Deep Reinforcement Learning-based Asymmetric Convolutional Autoencoder for Intrusion Detection

Authors

  • Yuqin Dai School of Electronic Information and Artificial Intelligence, Yibin Vocational & Technical College, Yibin 644000, China
  • Xinjie Qian College of Digital Economy, Yibin Industry Polytechnic College, Yibin 644000, China
  • Chunmei Yang School of Changning County Vocational and Technical School, Yibin 644000, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1314

Keywords:

Intrusion detection system, asymmetric convolutional autoencoder, network security, attack detection, feature extraction

Abstract

In recent years, intrusion detection systems (IDSs) have become a critical component of network security, due to the growing number and complexity of cyber-attacks. Traditional IDS methods, including signature-based and anomaly-based detection, often struggle with the high-dimensional and imbalanced nature of network traffic, leading to suboptimal performance. Moreover, many existing models fail to efficiently handle the diverse and complex attack types. In response to these challenges, we propose a novel deep learning-based IDS framework that leverages a deep asymmetric convolutional autoencoder (DACA) architecture. Our model combines advanced techniques for feature extraction, dimensionality reduction, and anomaly detection into a single cohesive framework. The DACA model is designed to effectively capture complex patterns and subtle anomalies in network traffic while significantly reducing computational complexity. By employing this architecture, we achieve superior detection accuracy across various types of attacks even in imbalanced datasets. Experimental results demonstrate that our approach surpasses several state-of-the-art methods, including HCM-SVM, D1-IDDS, and GNN -IDS, achieving high accuracy, precision, recall, and F1-score on benchmark datasets such as NSL-KDD and UNSW-NB15. The results emphasize how effectively our model identifies complex and varied attack patterns. In conclusion, the proposed IDS model offers a promising solution to the limitations of current detection systems, with significant improvements in performance and efficiency. This approach contributes to advancing the development of robust and scalable network security solutions.

Downloads

Download data is not yet available.

Author Biographies

Yuqin Dai, School of Electronic Information and Artificial Intelligence, Yibin Vocational & Technical College, Yibin 644000, China

Yuqin Dai was born in Sichuan, China, in 1994. From 2012 to 2016, she studied at Southwest University of Science and Technology and received her Bachelor’s degree in 2016. From 2016 to 2019, she continued her studies at the same university and received her Master’s degree in 2019. Currently, she works in Yibin Vocational & Technical College. She has published a total of four papers. Her research interests include cyber security, artificial intelligence, and big data.

Xinjie Qian, College of Digital Economy, Yibin Industry Polytechnic College, Yibin 644000, China

Xinjie Qian was born in Anhui, China, in 1981. He is an associate professor. He studied at Sichuan University from 2000 to 2004 and received his Bachelor’s degree in 2004. From 2008 to 2011, he continued his studies at Sichuan University and obtained his Master of Engineering degree in 2011. He worked at Yibin Vocational & Technical College from 2004 to 2024. Since January 2025, he has been working at Yibin Industry Polytechnic College. He has published over 30 papers. His research interests include software development and big data.

Chunmei Yang, School of Changning County Vocational and Technical School, Yibin 644000, China

Chunmei Yang was born in Sichuan, China, in 1992. She studied at Chongqing University of Arts and Sciences from 2012 to 2016 and received her Bachelor’s degree in 2016. From 2012 to 2016, she worked at Xujia Middle School. Since 2019, she has been working at Changning Vocational and Technical School. Her research interests include software development.

References

M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2020: IEEE, pp. 391–396.

X. Han, Y. Liu, Z. Zhang, X. Lü, and Y. Li, “Sparse auto-encoder combined with kernel for network attack detection,” Computer Communications, vol. 173, pp. 14–20, 2021.

Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395–9409, 2022.

Y.-F. Hsu and M. Matsuoka, “A deep reinforcement learning approach for anomaly network intrusion detection system,” in 2020 IEEE 9th international conference on cloud networking (CloudNet), 2020: IEEE, pp. 1–6.

J. Wang, F. Li, and L. He, “A Unified Framework for Adversarial Patch Attacks against Visual 3D Object Detection in Autonomous Driving,” IEEE Transactions on Circuits and Systems for Video Technology, 2025.

J. Wang, F. Li, S. Lv, L. He, and C. Shen, “Physically Realizable Adversarial Creating Attack against Vision-based BEV Space 3D Object Detection,” IEEE Transactions on Image Processing, 2025.

M. Lopez-Martin, B. Carro, and A. Sanchez-Esguevillas, “Application of deep reinforcement learning to intrusion detection for supervised problems,” Expert Systems with Applications, vol. 141, p. 112963, 2020.

L. Zhang, J. Liu, Y. Wei, D. An, and X. Ning, “Self-supervised learning-based multi-source spectral fusion for fruit quality evaluation: A case study in mango fruit ripeness prediction,” Information Fusion, vol. 117, p. 102814, 2025.

R. B. Ping and W. Z. Yue, “Strategic Focus, Tasks, and Pathways for Promoting China’s Modernization through New Productive Forces,” Journal of Xi’an University of Finance and Economics, vol. 1, pp. 3–11, 2024.

K. Sethi, Y. V. Madhav, R. Kumar, and P. Bera, “Attention based multi-agent intrusion detection systems using reinforcement learning,” Journal of Information Security and Applications, vol. 61, p. 102923, 2021.

H. Zhang et al., “Cross-modal knowledge transfer for 3D point clouds via graph offset prediction,” Pattern Recognition, vol. 162, p. 111351, 2025.

G. Karatas, O. Demir, and O. K. Sahingoz, “Deep learning in intrusion detection systems,” in 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), 2018: IEEE, pp. 113–116.

L. A. Nguyen, I. Miciæ, N.-T. Nguyen, and S. Stanimiroviæ, “Depth-bounded fuzzy bisimulation for fuzzy modal logic,” Cybernetics and Systems, pp. 1–18, 2023.

H. Alavizadeh, H. Alavizadeh, and J. Jang-Jaccard, “Deep Q-learning based reinforcement learning approach for network intrusion detection,” Computers, vol. 11, no. 3, p. 41, 2022.

H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” applied sciences, vol. 9, no. 20, p. 4396, 2019.

R. Abdulhammed, H. Musafer, A. Alessa, M. Faezipour, and A. Abuzneid, “Features dimensionality reduction approaches for machine learning based network intrusion detection,” Electronics, vol. 8, no. 3, p. 322, 2019.

C. X. Jing and W. Qing, “The Logic and Pathways of New Productive Forces Driving High-Quality Development,” Journal of Xi’an University of Finance and Economics, vol. 37, no. 1, pp. 12–20, 2024.

Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, and F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, p. e4150, 2021.

A. Aruna Kumari, A. Bhagat, and S. Kumar Henge, “Classification of Diabetic Retinopathy Severity Using Deep Learning Techniques on Retinal Images,” Cybernetics and Systems, pp. 1–25, 2024.

M. Sannidhan, J. E. Martis, R. S. Nayak, S. K. Aithal, and K. Sudeepa, “Detection of antibiotic constituent in Aspergillus flavus using quantum convolutional neural network,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–26, 2023.

E. Alhajjar, P. Maxwell, and N. Bastian, “Adversarial machine learning in network intrusion detection systems,” Expert Systems with Applications, vol. 186, p. 115782, 2021.

O. Almomani, M. A. Almaiah, A. Alsaaidah, S. Smadi, A. H. Mohammad, and A. Althunibat, “Machine learning classifiers for network intrusion detection system: comparative study,” in 2021 International Conference on Information Technology (ICIT), 2021: IEEE, pp. 440–445.

K. Zheng and Z. Li, “An Image-Text Matching Method for Multi-Modal Robots,” Journal of Organizational and End User Computing (JOEUC), vol. 36, no. 1, pp. 1–21, 2024.

W. Han, T. Zhang, J. Khan, L. Wang, and C. Tu, “Going global in the digital era: how digital finance affects Chinese OFDI,” Journal of Organizational and End User Computing (JOEUC), vol. 36, no. 1, pp. 1–22, 2024.

J. Alsamiri and K. Alsubhi, “Internet of things cyber attacks detection using machine learning,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 12, 2019.

Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset,” IEEE access, vol. 9, pp. 22351–22370, 2021.

C. Quan and B. Lu, “Enhancing Innovation Management and Venture Capital Evaluation via Advanced Deep Learning Techniques,” Journal of Organizational and End User Computing (JOEUC), vol. 36, no. 1, pp. 1–22, 2024.

P. Li, X. Peng, C. Zhang, and T. Baležentis, “Financial Cycle With Text Information Embedding Based on LDA Measurement and Nowcasting,” Journal of Organizational and End User Computing (JOEUC), vol. 36, no. 1, pp. 1–25, 2024.

A. O. Alzahrani and M. J. Alenazi, “Designing a network intrusion detection system based on machine learning for software defined networks,” Future Internet, vol. 13, no. 5, p. 111, 2021.

Y. Xin et al., “Machine learning and deep learning methods for cybersecurity,” Ieee access, vol. 6, pp. 35365–35381, 2018.

J. Huang, X. Yu, D. An, X. Ning, J. Liu, and P. Tiwari, “Uniformity and deformation: A benchmark for multi-fish real-time tracking in the farming,” Expert Systems with Applications, vol. 264, p. 125653, 2025.

M. Farooq, R. A. Khan, and S. Z. Zahoor, “Q-learning and deep Q networks for securing IoT networks, challenges, and solution,” in Cognitive Machine Intelligence: CRC Press, 2024, pp. 158–175.

T. Lyu et al., “Optimized CNNs for Rapid 3D Point Cloud Object Recognition,” arXiv preprint arXiv:2412.02855, 2024.

M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, “Multi-stage optimized machine learning framework for network intrusion detection,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1803–1816, 2020.

L. Zhao, B. Deng, L. Wu, C. Liu, M. Guo, and Y. Guo, “Deep Reinforcement Learning for Adaptive Stock Trading: Tackling Inconsistent Information and Dynamic Decision Environments,” Journal of Organizational and End User Computing (JOEUC), vol. 36, no. 1, pp. 1–27, 2024.

Y. Wu, D. Wei, and J. Feng, “Network attacks detection methods based on deep learning techniques: a survey,” Security and Communication Networks, vol. 2020, no. 1, p. 8872923, 2020.

K. A. Taher, B. M. Y. Jisan, and M. M. Rahman, “Network intrusion detection using supervised machine learning technique with feature selection,” in 2019 International conference on robotics, electrical and signal processing techniques (ICREST), 2019: IEEE, pp. 643–646.

V. Praveena et al., “Optimal deep reinforcement learning for intrusion detection in UAVs,” Computers, Materials & Continua, vol. 70, no. 2, pp. 2639–2653, 2022.

P. P. Shinde and S. Shah, “A review of machine learning and deep learning applications,” in 2018 Fourth international conference on computing communication control and automation (ICCUBEA), 2018: IEEE, pp. 1–6.

A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, “Survey of intrusion detection systems: techniques, datasets and challenges,” Cybersecurity, vol. 2, no. 1, pp. 1–22, 2019.

H. Pang et al., “Electronic Health Records-Based Data-Driven Diabetes Knowledge Unveiling and Risk Prognosis,” arXiv preprint arXiv:2412.03961, 2024.

A. Kodipalli, S. L. Fernandes, S. K. Dasar, and T. Ismail, “Computational framework of inverted fuzzy C-means and quantum convolutional neural network towards accurate detection of ovarian tumors,” International Journal of E-Health and Medical Communications (IJEHMC), vol. 14, no. 1, pp. 1–16, 2023.

N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad, “Survey on SDN based network intrusion detection system using machine learning approaches,” Peer-to-Peer Networking and Applications, vol. 12, no. 2, pp. 493–501, 2019.

A. Jamalipour and S. Murali, “A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey,” IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9444–9466, 2021.

Y. Zeng, M. Qiu, D. Zhu, Z. Xue, J. Xiong, and M. Liu, “DeepVCM: A deep learning based intrusion detection method in VANET,” in 2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity), IEEE intl conference on high performance and smart computing,(HPSC) and IEEE intl conference on intelligent data and security (IDS), 2019: IEEE, pp. 288–293.

S. K. Gupta, M. Tripathi, and J. Grover, “Hybrid optimization and deep learning based intrusion detection system,” Computers and Electrical Engineering, vol. 100, p. 107876, 2022.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in 2009 IEEE symposium on computational intelligence for security and defense applications, 2009: Ieee, pp. 1–6.

N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 military communications and information systems conference (MilCIS), 2015: IEEE, pp. 1–6.

A. N. Jaber and S. U. Rehman, “FCM–SVM based intrusion detection system for cloud computing environment,” Cluster Computing, vol. 23, no. 4, pp. 3221–3231, 2020.

D.-H. Tran and M. Park, “FN-GNN: A novel graph embedding approach for enhancing graph neural networks in network intrusion detection systems,” Applied Sciences, vol. 14, no. 16, p. 6932, 2024.

M. Arsalan, M. Mubeen, M. Bilal, and S. F. Abbasi, “1D-CNN-IDS: 1D CNN-based Intrusion Detection System for IIoT,” in 2024 29th International Conference on Automation and Computing (ICAC), 2024: IEEE, pp. 1–4.

C. Khammassi and S. Krichen, “A NSGA2-LR wrapper approach for feature selection in network intrusion detection,” Computer Networks, vol. 172, p. 107183, 2020.

Z. Sun, A. M. Teixeira, and S. Toor, “GNN-IDS: Graph Neural Network based Intrusion Detection System,” in Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024, pp. 1–12.

Downloads

Published

2025-06-18

How to Cite

Dai, Y. ., Qian, X. ., & Yang, C. . (2025). Deep Reinforcement Learning-based Asymmetric Convolutional Autoencoder for Intrusion Detection. Journal of ICT Standardization, 13(01), 67–82. https://doi.org/10.13052/jicts2245-800X.1314

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications