  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2875</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Investigating the Efficacy of Deep Reinforcement Learning Models in Detecting and Mitigating Cyber-attacks: a Novel Approach</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of CSE, PVP Siddhartha Institute of Technology, Vijayawada, A.P, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>S.</given_name>
    <surname>S.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Anuradha</given_name>
    <surname>Chokka</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Lakireddy Bali Reddy College of Engineering, Mylavaram, AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Pappula</given_name>
    <surname>Sarala</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Engineering, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Rajeswari</given_name>
    <surname>Nakka</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Dhanekula Institute of Engineering and Technology, Gangur, Vijayawada, A.P, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Suresh Babu</given_name>
    <surname>Chandolu</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Applications, Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada, A.P, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>V. Esther</given_name>
    <surname>Jyothi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Ordinary defence components like rule-based firewalls and mark based detection are not staying aware of the always expanding intricacy and frequency of cyber security dangers. The reason for this work is to explore the way that deep reinforcement learning (DRL), a subfield of artificial intelligence famous for its viability in handling testing decision-production situations, may be utilized to improve cyber security conventions. To mimic and balance threatening cyber-attacks, we present a system that utilizes deep reinforcement learning (DRL). We propose a specialist based model that can learn and adjust ceaselessly in powerful network security situations. In light of the present status of the network and the rewards it gets for its decisions, the specialist concludes what the best game-plans are. Specifically, we utilize the policy gradient (PG)- based double deep Q-network (DDQN) model and trial on three different datasets: NSL-KDD, CIC-IDS, and AWID. Our review demonstrates the way that DRL can really further develop the detection after-effects of cyber-attacks. Utilizing the policy gradient DDQN model on different datasets, we find prominent upgrades in cyber security conventions. Specific boundary modifications upgrade the viability of our philosophy much more, displaying empowering results on different datasets. This exploration features the potential of deep reinforcement learning (DRL) as a successful instrument in the field of cyber security. Our examination progresses detection techniques and gives a versatile arrangement that can be applied to an assortment of cyber security worries by giving areas of strength for a to demonstrating and relieving cyber dangers.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>96</first_page>
   <last_page>113</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140107</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2875</resource>
  </doi_data>
 </journal_article>
</journal>
