML) for solving complex high-dimensional datasets of intrusion detection. More
precisely, the agent tries to learn in the environment to make decisions; then, when it
estimates the reward, it can move to the next state. For example, the probability of each
event can be modeled with the Markov decision process (MDP), which is based on the
current event, to decide the next one. In a great deal of research, distributional RL performs
the important task of finding the uncertainty of decisions taken by the MDP [21]. Unlike
the traditional RL methods, where a value expectation function is trained, the distributional
RL mechanisms preserve a full distribution of expected future returns [22].
Sensors 2022, 22, 8085 3 of 18
2. Related Work
In this section, we describe literature research on the GAN based on adversarial
ML/DL attacks on intrusion detection frameworks. We show the drawbacks associated
with these contributions, which have motivated the suggested approach to avoid these
issues. Hu et al. [23] proposed an approach to generate adversarial malware examples that
apply a GAN-based algorithm called MalGAN for black-box attacks. They succeeded in
generating adversarial malware samples to evade deep learning-based malware detection.
Lin et al. [24] designed an IDSGAN framework for adversarial attack generation against the
IDS. In their proposed scheme, a Wasserstein GAN is used to improve the generator and
the discriminator, where the generator generates adversarial abnormal activities focusing
on the evasion black-box and attacks the IDS. The authors generated the adversarial attacks
in the KDDTest+ dataset, and the simulation results show the robustness of the IDSGAN. In
the context of a wireless, self-organized ad-hoc network of cyber-physical systems, Belenko
et al. [25] defined a machine-to-machine communication network used to connect cyber
devices. These are cyber-physical devices that can be programmed to perform operations
either by getting commands or remotely. In this way, an adequate and effective intrusion
detection system is required to prevent the misuse of these devices by strangers. In order
to cover this issue, an intrusion detection system is proposed in this study based on a GAN
for large-scale cyber-physical systems (CPS).
Ferdowsi et al. [26] suggested a distributed adversarial network to provide a wholly
decentralized IDS for the IoT area in order to detect anomalies, which is convenient for
hiding the user’s sensitive data. Clements et al. [27] evaluated the vulnerability of the
deep learning-based network intrusion detection system (DL-NIDS) to well-designed
attacks from the domain of adversarial machine learning. This vulnerability is present in
deep learning-based systems even when the model achieves a high degree of accuracy for
classifying between benign and malicious network traffics. Therefore, researchers must take
Sensors 2022, 22, 8085 4 of 18
steps to verify the security of deep learning models in security-critical applications to ensure
they do not impose additional risks. Yin et al. [28] proposed a GAN-based framework with
the botnet detection model that enhances the performance of the detection mechanism
for the most severe attacks while maintaining the key features of the original detection
model. Ibitoye et al. [29] proved the impact of adversarial samples on deep learning based
on IDS in the IoT network using feed-forward neural networks (FNN) and compared the
results from several adversarial attacks with a self-normalizing neural network (SNN).
The author showed that the DL-based IDS classifier utilizing FNN was negatively affected
by the adversarial samples.
Shahriar et al. [30] developed a new security framework based on an IDS model using
artificial neural networks and trained on data generated by a GAN. The use of the GAN in
this work aims to overcome the issue of imbalance and missing sample data on emerging
CPS technologies; the use of a standalone IDS is modeled and compared to the proposed
GAN-IDS (G-IDS) through the NSL-KDD99 dataset, which showed that the proposed IDS
outperforms existing trained IDS in the literature. Usama et al. [31] proposed an adversarial
ML/DL attack using a GAN that can evade a black-box-based IDS and proposed defense
procedures while ensuring the preservation of the function by modifying only the non-
functional behavior of the adversary network traffic characteristics. The obtained results
confirmed that the proposed scheme can be used to strengthen the IDS and make it more
powerful against adversary disturbances. Pacheco and Sun [32] evaluated the efficiency of
adversarial ML/DL attacks on the UNSW-NB15 and Bot-IoT datasets. They demonstrated
the performance evaluation of adversarial attack algorithms including the Jacobian-based
saliency map attack (JSMA), fast gradient sign (FGSM) method, and Carlini Wagner (CW)
attack against ML classifiers such as the support vector machine (SVM), decision tree (DT),
and random forest (RF). The experimental results indicate that the attacks were capable of
successfully impairing the overall performance of the respective SVM, DT, and RF classifiers
used on datasets.
Ullah and Mahmoud [33] proposed a framework for anomaly detection in IoT net-
works utilizing conditional GANs (cGANs) for the data unbalance and the binary class
(bcGAN) for data enhancement. The performance evaluation of the model was tested uti-
lizing a feed-forward neural network (FFN) on network-based anomaly detection datasets.
Lee et al. [34] proposed a comparative study of the GAN-based anomaly detection (AD)
methods including the MAD- GAN, the TAnoGAN, and the CUSUM chart. Zhao et al. [35]
suggested an enhanced adversarial attack model based on the Wasserstein GAN named
attackGAN. By adding the feedback from the IDS, the model can effectively perform an
evasion attack and at the same time ensures the functionality of network traffic. The full set
of their experiments was performed on the NSL-KDD dataset. Zhang et al. [36] designed
a TIKI-TAKA framework to defend against adversary attacks on a DL-based Network
IDS (NIDS) using multilayer perceptron (MLP), convolutional neural network (CNN),
and CNN with long short term memory (LSTM) layers, named the C-LSTM-based network
IDS, defending against adversarial malicious behaviors. Furthermore, they suggested in-
corporating the defense mechanisms of voting assembling, assembling adversarial training,
and query detection to increase resistance to attacks. Jiang et al. [37] developed a fea-
ture grouping and multi-model fusion detector (FGMD) framework capable of defending
against adversarial attacks by applying feature pooling and multi-model merging. Weinger
et al. [38] discussed the problem of performance degradation in the federated learning (FL)
setting in the context of class imbalance and device heterogeneity. The authors examined
how data augmentation can be enforced to improve detection performance for IoT anomaly
detection by conducting a thorough evaluation using different IoT datasets: TON-IoT and
DS2OS datasets.
Sensors 2022, 22, 8085 5 of 18
The contribution of our paper can be compared to existing approaches that demon-
strate the use of a GAN for IoT security, as described in Table 1. However, none of these
approaches addresses the issue of imbalanced and limited data. Unlike the works stated
before, we suggest a thorough framework to combine training data that might enhance the
effectiveness of IDS in detecting cyber attacks using a GAN. Although we tested our system
using a Distributional Reinforcement Learning-based IDS and a recent intrusion detection
dataset, it may be used with any IDS and a variety of industrial and network datasets.
Table 1. Summary of the most relevant adversarial attacks based on IDS models in the literature.
3. Proposed Approach
3.1. System Model and Problem Formulation
In this paper, we describe our suggested model in detail . The main idea of the
anomaly detection process is to resolve the problem of imbalanced data and improve the
identification of each type of attack by applying machine learning methods.
Figure 1 represents the anomaly detection’s architecture. It consists of two learning
steps, which are outlined below. In this study, we offered to construct a robust IDS using
a DRL-GAN approach. Our proposed DRL-GAN is an enhanced model with improved
accuracy and minimal false alarms while using datasets with full features and increasing
computational complexity.
Sensors 2022, 22, 8085 6 of 18
The record distribution of training and testing sets in the DS2OS dataset is presented
in Table 3.
Feature Type
Accessed node type Nominal
Accessed node address Nominal
Destination services address Nominal
Destination services type Nominal
Destination location Nominal
Source ID Nominal
Source address Nominal
Source type Nominal
Source location Nominal
Normality Nominal
Operation Nominal
Value Continuous
Timestamp Discrete
(C) Data normalization has the benefit of making some machine learning algorithms
faster. This phase is only recommended if the features have different value ranges.
The purpose of this step is to change the values of the numerical columns of the
dataset to a common scale without warping the differences in the value ranges.
R(s, a) = ∑
0
Pa (s|s0 , a) R(s0, a) (1)
s ∈S
3
∑ αi,j βi,j , i = 1, 2, 3
( a)
Pa (st+1 = s j |st = si , a) = (2)
j =1
where i, j ∈ V, β ai,j represents the transition probability from the state s j observed at
t to the state si observed at t + 1 in a 3 × 3 matrix Ba with ∑3j=1 β ai,j = 1, wherein
0 < α < 1 with α ∈ [ 12 , 1], α ∈ [0, 21 ], respectively, describing the valid or invalid decision
of predicted data.
- γ is the discount factor in 0 < γ < 1.
In each s, the agent realizes an action a, observes the reward r of this action as well as
the next state as s0 , and updates the estimated value function of Qπ satisfying the Bellman
equation [44]:
Qπ (s, a) = Es,a,s0 [ R(s, a) + γ max ( Q(s0 , a0 ))] (3)
a0 ∈ A
This is done to give more predictions of actions by modeling all possible returns in a
dynamic way while trying to learn from their mean.
Let the random variable Z (s, a) = ∑i∞=0 γR(s, a) be the return obtained by calculating
the sum of discounted rewards observed by the agent by starting from state s, performing
action a following the policy π. Thus, for a given π, the estimated value function is
D
Z (s, a) = Es,a,s0 [( R(s, a) + γ max Z π (s0 , a0 ))] (5)
a0 ∈ A
Sensors 2022, 22, 8085 9 of 18
D
where the equation iterates Z ←− τ ∗ Z and converges to Z π , and = means the distributional
equivalence. However, to define the distributional Bellman optimality operator based on (5),
for a given optimal policy π ∗ , we have
D
τ ∗ Z (s, a) = Es,a,s0 [( R(s, a) + γZ (s0 , π ∗ (s0 )))] (6)
Let us denote p(λ) = λ(||∇ x̂ D ( x̂ )||2 − 1)2 as the gradient penalty and x̂ = qx + (1 −
q) x̂, q∼U (0, 1). The algorithm replaces the state-action value Q(s, a) by its distribution
and uses WGAN-GP to learn the distribution over returns of the target of traffic data
X. The generator G receives the current sensed data state s, and in each updated round,
we sample a minibatch (s, a, r, s0 )im=1 from X and use it to update the networks. The IDS
implements the Bellman optimality operator T according to (7) and gets the samples of the
real distribution, which can be calculated as
LC = Ex̂∼ Pg [ f ( G a(t) (z(t), s(t), τ (t))] − Ex∼ Pr [ f ( X (t), τ (t))] + p(λ) (9)
h i
LG = Ex̂∼ Pg f ( G a(t) (z(t), s(t), τ (t)) (10)
T p + Tn
Accuracy( AC ) = (11)
T p + Tn + Fp + Fn
Sensors 2022, 22, 8085 11 of 18
- Precision: The precision describes the ratio of normal recordings that are correctly
detected by the IDS to all recordings that the IDS has recognized as normal. Precision is
defined by
Tp
Precision( PR) = (12)
T p + Fp
- Recall: The recall is the percentage of positive recording predicted correctly by the IDS.
The recall is calculated as
Tp
Recall ( RC ) = (13)
T p + Fn
- F1-score: The F1-score is calculated as the harmonic mean of the precision and recall
metrics. The F1-score is determined by
2T p
F1-score( FM) = (14)
2T p + Fp + Fn
Table 4 shows the results of the binary classification of the DRL agent before and after
introducing the GAN agent in the training process. The GAN agent takes as input the attack
samples and generates data to be used in the training of the DRL agent. The improved
performance of the DRL agent is demonstrated by the second column of the accuracy.
The impact of the GAN could be more clear and more significant when considering a
multi-class classification. Matrices of confusion in Figure 3 support the results of Table 4
Sensors 2022, 22, 8085 12 of 18
and show clearly how the GAN can enhance the IDS system. Before introducing the GAN,
320 attacks were classified as normal, presenting a huge amount of attacks not detected by
the system. We can cope with this either by improving the DRL agent or enhancing the
training process. We suggested introducing the GAN to generate additional data that help
to improve the detection of some attacks. As shown in Figure 3, after applying the GAN,
the number of not detected attacks was reduced by 100, demonstrating the importance of
using the DRL.
Table 4. Binaryclassification.
(a) (b)
Figure 3. ConfusionMatrices of binary classification. (a) Normal DRL. (b) DRL with GAN.
The classification report presented in Figure 4 demonstrates how the DRL-based IDS
system trained only using DS2OS can fail in identifying the attacks since its precision is
about 0.74. This is due to unbalanced data resulting in an unstable learning process for the
agent. After using the GAN agent in the training, the recall of the IDS is increased from
0.89 to 0.93, which is a significant improvement that ameliorates the performance of the
system. However, the precision is improved by 0.03, which means that using the GAN
in the training process of the binary classification system can be investigated further for
better results.
(a) (b)
Figure 4. Binary classification report. (a) Normal DRL. (b) DRL with GAN.
However, the impact of the GAN agent can be shown clearly when considering the
multi-class classification. For this, we trained a DRL agent on the DS2OS dataset using
different learning rates to identify the most adequate rate, similarly to the process conducted
for binary classification, as shown in Figure 2. The results of simple DRL without the GAN
agent are shown by the confusion matrix and the classification report, respectively, in
Figures 5a and 6a. Those results helped us to train the proposed GAN agent and to identify
its input. However, the results of the simple DRL show that data probing and incorrect
setup attacks are not well detected by the trained agent, as we can see in the second and
sixth rows. In addition, the classification report in Figure 6a shows that the precision of
Sensors 2022, 22, 8085 13 of 18
detecting data probing and incorrect setup attacks is about zero, which means that this
system cannot recognize these attacks. This is due to a lack of samples presenting these
attacks in the main dataset used for the training. Hence, the agent does not receive sufficient
data to learn their feature combination and identify them in the inference process. We
suggest introducing a GAN agent in the training process that generates artificial samples of
the exact data type to enhance the dataset and ameliorate the learning process of the DRL
agent. Three scenarios are considered in this study corresponding to the GAN1 , GAN2 ,
and GAN3 , where each one of these agents is trained on the DS2OS dataset part. GAN1 is
trained on the full dataset, GAN2 is trained only on incorrect setup samples, and GAN3 is
trained on data probing samples. Figure 7 shows the loss convergence of the considered
agents. Thus, the convergence of GAN1 shown by Figure 7a seems to be the unequilibrated
learning process, while both GAN2 and GAN3 trained on a specified dataset class show
perfect convergence of their losses. This will impact the results of DRL using the GAN
agent for the training process.
(a) (b)
(c) (d)
Figure 5. Confusion matrices of multi-class classification. (a) Normal DRL. (b) DRL with GAN1 .
(c) DRL with GAN2 . (d) DRL with GAN3 .
Sensors 2022, 22, 8085 14 of 18
(a) (b)
(c) (d)
Figure 6. Multiclass classification report. (a) Normal DRL. (b) DRL with GAN1 . (c) DRL with GAN2 .
(d) DRL with GAN3 .
Table 5 shows the multiclass inference results of the DRL agent for different scenarios
with and without a GAN agent in the training process. The aim of introducing the GAN is
to improve the performance of the DRL-based IDS system, which can be seen in the second
column of the accuracy. Where a simple DRL agent achieves an accuracy of 98.85, which is
reduced when using the GAN trained in the full dataset, this means that GAN1 perturbs
the training process of the DRL agent since is not well trained, as discussed previously.
Generating a full artificial dataset does not help the DRL agent and deteriorates the quality
of the original dataset. On the other hand, GAN2 , trained on the WS class of the DS2OS
dataset, enhances the accuracy by a simple, small amount. This is because of the small
number of WS samples in the testing DS2OS dataset. In contrast, DRL3 , trained on the DP
dataset, significantly improves the performance of the simple DRL in terms of the accuracy
as well as the precision and the F1-score, respectively, in columns two, three, and four of
Table 5.
5. Conclusions
This paper presents the design and development of Distributional Reinforcement
Learning and Generative Adversarial Network-based anomaly detection models for In-
dustrial IoT, namely DRL-GAN for an imbalanced dataset. The proposed model was
evaluated using the DS2OS dataset in two model scenarios. Two models were used to
assess the capability of DRL to detect all attacks, whereas the GAN model was used to
generate the data augmentation. The normal DRL and DRL-GAN demonstrated their
adaptability by achieving accurate identification. The performance of the normal DRL was
compared to DRL-GAN, and it was found that the latter provides the best results on almost
all evaluation criteria for multiclass and binary classifications. The consistent performance
of the DRL-GAN model on the DS2OS data set proves the robustness of the proposed
infrastructure for anomaly detection in the Industrial IoT. The proposed model composed
of both distributional RL and a GAN agent suffers from the high computational resources
required for the training process. In future work, we plan to further investigate anomaly
detection in IoT networks through various optimizing techniques to enhance the learning
ability of the DRL-GAN model and make it more efficient with smaller data samples.
Author Contributions: Conceptualization, H.B., M.J. and K.I.; methodology, H.B., M.J. and K.I.;
software, H.B.; validation, H.B., M.J. and K.I.; formal analysis, M.J.; investigation, H.B. and K.I.;
resources, H.B. and M.J.; data curation, H.B. and M.J.; writing—original draft preparation, H.B;
writing—review and editing, K.I., J.B.O. and E.M.A.; visualization, H.B.; supervision, K.I., J.B.O. and
E.M.A. All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The data presented in this study are available on request from the
corresponding author.
Conflicts of Interest: The authors declare no conflict of interest.
Notation
The following notation of parameters are used in this manuscript:
G Generator network
C Critic network
θG , θR Parameters of generator or discriminator
α, β 1 , β 2 Parameters of Adam optimizer
St State captured by the agent at time-slot t
At Possible actions taken by the agent at time-slot t
Rt Reward returned to the agent at time-slot t
Pa Transaction of state probability matrix
γ Discount factor, where 0 < γ < 1
τ Bellman operator
X Original Data
M Replay memory data set
z Random noise vector
λ Coefficient of penalty
References
1. Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19, 1977.
[CrossRef] [PubMed]
2. Latif, S.; Driss, M.; Boulila, W.; Huma, Z.e.; Jamal, S.S.; Idrees, Z.; Ahmad, J. Deep Learning for the Industrial Internet of Things
(IIoT): A Comprehensive Survey of Techniques, Implementation Frameworks, Potential Applications, and Future Directions.
Sensors 2021, 21, 7518. [CrossRef] [PubMed]
Sensors 2022, 22, 8085 17 of 18
3. Huma, Z.E.; Latif, S.; Ahmad, J.; Idrees, Z.; Ibrar, A.; Zou, Z.; Alqahtani, F.; Baothman, F. A Hybrid Deep Random Neural Network
for Cyberattack Detection in the Industrial Internet of Things. IEEE Access 2021, 9, 55595–55605. [CrossRef] [CrossRef]
4. Jiang, W. Graph-Based Deep Learning for Communication Networks: A Survey. Comput. Commun. 2022, 185, 40–54. [CrossRef]
[CrossRef]
5. Rouzbahani, H.M.; Bahrami, A.H.; Karimipour, H. AI-Enabled Threat Detection and Security Analysis for Industrial IoT; Springer:
Berlin/Heidelberg, Germany, 2021; pp. 181–194.
6. Alzubi, Q.M.; Anbar, M.; Sanjalawe, Y.; Al-Betar, M.A.; Abdullah, R. Intrusion Detection System Based on Hybridizing a Modified
Binary Grey Wolf Optimization and Particle Swarm Optimization. Expert Syst. Appl. 2022, 204, 117597. [CrossRef] [CrossRef]
7. Dahou, A.; Abd Elaziz, M.; Chelloug, S.A.; Awadallah, M.A.; Al-Betar, M.A.; Al-qaness, M.A.; Forestiero, A. Intrusion Detection
System for IoT Based on Deep Learning and Modified Reptile Search Algorithm. Comput. Intell. Neurosci. 2022, 2022, 6473507.
[CrossRef] [CrossRef]
8. Otair, M.; Ibrahim, O.T.; Abualigah, L.; Altalhi, M.; Sumari, P. An Enhanced Grey Wolf Optimizer Based Particle Swarm Optimizer
for Intrusion Detection System in Wireless Sensor Networks. Wirel. Netw. 2022, 28, 721–744. [CrossRef] [CrossRef]
9. Jouhari, M.; Amhoud, E.M.; Saeed, N.; Alouini, M.S. A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances,
Potentials, and Challenges. arXiv 2022, arXiv:2202.11082.
10. Benaddi, H.; Ibrahimi, K.; Benslimane, A. Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-
Fuzzy Clustering-KNN. In Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications
(WINCOM), Marrakesh, Morocco, 16–19 October 2018; pp. 1–6.
11. Benaddi, H.; Ibrahimi, K.; Benslimane, A.; Qadir, J. A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS)
for Securing Wireless Sensor Networks and Internet of Things. In Proceedings of the International Wireless Internet Conference,
TaiChung, Taiwan, 26–27 November 2019; pp. 73–87.
12. Sarker, I.H. Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. SN Comput.
Sci. 2021, 2, 154. [CrossRef] [CrossRef]
13. Wu, Y. Robust Learning Enabled Intelligence for the Internet-of-Things: A Survey from the Perspectives of Noisy Data and
Adversarial Examples. IEEE Internet Things J. 2020, 8, 9568–9579 . [CrossRef] [CrossRef]
14. Lo, W.W.; Layeghy, S.; Sarhan, M.; Gallagher, M.; Portmann, M. E-GraphSAGE: A Graph Neural Network based Intrusion
Detection System for IoT. In Proceedings of the NOMS 2022–2022 IEEE/IFIP Network Operations and Management Symposium,
Budapest, Hungary, 25–29 April 2022; pp. 1–9. [CrossRef]
15. Zhou, X.; Liang, W.; Li, W.; Yan, K.; Shimizu, S.; Wang, K. Hierarchical Adversarial Attacks against Graph Neural Network Based
IoT Network Intrusion Detection System. IEEE Internet Things J. 2021, 9, 9310–9319. [CrossRef] [CrossRef]
16. Ilahi, I.; Usama, M.; Qadir, J.; Janjua, M.U.; Al-Fuqaha, A.; Hoang, D.T.; Niyato, D. Challenges and countermeasures for adversarial
attacks on deep reinforcement learning. arXiv 2020, arXiv:2001.09684.
17. Zhou, K.; Wang, W.; Huang, L.; Liu, B. Comparative study on the time series forecasting of web traffic based on statistical model
and Generative Adversarial model. Knowl.-Based Syst. 2021, 213, 106467. [CrossRef] [CrossRef]
18. Abusnaina, A.; Khormali, A.; Alasmary, H.; Park, J.; Anwar, A.; Meteriz, U.; Mohaisen, A. Breaking graph-based IoT malware
detection systems using adversarial examples: Poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless
and Mobile Networks, Miami, FL, USA, 15–17 May 2019; pp. 290–291.
19. Hiromoto, R.E.; Haney, M.; Vakanski, A. A secure architecture for IoT with supply chain risk management. In Proceedings of
the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications (IDAACS), Bucharest, Romania, 21–23 September 2017; pp. 431–435.
20. Martins, N.; Cruz, J.M.; Cruz, T.; Henriques Abreu, P. Adversarial Machine Learning Applied to Intrusion and Malware Scenarios:
A Systematic Review. IEEE Access 2020, 8, 35403–35419. [CrossRef] [CrossRef]
21. Mavrin, B.; Zhang, S.; Yao, H.; Kong, L.; Wu, K.; Yu, Y. Distributional reinforcement learning for efficient exploration. arXiv 2019,
arXiv:1905.06125.
22. Bellemare, M.G.; Dabney, W.; Munos, R. A distributional perspective on reinforcement learning. arXiv 2017, arXiv:1707.06887.
23. Hu, W.; Tan, Y. Generating adversarial malware examples for black-box attacks based on gan. arXiv 2017, arXiv:1702.05983.
24. Lin, Z.; Shi, Y.; Xue, Z. Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv 2018,
arXiv:1809.02077.
25. Belenko, V.; Chernenko, V.; Kalinin, M.; Krundyshev, V. Evaluation of GAN applicability for intrusion detection in self-organizing
networks of cyber physical systems. In Proceedings of the International Russian Automation Conference (RusAutoCon), Sochi,
Russia, 9–16 September 2018; pp. 1–7.
26. Ferdowsi, A.; Saad, W. Generative adversarial networks for distributed intrusion detection in the internet of things. In Proceedings
of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6.
27. Clements, J.; Yang, Y.; Sharma, A.; Hu, H.; Lao, Y. Rallying adversarial techniques against deep learning for network security.
arXiv 2019, arXiv:1903.11688.
28. Yin, C.; Zhu, Y.; Liu, S.; Fei, J.; Zhang, H. An enhancing framework for botnet detection using generative adversarial networks. In
Proceedings of the International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China, 26–28 May 2018;
pp. 228–234.
Sensors 2022, 22, 8085 18 of 18
29. Ibitoye, O.; Shafiq, O.; Matrawy, A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks.
In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6.
30. Shahriar, M.H.; Haque, N.I.; Rahman, M.A.; Alonso, M., Jr. G-ids: Generative adversarial networks assisted intrusion detection
system. arXiv 2020, arXiv:2006.00676.
31. Usama, M.; Asim, M.; Latif, S.; Qadir, J. Generative Adversarial Networks for Launching and Thwarting Adversarial Attacks on
Network Intrusion Detection Systems. In Proceedings of the 15th International Wireless Communications & Mobile Computing
Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 78–83.
32. Pacheco, Y.; Sun, W. Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets. In
Proceedings of the ICISSP, Online, 11–13 February 2021; pp. 160–171.
33. Ullah, I.; Mahmoud, Q.H. A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial
Networks. IEEE Access 2021, 9, 165907–165931. [CrossRef] [CrossRef]
34. Lee, C.-K.; Cheon, Y.-J.; Hwang, W.-Y. Studies on the GAN-Based Anomaly Detection Methods for the Time Series Data. IEEE
Access 2021, 9, 73201–73215. [CrossRef] [CrossRef]
35. Zhao, S.; Li, J.; Wang, J.; Zhang, Z.; Zhu, L.; Zhang, Y. AttackGAN: Adversarial Attack against Black-Box IDS Using Generative
Adversarial Networks. Procedia Comput. Sci. 2021, 187, 128–133. [CrossRef] [CrossRef]
36. Zhang, C.; Costa-Perez, X.; Patras, P. Adversarial Attacks against Deep Learning-Based Network Intrusion Detection Systems and
Defense Mechanisms. IEEE/ACM Trans. Netw. 2022, 30, 1294–1311. [CrossRef] [CrossRef]
37. Jiang, H.; Lin, J.; Kang, H. FGMD: A Robust Detector against Adversarial Attacks in the IoT Network. Future Gener. Comput. Syst.
2022, 132, 194–210. [CrossRef] [CrossRef]
38. Weinger, B.; Kim, J.; Sim, A.; Nakashima, M.; Moustafa, N.; Wu, K.J. Enhancing IoT Anomaly Detection Performance for Federated
Learning. Digit. Commun. Netw. 2022, 8, 314–323. [CrossRef] [CrossRef]
39. Ds2os Traffic Traces. Available online: https://www.kaggle.com/francoisxa/ds2ostraffictraces (accessed on 22 May 2022).
40. Pahl, M.-O.; Aubet, F.-X. All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection. In Proceedings of
the 14th International Conference on Network and Service Management (CNSM), Rome, Italy, 5–8 November 2018; pp. 72–80.
41. Khare, S.; Totaro, M. Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home. In Proceedings of the 3rd
International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, USA, 24–26 June 2020; pp. 56–63.
42. Benaddi, H.; Ibrahimi, K.; Benslimane, A.; Jouhari, M.; Qadir, J. Robust Enhancement of Intrusion Detection Systems Using Deep
Reinforcement Learning and Stochastic Game. IEEE Trans. Veh. Technol. 2022, 71, 11089–11102. [CrossRef] [CrossRef]
43. Maillé, P.; Reichl, P.; Tuffin, B. Of threats and costs: A game- theoretic approach to security risk management. In Performance
Models and Risk Management in Communications Systems; Springer: Berlin/Heidelberg, Germany, 2011; pp. 33–53.
44. Bellman, R.; Kalaba, R. Dynamic programming and statistical communication theory. Proc. Natl. Acad. Sci. USA 1957, 43, 749.
[CrossRef] [PubMed] [CrossRef]
45. Ho, J.; Ermon, S. Generative adversarial imitation learning. arXiv 2016, arXiv:1606.03476.
46. Gulrajani, I.; Ahmed, F.; Arjovsky, M.; Dumoulin, V.; Courville, A.C. Improved training of wasserstein gans. Adv. Neural Inf.
Process. Syst. 2017, 379, 5767–5777.