Network Security Defense Strategy of Deep Reinforcement Learning Oriented to Game Battle
-
Published:2024-05-28
Issue:3
Volume:2
Page:18-24
-
ISSN:3005-7140
-
Container-title:International Journal of Computer Science and Information Technology
-
language:
-
Short-container-title:IJCSIT
Abstract
With the popularity of online games and the increasing frequency of game battles, game platforms are facing more and more network security threats and attacks. In order to effectively deal with these threats, this study proposes a network security defense strategy of Deep Reinforcement Learning (DRL) for game warfare. Through the modeling of game battle environment and the application of DRL algorithm, this strategy can monitor and identify all kinds of network attacks in game battle in real time, and take corresponding measures to defend and deal with them. In this study, the corresponding experimental environment is designed, and the network security defense strategy based on DRL is evaluated and analyzed. The experimental results show that the strategy has obvious advantages in network attack detection rate and false alarm rate, and has good stability and reliability. In addition, the strategy also shows strong generalization ability and adaptability, and can effectively deal with different types of network attack threats. The results of this study are of great significance for strengthening the network security defense of the game platform and improving the user experience and the stability of the game environment.
Publisher
Warwick Evans Publishing
Reference12 articles.
1. Cao, L. , Jiang, X. , Zhao, Y. , Wang, S. , & Xu, X. (2020). A survey of network attacks on cyber-physical systems. IEEE Access, 2020(99), 1-1. 2. Chen, Y. H. , Lai, Y. C. , Jan, P. T. , & Tsai, T. Y. (2021). A spatiotemporal-oriented deep ensemble learning model to defend link flooding attacks in iot network. Sensors, 21(4), 1027. 3. Xi, L. , Wang, Y. , Wang, Y. , Wang, Z. , & Chen, Y. (2021). Deep reinforcement learning-based service-oriented resource allocation in smart grids. IEEE Access, PP(99), 1-1. 4. Zhao, Y. , Xu, K. , Wang, H. , Li, B. , & Jia, R. . (2021). Stability-based analysis and defense against backdoor attacks on edge computing services. IEEE Network, 35(1), 163-169. 5. Chen, Z. , Cui, G. , Zhang, L. , Yang, X. , & Sun, T. (2021). Optimal strategy for cyberspace mimic defense based on game theory. IEEE Access, 2021(99), 1-1.
|
|