Evaluation and Comparison of the Use of Reinforcement Learning Algorithms on SSH Honeypot

A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the existence of honeypots using various other software and tools. So, honeypots need a way to learn how h...

Full description

Bibliographic Details
Main Authors: Marco Ariano Kristyanto, Maya Hilda Lestari Louk
Format: Article
Language:English
Published: Center for Research and Community Service, Institut Informatika Indonesia Surabaya 2024-02-01
Series:Teknika
Subjects:
Online Access:https://ejournal.ikado.ac.id/index.php/teknika/article/view/763
Description
Summary:A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the existence of honeypots using various other software and tools. So, honeypots need a way to learn how hackers behave. The idea proposed is to combine honeypots with reinforcement learning algorithms so that honeypots become adaptive honeypots. This study suggests the concept by comparing the two Q learning-based RL algorithms, namely DQN and DDQN, to reach which algorithm is more optimal. The study results showed that the DDQN algorithm is more optimal in determining actions when compared to the DQN algorithm because using a double Q-value can help determine the action more accurately. Based on the result, the DDQN algorithm consumed less memory than the DQN Honeypot. The learning rate curve and the processing of DDQN algorithm commands can be used as an alternative algorithm that can be combined with honeypots because of the learning rate, which can make honeypots faster in the dynamic environment.
ISSN:2549-8037
2549-8045