<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CSSE</journal-id>
<journal-id journal-id-type="nlm-ta">CSSE</journal-id>
<journal-id journal-id-type="publisher-id">CSSE</journal-id>
<journal-title-group>
<journal-title>Computer Systems Science &#x0026; Engineering</journal-title>
</journal-title-group>
<issn pub-type="ppub">0267-6192</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">30630</article-id>
<article-id pub-id-type="doi">10.32604/csse.2023.030630</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Feature Selection with Deep Reinforcement Learning for Intrusion Detection System</article-title><alt-title alt-title-type="left-running-head">Feature Selection with Deep Reinforcement Learning for Intrusion Detection System</alt-title><alt-title alt-title-type="right-running-head">Feature Selection with Deep Reinforcement Learning for Intrusion Detection System</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Priya</surname><given-names>S.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>spriyasrmist@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Kumar</surname><given-names>K. Pradeep Mohan</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science and Engineering, SRM Institute of Science and Technology</institution>, <addr-line>Ramapuram, Chennai, 600089</addr-line>, <country>India</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computing Technologies, SRM Institute of Science and Technology</institution>, <addr-line>Kattankulathur, Chennai, 603203</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: S. Priya. Email: <email>spriyasrmist@gmail.com</email></corresp></author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2023</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>31</day>
<month>3</month>
<year>2023</year>
</pub-date>
<volume>46</volume>
<issue>3</issue>
<fpage>3339</fpage>
<lpage>3353</lpage>
<history>
<date date-type="received"><day>30</day><month>3</month><year>2022</year></date>
<date date-type="accepted"><day>12</day><month>5</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Priya and Kumar</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Priya and Kumar</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CSSE_30630.pdf"></self-uri>
<abstract>
<p>An intrusion detection system (IDS) becomes an important tool for ensuring security in the network. In recent times, machine learning (ML) and deep learning (DL) models can be applied for the identification of intrusions over the network effectively. To resolve the security issues, this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique, called BBOFS-DRL for intrusion detection. The proposed BBOFS-DRL model mainly accomplishes the recognition of intrusions in the network. To attain this, the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm (BOA) to elect feature subsets. Besides, DRL model is employed for the proper identification and classification of intrusions that exist in the network. Furthermore, beetle antenna search (BAS) technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency. For ensuring the superior intrusion detection outcomes of the BBOFS-DRL model, a wide-ranging experimental analysis is performed against benchmark dataset. The simulation results reported the supremacy of the BBOFS-DRL model over its recent state of art approaches.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Intrusion detection</kwd>
<kwd>security</kwd>
<kwd>reinforcement learning</kwd>
<kwd>machine learning</kwd>
<kwd>feature selection</kwd>
<kwd>beetle antenna search</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The advancement in the internet and communication domain has led to a greater rise in the size of the network and the corresponding data. By virtue of this, peculiar attacks are being arisen and have become a very big challenge for network security in detecting intrusions accurately. In addition to this, the prevalence of intruders with a motive to commence several attacks inside the network cannot be neglected [<xref ref-type="bibr" rid="ref-1">1</xref>]. An intrusion detection system (IDS) is single effective tool that keeps on preventing the network from probable intrusions by analyzing the traffic of the network, to assure its secrecy, integrity, and availability. In the cyber security domain, the IDS is absolutely necessary for attaining a solid line of defense in opposition to cyber intrusions. The digital planet becomes the primary supplement to the physical globe due to the worldwide use of computer networking and availability of programs and services that made it easy to establish users&#x2019; jobs in a short span of time at a lower cost [<xref ref-type="bibr" rid="ref-2">2</xref>]. A system is regarded as secure if these 3 principles of computer security that is, Confidentiality, Integrity, and Availability (CIA), are satisfied in a successful manner. Hackers always attempt to breach these principle matters, with each and every attack type having its own refined manner and assuming a very serious hazard to computer networking [<xref ref-type="bibr" rid="ref-3">3</xref>].</p>
<p>IDS is considered a network in a security management system widely used for the purpose of detecting network intrusions [<xref ref-type="bibr" rid="ref-4">4</xref>]. In order to get adapted to the fastest growth of network technologies and network security identification in various forms of outline, the generalization capability of the classifier requires an additional improvement, specifically in identifying unknown attacks. In order to develop an effective IDS model, a huge quantity of data is essential for training and testing purposes [<xref ref-type="bibr" rid="ref-5">5</xref>]. The low-quality and inappropriate information discovered in data may be removed after collecting the statistical properties matters from their observable attributes and components [<xref ref-type="bibr" rid="ref-6">6</xref>]. Thus presenting a deep interpretation of the existing dataset is important for IDS research.</p>
<p>In spite of massive efforts done by the researchers, IDS is still facing a challenge in betterment of detection accuracy while decreasing invalid alarm rates and noticing novel intrusions [<xref ref-type="bibr" rid="ref-7">7</xref>,<xref ref-type="bibr" rid="ref-8">8</xref>]. In recent times, machine learning (ML) and deep learning (DL)-based IDS systems are deployed as possible solutions to identify intrusions across the network effectively. The application zones of new methodologies to boost the performing task of IDSs are very important factor in current data networks with an increased hazard of cyber-attacks [<xref ref-type="bibr" rid="ref-9">9</xref>]. These kinds of attacks impact a high risk on network services which are important from a social end economical point of view [<xref ref-type="bibr" rid="ref-10">10</xref>]. In this work, we presented novel application zones of various in-depth reinforcement learning (DRL) algorithms for deducting intrusion.</p>
<p>In [<xref ref-type="bibr" rid="ref-11">11</xref>], a new network intrusion detection (ID) technique integrated with group convolutional was presented for improving the generalized performance of model. The fundamental classification utilizes group convolutional with symmetric infrastructure rather ordinary convolution neural network (CNN) that is trained by cyclic cosine annealing rate of learning. Al-Daweri et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] examine the comprehensive analysis of relevance of the features from the KDD99 and UNSW-NB15 datasets. In 3 approaches are utilized such as rough-set theory (RST), back propagation neural network (BPNN), and discrete variant of cuttlefish algorithm (D-CFA). Primary, the dependence ratio amongst the feature and the class has been computed, utilizing the RST. Secondary, all the features from the data sets developed an input to the BPNN, for measuring its capability to classifier tasks concerned all the classes. Tertiary, feature selection (FS) procedure is executed on several runs for indicating the frequency of selective of all the features. Kotecha et al. [<xref ref-type="bibr" rid="ref-13">13</xref>] examine the UNSW-NB15 Data set as presently most of optimum representatives of modern attack and suggested many methods. Ahmad et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] relate the several approaches for developing a network IDS. An optimal feature was chosen in the data set dependent upon the correlation amongst the features. In addition, it can be present the AdaBoost based method to network ID dependent upon these chosen features and existing their brief functionality and performance. The authors in [<xref ref-type="bibr" rid="ref-15">15</xref>] presented a promising hybrid feature selection (HFS) with ensemble classification that effectively chooses relevant features and offers consistent attack classifier.</p>
<p>This paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique, called BBOFS-DRL for intrusion detection. The proposed BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm (BOA) to elect feature subsets. Besides, DRL model is employed for the proper identification and classification of intrusions that exist in the network. Furthermore, beetle antenna search (BAS) technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency. For ensuring the superior intrusion detection outcomes of the BBOFS-DRL model, a wide-ranging experimental analysis is performed against benchmark dataset.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>The Proposed IDS Model</title>
<p>In this article, a new BBOFS-DRL model has been developed for accurate recognition of intrusions in the network. The BBOFS-DRL model initially designed the BBOFS algorithm based on the BOA to elect feature subsets. Besides, DRL model is employed for the proper identification and classification of intrusions that exist in the network. Furthermore, BAS technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates the block diagram of BBOFS-DRL technique.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Block diagram of BBOFS-DRL technique</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-1.tif"/>
</fig>
<sec id="s2_1">
<label>2.1</label>
<title>Design of BBOFS Technique</title>
<p>At the preliminary level, the BBOFS-DRL model initially designed the BBOFS algorithm based on the BOA to elect feature subsets [<xref ref-type="bibr" rid="ref-16">16</xref>]. BOA is a novel Metaheuristic optimization method projected by Arora and Singh in 2019 simulates the mating and nectar search behaviors of butterflies. In BOA, it is considered that butterfly generates some concentration of fragrance. The fragrance is related to objective function of the solution:</p>
<p><disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mi>c</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msup><mml:mi>I</mml:mi><mml:mi>a</mml:mi></mml:msup></mml:mrow></mml:math>
</disp-formula></p>
<p>whereas <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> characterizes the fragrance, <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:mi>I</mml:mi></mml:math>
</inline-formula> indicates the stimulus intensity, <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mi>c</mml:mi><mml:mo>,</mml:mo></mml:math>
</inline-formula> and <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:mi>n</mml:mi></mml:math>
</inline-formula> represent the constant. There are three steps in BOA, that is., initial, iteration, and last stages. In the initial stage, the initialized parameter and the initialized population are created. In the iteration stage, two stages (that is, global and local searching) are implemented. It can be arithmetically expressed in the following:</p>
<p><disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msup><mml:mi>g</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mtext>&#x00A0;&#x00A0;&#x00A0;</mml:mtext></mml:math>
</disp-formula></p>
<p>Now <inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> shows the position of <inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:math>
</inline-formula> butterfly, <inline-formula id="ieqn-7">
<mml:math id="mml-ieqn-7"><mml:mi>t</mml:mi></mml:math>
</inline-formula> represents the iteration value, <inline-formula id="ieqn-8">
<mml:math id="mml-ieqn-8"><mml:mi>r</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>O</mml:mi><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mn>1</mml:mn></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</inline-formula> characterizes an arbitrary value, <inline-formula id="ieqn-9">
<mml:math id="mml-ieqn-9"><mml:mrow><mml:msup><mml:mi>g</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:mrow></mml:math>
</inline-formula> represents the global optimal, and <inline-formula id="ieqn-10">
<mml:math id="mml-ieqn-10"><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> characterizes the fragrance.</p>
<p>The expression of local searching is shown below:</p>
<p><disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:math>
</disp-formula></p>
<p>Here <inline-formula id="ieqn-11">
<mml:math id="mml-ieqn-11"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-12">
<mml:math id="mml-ieqn-12"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi mathvariant="normal">k</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> denotes <inline-formula id="ieqn-13">
<mml:math id="mml-ieqn-13"><mml:mi>j</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:math>
</inline-formula> and <inline-formula id="ieqn-14">
<mml:math id="mml-ieqn-14"><mml:mi>k</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:math>
</inline-formula> butterflies from the population. The abovementioned <xref ref-type="disp-formula" rid="eqn-2">Eqs. (2)</xref> and <xref ref-type="disp-formula" rid="eqn-3">(3)</xref> are implemented in BOA as:</p>
<p><disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="0em"><mml:mtr><mml:mtd><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msup><mml:mi>g</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mo>&#x003C;</mml:mo><mml:mi>p</mml:mi></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msup><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>r</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>r</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>z</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mtext>&#x00A0;&#x00A0;</mml:mtext></mml:math>
</disp-formula></p>
<p>In which <inline-formula id="ieqn-15">
<mml:math id="mml-ieqn-15"><mml:mi>p</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>O</mml:mi><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mn>1</mml:mn></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</inline-formula> indicates a constant value. The value of <inline-formula id="ieqn-16">
<mml:math id="mml-ieqn-16"><mml:mi>c</mml:mi></mml:math>
</inline-formula> can be upgraded as follows:</p>
<p><disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:mi>c</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>c</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>0.025</mml:mn><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>c</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>r</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mi>M</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mi>I</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:math>
</disp-formula></p>
<p>Now MaxIter denotes the maximal amount of iterations. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> illustrates the flowchart of BOA.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Flowchart of BOA</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-2.tif"/>
</fig>
<p>Different from the standard BOA, in which the solution is upgraded in the searching region towards constant valued location, in the BBOFS, the searching region is modelled as <inline-formula id="ieqn-17">
<mml:math id="mml-ieqn-17"><mml:mi>n</mml:mi></mml:math>
</inline-formula> parameter Boolean lattice. As well, the solution is upgraded through the Bcorner of hypercube. Moreover, to resolve the issue either to choose or not, a binary solution and parameter vectors are employed where 1 corresponding to a variable has been selected to encompass the novel data sets and <inline-formula id="ieqn-18">

</inline-formula> corresponds to another. In binary algorithm, one employs the step vector to estimate the possibility of altering place, the transfer function significantly influences the balance among exploration and exploitation. In FS technique, the size of feature vector is <inline-formula id="ieqn-19">
<mml:math id="mml-ieqn-19"><mml:mi>N</mml:mi></mml:math>
</inline-formula>, the volume of feature grouping likely to be <inline-formula id="ieqn-20">
<mml:math id="mml-ieqn-20"><mml:mrow><mml:msup><mml:mn>2</mml:mn><mml:mi>N</mml:mi></mml:msup></mml:mrow></mml:math>
</inline-formula>, viz., an enormous space for comprehensive searching. The presented method is applied to search the feature space energetically along with producing an accurate combination of features. The FS falls within multiple objective problems because it requires different objectives to attain an optimum solution, that reduces the subset of FS and at the same time, maximizes the precision of output to classifier.</p>
<p>According to the aforementioned, the fitness function (FF) to define solution in the condition completed to obtain a balance amongst the two objectives in the following:</p>
<p><disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:msub><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:mi>R</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>D</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>Y</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>T</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p><inline-formula id="ieqn-21">
<mml:math id="mml-ieqn-21"><mml:mrow><mml:msub><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:mi>R</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>D</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> indicates the classification error rate. <inline-formula id="ieqn-22">
<mml:math id="mml-ieqn-22"><mml:mrow><mml:mo>|</mml:mo><mml:mi>Y</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:math>
</inline-formula> represents the size of subset and <inline-formula id="ieqn-23">
<mml:math id="mml-ieqn-23"><mml:mrow><mml:mo>|</mml:mo><mml:mi>T</mml:mi><mml:mo>|</mml:mo></mml:mrow></mml:math>
</inline-formula> total amount of features comprised in the existing data sets. <inline-formula id="ieqn-24">
<mml:math id="mml-ieqn-24"><mml:mi>&#x03B1;</mml:mi></mml:math>
</inline-formula> represents a variable <inline-formula id="ieqn-25">
<mml:math id="mml-ieqn-25"><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</inline-formula> related to the weight of error rate of classification, as well <inline-formula id="ieqn-26">
<mml:math id="mml-ieqn-26"><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B1;</mml:mi></mml:math>
</inline-formula> characterizes the significance of reducing feature. The classifier accuracy is allowable a significant weight rather than the amount of carefully chosen features. After the approximation function it considers the classifier performance, the effect will be the disregard of solution that contains parallel performance, but, have less chosen feature that serves as the major factor in minimizing the dimension problems.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Process Involved in DRL Based Classification</title>
<p>Next to FS process, the DRL model is employed for the proper identification and classification of intrusions that exist in the network [<xref ref-type="bibr" rid="ref-17">17</xref>]. The DRL is a significant model of machine learning that aims at finding an optimum approach to acquire the predictable return by training an agent. Markov Decision Process (MDP) is an elementary theoretic structure to resolve the problem of DRL. In the communication procedure, the agent observes the state <inline-formula id="ieqn-27">
<mml:math id="mml-ieqn-27"><mml:mi>s</mml:mi></mml:math>
</inline-formula> of the present environment and selects a specific policy <inline-formula id="ieqn-28">
<mml:math id="mml-ieqn-28"><mml:mi>&#x03C0;</mml:mi><mml:mo>,</mml:mo></mml:math>
</inline-formula> the situation responses to the activity, and the novel state s and reward <inline-formula id="ieqn-29">
<mml:math id="mml-ieqn-29"><mml:mi>r</mml:mi></mml:math>
</inline-formula> are fed into the agent. Consequently, assumes that starts from the early state <inline-formula id="ieqn-30">
<mml:math id="mml-ieqn-30"><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow></mml:math>
</inline-formula>, performing the Markov decision process (MDP) might lead to, <inline-formula id="ieqn-31">
<mml:math id="mml-ieqn-31"><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-32">
<mml:math id="mml-ieqn-32"><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-33">
<mml:math id="mml-ieqn-33"><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-34">
<mml:math id="mml-ieqn-34"><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-35">
<mml:math id="mml-ieqn-35"><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-36">
<mml:math id="mml-ieqn-36"><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:math>
</inline-formula> <inline-formula id="ieqn-37">
<mml:math id="mml-ieqn-37"><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>.</mml:mo></mml:math>
</inline-formula></p>
<p>The agent&#x0027;s work is to improve the policy for taking actions to exploit the predictable return. The return in step <inline-formula id="ieqn-38">
<mml:math id="mml-ieqn-38"><mml:mi>t</mml:mi></mml:math>
</inline-formula> is the amount of the discount rewards <inline-formula id="ieqn-39">
<mml:math id="mml-ieqn-39"><mml:mrow><mml:msub><mml:mi>G</mml:mi><mml:mi>f</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:msup><mml:mi>&#x03B3;</mml:mi><mml:mi>k</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mo>+</mml:mo><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula>, whereas <inline-formula id="ieqn-40">
<mml:math id="mml-ieqn-40"><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>O</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</inline-formula> indicates discount rate that defines the existing value of forthcoming rewards. In <inline-formula id="ieqn-41">
<mml:math id="mml-ieqn-41"><mml:mi>R</mml:mi><mml:mi>L</mml:mi></mml:math>
</inline-formula>, it can be vital technique to train agents for resolving MDP issues according to activity value function <inline-formula id="ieqn-42">
<mml:math id="mml-ieqn-42"><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>s</mml:mi><mml:mo>;</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:math>
</inline-formula>). <inline-formula id="ieqn-43">
<mml:math id="mml-ieqn-43"><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>s</mml:mi><mml:mo>;</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow></mml:math>
</inline-formula>a) Characterizes the predictable return on the action <inline-formula id="ieqn-44">
<mml:math id="mml-ieqn-44"><mml:mi>a</mml:mi></mml:math>
</inline-formula> considered based on h policy <inline-formula id="ieqn-45">
<mml:math id="mml-ieqn-45"><mml:mi>&#x03C0;</mml:mi></mml:math>
</inline-formula> at state <inline-formula id="ieqn-46">
<mml:math id="mml-ieqn-46"><mml:mi>s</mml:mi></mml:math>
</inline-formula>.</p>
<p><disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03C0;</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:msub><mml:mi>G</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mo>,</mml:mo></mml:math>
</disp-formula></p>
<p><inline-formula id="ieqn-47">
<mml:math id="mml-ieqn-47"><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> computes the action value in some state. Generally, <inline-formula id="ieqn-48">
<mml:math id="mml-ieqn-48"><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> express how better it is for agent to be in some state. Consequently, the optimum approach is depending on the optimum value. Especially, once the optimum action value function <inline-formula id="ieqn-49">
<mml:math id="mml-ieqn-49"><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munder><mml:mrow><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">x</mml:mi></mml:mrow></mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:munder><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mrow><mml:msub><mml:mi>Q</mml:mi><mml:mi>&#x03C0;</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> is attained, the optimum policy <inline-formula id="ieqn-50">
<mml:math id="mml-ieqn-50"><mml:mrow><mml:msup><mml:mi>&#x03C0;</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mi>s</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>g</mml:mi><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>&#x03F5;</mml:mi><mml:mi>A</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> select the action that corresponds to the maximal <inline-formula id="ieqn-51">
<mml:math id="mml-ieqn-51"><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> in all the states. Usually, <inline-formula id="ieqn-52">
<mml:math id="mml-ieqn-52"><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula> is resolved as Bellman optimality that illustrates the relationships among the present appropriate action value function and the succeeding optimum action value function.</p>
<p><disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mtext>*</mml:mtext></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mtext>&#x2009;</mml:mtext><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:msup><mml:mi>s</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msub><mml:mo stretchy='false'>[</mml:mo><mml:mo stretchy='false'>[</mml:mo><mml:mi>r</mml:mi><mml:mo>+</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:msub><mml:mrow><mml:mi>max</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mi>a</mml:mi><mml:mo>&#x0027;</mml:mo></mml:msup></mml:mrow></mml:msub><mml:mtext>&#x2009;</mml:mtext><mml:msup><mml:mi>Q</mml:mi><mml:mtext>*</mml:mtext></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msup><mml:mi>s</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo>,</mml:mo><mml:mtext>&#x2009;</mml:mtext><mml:msup><mml:mi>a</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x007C;</mml:mo><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mi>a</mml:mi><mml:mo stretchy='false'>]</mml:mo><mml:mo>,</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>whereas <inline-formula id="ieqn-53">
<mml:math id="mml-ieqn-53"><mml:msup><mml:mrow><mml:mi>s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:math>
</inline-formula> denotes the following state attained afterward action taken <inline-formula id="ieqn-54">
<mml:math id="mml-ieqn-54"><mml:mi>a</mml:mi></mml:math>
</inline-formula>, and <inline-formula id="ieqn-55">
<mml:math id="mml-ieqn-55"><mml:msup><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:math>
</inline-formula> indicates the action considered in the following state. It iterated on <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>, it ultimately converge to the optimum action value function <inline-formula id="ieqn-56">
<mml:math id="mml-ieqn-56"><mml:mrow><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</inline-formula>.</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Hyperparameter Optimization</title>
<p>In the final stage, the BAS technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency.</p>
<p>For optimizing the effectiveness of the DRL approach, the hyper parameter tuning procedure is implemented by the use of BAS technique. This technique is an optimization method that mimics beetle forage behaviour. As soon as beetle forages, it employs left and right antennas to intellect the odour concentration of food. Once the odour concentration attained over the left antennas are greater, it flies to the left via the strong odour concentration; then, it flies to the right. It can be shown in the following:</p>
<p><disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:mover><mml:mi>b</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mtext>&#x00A0;</mml:mtext></mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>D</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo></mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>D</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:mtext>&#x00A0;&#x00A0;&#x00A0;</mml:mtext></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p>In which <inline-formula id="ieqn-57">
<mml:math id="mml-ieqn-57"><mml:mrow><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">m</mml:mi></mml:mrow></mml:math>
</inline-formula> characterizes the spatial dimension. The space coordinate of the beetle&#x0027;s right and left borders and its antennae are generated as follows</p>
<p><disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mover><mml:mi>b</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mover><mml:mi>b</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mrow><mml:mtext>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;</mml:mtext></mml:mrow></mml:math>
</disp-formula></p>
<p>Among others, <inline-formula id="ieqn-58">
<mml:math id="mml-ieqn-58"><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow></mml:math>
</inline-formula> characterize the place of beetle antennae at t-th iteration, <inline-formula id="ieqn-59">
<mml:math id="mml-ieqn-59"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> characterize the place of beetle right antennae at t-th iteration, <inline-formula id="ieqn-60">
<mml:math id="mml-ieqn-60"><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> epitomize the place of beetle left antennae at t-th iteration, and <inline-formula id="ieqn-61">
<mml:math id="mml-ieqn-61"><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mrow></mml:math>
</inline-formula> characterize the beetle 2 places. According to the FF, the fitness value of the left and right antennae are evaluated, as well as the beetle move to the antennae through a small fitness value [<xref ref-type="bibr" rid="ref-18">18</xref>]. The position of beetle is below</p>
<p><disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msup><mml:mi>x</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msup><mml:mi>&#x03B4;</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mover><mml:mi>b</mml:mi><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow><mml:mspace width="thinmathspace" /><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>g</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mtext>&#x00A0;&#x00A0;</mml:mtext></mml:mrow></mml:math>
</disp-formula></p>
<p>Among others, <inline-formula id="ieqn-62">
<mml:math id="mml-ieqn-62"><mml:mrow><mml:msup><mml:mi>&#x03B4;</mml:mi><mml:mi>t</mml:mi></mml:msup></mml:mrow></mml:math>
</inline-formula> represents the step factor, sign signposts a sign function, and eta characterizes the step factor, i.e., 0.95. The BAS algorithm intends to derivation of the fitness function (FF) for improved classification results. It indicates a positive integer to represent superior outcomes of the candidate solutions. Here, the classification error rate is represented as the FF as given below.</p>
<p><disp-formula id="eqn-12"><label>(12)</label>
<mml:math id="mml-eqn-12" display="block"><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>C</mml:mi><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>E</mml:mi><mml:mi>r</mml:mi><mml:mi>r</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>m</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>o</mml:mi><mml:mi>f</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>e</mml:mi><mml:mi>d</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>s</mml:mi><mml:mi>a</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>m</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>o</mml:mi><mml:mi>f</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>s</mml:mi><mml:mi>a</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mo>&#x2217;</mml:mo><mml:mn>100</mml:mn><mml:mtext>&#x00A0;</mml:mtext></mml:mstyle></mml:math>
</disp-formula></p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Experimental Validation</title>
<p>The proposed model is simulated using MATLAB tool. This section inspects the experimental validation of the BBOFS-DRL model using NSL-KDD dataset and UNSW-NB-15 dataset. The results are elaborated in the following sections.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Result Analysis of NSL-KDD Dataset</title>
<p>The NSL-KDD dataset includes 41 features with five class labels such as Normal, DoS, Probe, remote-to-local (R2L), and user-to-root (U2R). The proposed BBOFS technique has chosen a set of 24 features.</p>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> investigates the confusion matrices of the BBOFS-DRL model with 70% of training set (TRS) and 20% of testing set (TSS) on NSL-KDD dataset. With 70% of TRS, the NSL-KDD dataset has determined 53616 samples into Normal class, 13183 samples into denial of service (DoS), 33363 samples into Probe, 140 samples into User to Root (U2R), and 2550 samples under Remote to Local User (R2L) class. In addition, with 30% of TSS, the NSL-KDD dataset has determined 22881 samples into Normal class, 5606 samples into DoS, 14465 samples into Probe, 60 samples into U2R, and 1083 samples under R2L class.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Confusion matrix of BBOFS-DRL technique on NSL-KDD dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-3.tif"/>
</fig>
<p><xref ref-type="table" rid="table-1">Table 1</xref> reports detailed IDS outcomes of the BBOFS-DRL model on the test NSL-KDD dataset. The experimental outcomes implied that the BBOFS-DRL model has accomplished enhanced performance on 70% of TRS and 30% of TSS under NSL-KDD dataset. With 70% of TRS, the BBOFS-DRL model has offered average <inline-formula id="ieqn-63">
<mml:math id="mml-ieqn-63"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-64">
<mml:math id="mml-ieqn-64"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-65">
<mml:math id="mml-ieqn-65"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-66">
<mml:math id="mml-ieqn-66"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula>, and MCC of 99.57%, 94.78%, 94.24%, 94.47%, and 94.17% respectively. Moreover, with 30% of TSS, the BBOFS-DRL method has offered average <inline-formula id="ieqn-67">
<mml:math id="mml-ieqn-67"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-68">
<mml:math id="mml-ieqn-68"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-69">
<mml:math id="mml-ieqn-69"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-70">
<mml:math id="mml-ieqn-70"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula>, and MCC of 99.59%, 94.19%, 95.35%, 94.76%, and 94.46% respectively.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Result analysis of BBOFS-DRL technique with distinct measures on NSL-KDD dataset</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Class labels</th>
<th>Accuracy</th>
<th>Precision</th>
<th>Recall</th>
<th>F-Score</th>
<th>MCC</th>
</tr>
</thead>
<tbody>
<tr>
<td colspan="6">Training Set (70%)</td>
</tr>
<tr>
<td>&#x2003;Normal</td>
<td>99.40</td>
<td>99.57</td>
<td>99.28</td>
<td>99.42</td>
<td>98.80</td>
</tr>
<tr>
<td>&#x2003;Dos</td>
<td>99.45</td>
<td>97.48</td>
<td>98.30</td>
<td>97.89</td>
<td>97.57</td>
</tr>
<tr>
<td>&#x2003;Probe</td>
<td>99.34</td>
<td>99.06</td>
<td>98.90</td>
<td>98.98</td>
<td>98.50</td>
</tr>
<tr>
<td>&#x2003;U2R</td>
<td>99.94</td>
<td>84.85</td>
<td>77.78</td>
<td>81.16</td>
<td>81.21</td>
</tr>
<tr>
<td>&#x2003;R2L</td>
<td>99.74</td>
<td>92.93</td>
<td>96.92</td>
<td>94.88</td>
<td>94.77</td>
</tr>
<tr>
<td>&#x2003;Average</td>
<td>99.57</td>
<td>94.78</td>
<td>94.24</td>
<td>94.47</td>
<td>94.17</td>
</tr>
<tr>
<td colspan="6">Testing Set (30%)</td>
</tr>
<tr>
<td>&#x2003;Normal</td>
<td>99.41</td>
<td>99.57</td>
<td>99.28</td>
<td>99.42</td>
<td>98.81</td>
</tr>
<tr>
<td>&#x2003;Dos</td>
<td>99.45</td>
<td>97.44</td>
<td>98.3</td>
<td>97.87</td>
<td>97.56</td>
</tr>
<tr>
<td>&#x2003;Probe</td>
<td>99.37</td>
<td>99.11</td>
<td>98.97</td>
<td>99.04</td>
<td>98.57</td>
</tr>
<tr>
<td>&#x2003;U2R</td>
<td>99.94</td>
<td>81.08</td>
<td>83.33</td>
<td>82.19</td>
<td>82.17</td>
</tr>
<tr>
<td>&#x2003;R2L</td>
<td>99.76</td>
<td>93.77</td>
<td>96.87</td>
<td>95.29</td>
<td>95.18</td>
</tr>
<tr>
<td>&#x2003;Average</td>
<td>99.59</td>
<td>94.19</td>
<td>95.35</td>
<td>94.76</td>
<td>94.46</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-4">Fig. 4</xref> illustrates the precision-recall investigation of the BBOFS-DRL model on NSL-KDD dataset. The figure indicated that the BBOFS-DRL model has accomplished maximum precision-recall values on the distinct class labels.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Precision-recall analysis of BBOFS-DRL method on NSL-KDD dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-4.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> demonstrates the training accuracy (TA) and validation accuracy (VA) offered by the BBOFS-DRL model NSL-KDD dataset. The figure indicated that the BBOFS-DRL model has provided closer TA and VA values with an increase in epoch count. It is observable that the VA is certainly higher than TA.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>TA and VA analysis of BBOFS-DRL method on NSL-KDD dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-5.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> validates the training loss (TL) and validation loss (VL) provided by the BBOFS-DRL model NSL-KDD dataset. The figure designated that the BBOFS-DRL model has delivered lower TL and VL with an increase in epoch count. It is noticeable that the VL is definitely lower compared to TL.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>TL and VL analysis of BBOFS-DRL method on NSL-KDD dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-6.tif"/>
</fig>
<p><xref ref-type="table" rid="table-2">Table 2</xref> and <xref ref-type="fig" rid="fig-7">Fig. 7</xref> report a comparative study of the BBOFS-DRL model with recent models interms of different measures on NSL-KDD dataset. The outcomes demonstrated that the decision tree (DT), random forest (RF), and support vector machine (SVM) models have accomplished poor performance with minimal classification results. Followed by, the CNN-Bagging and CNN-Adaboost models have gained slightly enhanced classifier results. In line with, the GCNSE model has reached reasonable performance with <inline-formula id="ieqn-71">
<mml:math id="mml-ieqn-71"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-72">
<mml:math id="mml-ieqn-72"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-73">
<mml:math id="mml-ieqn-73"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, and <inline-formula id="ieqn-74">
<mml:math id="mml-ieqn-74"><mml:mi>F</mml:mi><mml:mrow><mml:msub><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> of 84.99%, 87.37%, 85.33%, and 85.99% respectively. However, the BBOFS-DRL model has shown improved outcomes with <inline-formula id="ieqn-75">
<mml:math id="mml-ieqn-75"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-76">
<mml:math id="mml-ieqn-76"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-77">
<mml:math id="mml-ieqn-77"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, and <inline-formula id="ieqn-78">
<mml:math id="mml-ieqn-78"><mml:mi>F</mml:mi><mml:mrow><mml:msub><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> of 99.59%, 94.19%, 95.35%, and 94.76% respectively.</p>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Comparative analysis of BBOFS-DRL method with existing approaches on NSL-KDD dataset</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Accuracy</th>
<th>Precision</th>
<th>Recall</th>
<th>F1-Score</th>
</tr>
</thead>
<tbody>
<tr>
<td>Decision Tree</td>
<td>74.22</td>
<td>82.55</td>
<td>75.68</td>
<td>78.57</td>
</tr>
<tr>
<td>Random Forest</td>
<td>75.50</td>
<td>81.30</td>
<td>75.82</td>
<td>77.84</td>
</tr>
<tr>
<td>SVM Model</td>
<td>76.53</td>
<td>81.97</td>
<td>80.44</td>
<td>81.55</td>
</tr>
<tr>
<td>CNN-Bagging</td>
<td>79.96</td>
<td>80.81</td>
<td>81.28</td>
<td>80.80</td>
</tr>
<tr>
<td>CNN-Adaboost</td>
<td>81.66</td>
<td>81.22</td>
<td>81.37</td>
<td>80.43</td>
</tr>
<tr>
<td>GCNSE</td>
<td>84.99</td>
<td>87.37</td>
<td>85.33</td>
<td>85.99</td>
</tr>
<tr>
<td>BBOFS-DRL</td>
<td>99.59</td>
<td>94.19</td>
<td>95.35</td>
<td>94.76</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Comparative analysis of BBOFS-DRL method on NSL-KDD dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-7.tif"/>
</fig>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Result Analysis of UNSW-NB-15 Dataset</title>
<p>The test UNSW-NB-15 dataset comprises 42 features and ten classes, namely Generic, Normal, Analysis, Shellcode, Exploits, Reconnaissance, Fuzzers, Worms, DoS, and Backdoors. Among the available 42 features, the BBOFS technique has chosen 27 features.</p>
<p><xref ref-type="fig" rid="fig-8">Fig. 8</xref> examines the confusion matrices of the BBOFS-DRL model with 70% of TRS and 20% of TSS on UNSW-NB-15 dataset. With 70% of TRS, the UNSW-NB-15 dataset has determined 64579 samples into Normal class, 1562 samples into Backdoor, 1800 samples into Analysis, 16960 samples into Fuzzers, 1022 samples into Shellcode, 9663 samples into Reconnaissance, 31085 samples into Exploits, 11258 samples into DoS, 114 samples into Worms, and 40953 samples under Generic class. Also, with 30% of TSS, the UNSW-NB-15 dataset has determined 27872 samples into Normal class, 667 samples into Backdoor, 856 samples into Analysis, 7139 samples into Fuzzers, 414 samples into Shellcode, 4189 samples into Reconnaissance, 13122 samples into Exploits, 4958 samples into DoS, 40 samples into Worms, and 17487 samples under Generic class.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Confusion matrix of BBOFS-DRL technique on UNSW-NB-15 dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-8.tif"/>
</fig>
<p><xref ref-type="table" rid="table-3">Table 3</xref> defines a detailed IDS outcome of the BBOFS-DRL approach on the test UNSW-NB-15 dataset. The experimental outcomes implied that the BBOFS-DRL model has accomplished enhanced performance on 70% of TRS and 30% of TSS under UNSW-NB-15 dataset. With 70% of TRS, the BBOFS-DRL model has offered average <inline-formula id="ieqn-79">
<mml:math id="mml-ieqn-79"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-80">
<mml:math id="mml-ieqn-80"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-81">
<mml:math id="mml-ieqn-81"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-82">
<mml:math id="mml-ieqn-82"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula>, and MCC of 99.85%, 97.73%, 97.52%, 97.59%, and 97.51% respectively. Furthermore, with 30% of TSS, the BBOFS-DRL technique has obtainable average <inline-formula id="ieqn-83">
<mml:math id="mml-ieqn-83"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-84">
<mml:math id="mml-ieqn-84"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-85">
<mml:math id="mml-ieqn-85"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-86">
<mml:math id="mml-ieqn-86"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula>, and MCC of 99.86%, 97.99%, 97.10%, 97.49%, and 97.43% correspondingly.</p>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Result analysis of BBOFS-DRL technique with distinct measures on UNSW-NB-15 dataset</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Class labels</th>
<th>Accuracy</th>
<th>Precision</th>
<th>Recall</th>
<th>F1-Score</th>
<th>MCC</th>
</tr>
</thead>
<tbody>
<tr>
<td colspan="6">Training Set (70%)</td>
</tr>
<tr>
<td>&#x2003;Normal</td>
<td>99.65</td>
<td>99.63</td>
<td>99.40</td>
<td>99.51</td>
<td>99.24</td>
</tr>
<tr>
<td>&#x2003;Backdoor</td>
<td>99.93</td>
<td>96.78</td>
<td>95.95</td>
<td>96.36</td>
<td>96.33</td>
</tr>
<tr>
<td>&#x2003;Analysis</td>
<td>99.89</td>
<td>91.05</td>
<td>99.23</td>
<td>94.96</td>
<td>95.00</td>
</tr>
<tr>
<td>&#x2003;Fuzzers</td>
<td>99.82</td>
<td>98.73</td>
<td>99.41</td>
<td>99.07</td>
<td>98.97</td>
</tr>
<tr>
<td>&#x2003;Shellcode</td>
<td>99.96</td>
<td>97.52</td>
<td>95.51</td>
<td>96.51</td>
<td>96.49</td>
</tr>
<tr>
<td>&#x2003;Reconnaissance</td>
<td>99.87</td>
<td>98.65</td>
<td>99.03</td>
<td>98.84</td>
<td>98.77</td>
</tr>
<tr>
<td>&#x2003;Exploits</td>
<td>99.75</td>
<td>99.31</td>
<td>99.25</td>
<td>99.28</td>
<td>99.13</td>
</tr>
<tr>
<td>&#x2003;DoS</td>
<td>99.85</td>
<td>98.62</td>
<td>99.08</td>
<td>98.85</td>
<td>98.77</td>
</tr>
<tr>
<td>&#x2003;Worms</td>
<td>99.99</td>
<td>97.44</td>
<td>89.06</td>
<td>93.06</td>
<td>93.15</td>
</tr>
<tr>
<td>&#x2003;Generic</td>
<td>99.74</td>
<td>99.62</td>
<td>99.25</td>
<td>99.44</td>
<td>99.27</td>
</tr>
<tr>
<td>&#x2003;Average</td>
<td>99.85</td>
<td>97.73</td>
<td>97.52</td>
<td>97.59</td>
<td>97.51</td>
</tr>
<tr>
<td colspan="6">Testing Set (30%)</td>
</tr>
<tr>
<td>&#x2003;Normal</td>
<td>99.65</td>
<td>99.60</td>
<td>99.43</td>
<td>99.51</td>
<td>99.24</td>
</tr>
<tr>
<td>&#x2003;Backdoor</td>
<td>99.94</td>
<td>97.80</td>
<td>95.15</td>
<td>96.46</td>
<td>96.43</td>
</tr>
<tr>
<td>&#x2003;Analysis</td>
<td>99.89</td>
<td>91.75</td>
<td>99.19</td>
<td>95.32</td>
<td>95.34</td>
</tr>
<tr>
<td>&#x2003;Fuzzers</td>
<td>99.83</td>
<td>98.84</td>
<td>99.35</td>
<td>99.09</td>
<td>99.00</td>
</tr>
<tr>
<td>&#x2003;Shellcode</td>
<td>99.95</td>
<td>98.10</td>
<td>93.88</td>
<td>95.94</td>
<td>95.95</td>
</tr>
<tr>
<td>&#x2003;Reconnaissance</td>
<td>99.86</td>
<td>98.43</td>
<td>99.03</td>
<td>98.73</td>
<td>98.65</td>
</tr>
<tr>
<td>&#x2003;Exploits</td>
<td>99.79</td>
<td>99.42</td>
<td>99.37</td>
<td>99.40</td>
<td>99.27</td>
</tr>
<tr>
<td>&#x2003;DoS</td>
<td>99.88</td>
<td>98.75</td>
<td>99.36</td>
<td>99.05</td>
<td>98.99</td>
</tr>
<tr>
<td>&#x2003;Worms</td>
<td>99.99</td>
<td>97.56</td>
<td>86.96</td>
<td>91.95</td>
<td>92.10</td>
</tr>
<tr>
<td>&#x2003;Generic</td>
<td>99.77</td>
<td>99.67</td>
<td>99.31</td>
<td>99.49</td>
<td>99.34</td>
</tr>
<tr>
<td>&#x2003;Average</td>
<td>99.86</td>
<td>97.99</td>
<td>97.10</td>
<td>97.49</td>
<td>97.43</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> depicts the precision-recall investigation of the BBOFS-DRL model on UNSW-NB-15 dataset. The figure indicated that the BBOFS-DRL model has accomplished maximum precision-recall values on the distinct class labels.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Precision-recall analysis of BBOFS-DRL method on UNSW-NB-15 dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-9.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-10">Fig. 10</xref> validates the TA and VA offered by the BBOFS-DRL approach on UNSW-NB-15 dataset. The figure indicated that the BBOFS-DRL model has provided closer TA and VA values with an increase in epoch count. It is observable that the VA is certainly higher than TA.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>TA and VA analysis of BBOFS-DRL method on UNSW-NB-15 dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-10.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-11">Fig. 11</xref> demonstrates the TL and VL provided by the BBOFS-DRL methodology on UNSW-NB-15 dataset. The figure designated that the BBOFS-DRL model has delivered lower TL and VL with an increase in epoch count. It can be noticeable that the VL is definitely lower compared to TL.</p>
<fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>TL and VL analysis of BBOFS-DRL method on UNSW-NB-15 dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-11.tif"/>
</fig>
<p><xref ref-type="table" rid="table-4">Table 4</xref> and <xref ref-type="fig" rid="fig-12">Fig. 12</xref> report a comparative study of the BBOFS-DRL model with recent models in terms of different measures on UNSW-NB-15 dataset. The outcomes demonstrated that the DT, RF, and SVM models have accomplished poor performance with minimal classification results. Afterward, the CNN-Bagging and CNN-Adaboost methods have gained slightly enhanced classifier results. Also, the GCNSE model has reached reasonable performance with <inline-formula id="ieqn-87">
<mml:math id="mml-ieqn-87"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-88">
<mml:math id="mml-ieqn-88"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-89">
<mml:math id="mml-ieqn-89"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, and <inline-formula id="ieqn-90">
<mml:math id="mml-ieqn-90"><mml:mi>F</mml:mi><mml:mrow><mml:msub><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> of 78.79%, 80.29%, 81.47%, and 82.36% respectively. However, the BBOFS-DRL model has shown improved outcomes with <inline-formula id="ieqn-91">
<mml:math id="mml-ieqn-91"><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>u</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-92">
<mml:math id="mml-ieqn-92"><mml:mi>p</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:msub><mml:mi>c</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, <inline-formula id="ieqn-93">
<mml:math id="mml-ieqn-93"><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:mrow></mml:math>
</inline-formula>, and <inline-formula id="ieqn-94">
<mml:math id="mml-ieqn-94"><mml:mi>F</mml:mi><mml:mrow><mml:msub><mml:mn>1</mml:mn><mml:mrow><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> of 99.86%, 97.99%, 97.10%, and 97.49% respectively. The above mentioned tables and figures clearly show that the BBOFS-DRL model has the ability to accomplish maximum security on two test datasets applied.</p>
<table-wrap id="table-4"><label>Table 4</label>
<caption>
<title>Comparative analysis of BBOFS-DRL method with existing approaches on UNSW-NB-15 dataset</title></caption>
<table><colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Methods</th>
<th>Accuracy</th>
<th>Precision</th>
<th>Recall</th>
<th>F1-Score</th>
</tr>
</thead>
<tbody>
<tr>
<td>Decision Tree</td>
<td>71.47</td>
<td>80.26</td>
<td>72.48</td>
<td>75.88</td>
</tr>
<tr>
<td>Random Forest</td>
<td>75.04</td>
<td>82.14</td>
<td>74.27</td>
<td>77.96</td>
</tr>
<tr>
<td>SVM Model</td>
<td>77.07</td>
<td>78.80</td>
<td>77.21</td>
<td>77.78</td>
</tr>
<tr>
<td>CNN-Bagging</td>
<td>75.91</td>
<td>82.28</td>
<td>75.07</td>
<td>78.75</td>
</tr>
<tr>
<td>CNN-Adaboost</td>
<td>75.50</td>
<td>70.04</td>
<td>71.66</td>
<td>68.22</td>
</tr>
<tr>
<td>GCNSE</td>
<td>78.79</td>
<td>80.29</td>
<td>81.47</td>
<td>82.36</td>
</tr>
<tr>
<td>BBOFS-DRL</td>
<td>99.86</td>
<td>97.99</td>
<td>97.10</td>
<td>97.49</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>Comparative analysis of BBOFS-DRL method on UNSW-NB-15 dataset</title></caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CSSE_30630-fig-12.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Conclusion</title>
<p>In this article, a new BBOFS-DRL model has been developed for accurate recognition of intrusions in the network. The BBOFS-DRL model initially designed the BBOFS algorithm based on the BOA to elect feature subsets. Besides, DRL model is employed for the proper identification and classification of intrusions that exist in the network. Furthermore, BAS technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency. For ensuring the superior intrusion detection outcomes of the BBOFS-DRL model, a wide-ranging experimental analysis is performed against benchmark dataset. The simulation results reported the supremacy of the BBOFS-DRL model over its recent state of art approaches. Thus, the BBOFS-DRL technique can be utilized for ensuring security. In future, outlier detection models can be integrated into the BBOFS-DRL model to improve its overall efficiency.</p>
</sec>
</body>
<back>
<sec>
<title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Lang</surname></string-name></person-group>, &#x201C;<article-title>Machine learning and deep learning methods for intrusion detection systems: A survey</article-title>,&#x201D; <source>Applied Sciences</source>, vol. <volume>9</volume>, no. <issue>20</issue>, pp. <fpage>4396</fpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>A. S.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>C. W.</given-names> <surname>Shiang</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Abdullah</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Ahmad</surname></string-name></person-group>, &#x201C;<article-title>Network intrusion detection system: A systematic study of machine learning and deep learning approaches</article-title>,&#x201D; <source>Transactions on Emerging Telecommunications Technologies</source>, vol. <volume>32</volume>, no. <issue>1</issue>, pp. <fpage>e4150</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>G. Z.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>P. S.</given-names> <surname>Chang</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>A multi-feature learning model with enhanced local attention for vehicle re-identification</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>69</volume>, no. <issue>3</issue>, pp. <fpage>3549</fpage>&#x2013;<lpage>3560</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>G. C.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>N. N.</given-names> <surname>Ge</surname></string-name></person-group>, &#x201C;<article-title>Fine-grained vehicle type classification using lightweight convolutional neural network with feature optimization and joint learning strategy</article-title>,&#x201D; <source>Multimedia Tools and Applications</source>, vol. <volume>80</volume>, no. <issue>20</issue>, pp. <fpage>30803</fpage>&#x2013;<lpage>30816</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Rahman</surname></string-name>, <string-name><given-names>A. T.</given-names> <surname>Asyhari</surname></string-name>, <string-name><given-names>L. S.</given-names> <surname>Leong</surname></string-name>, <string-name><given-names>G. B.</given-names> <surname>Satrya</surname></string-name>, <string-name><given-names>M. H.</given-names> <surname>Tao</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Scalable machine learning-based intrusion detection system for IoT-enabled smart cities</article-title>,&#x201D; <source>Sustainable Cities and Society</source>, vol. <volume>61</volume>, no. <issue>1</issue>, pp. <fpage>102324</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Rawat</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Srinivasan</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Ravi</surname></string-name> and <string-name><given-names>U.</given-names> <surname>Ghosh</surname></string-name></person-group>, &#x201C;<article-title>Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network</article-title>,&#x201D; <source>Internet Technology Letters</source>, vol. <volume>5</volume>, no. <issue>1</issue>, pp. <fpage>e232</fpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Kocher</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>Machine learning and deep learning methods for intrusion detection systems: Recent developments and challenges</article-title>,&#x201D; <source>Soft Computing</source>, vol. <volume>25</volume>, no. <issue>15</issue>, pp. <fpage>9731</fpage>&#x2013;<lpage>9763</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G. D. C.</given-names> <surname>Bertoli</surname></string-name>, <string-name><given-names>L. A. P.</given-names> <surname>J&#x00FA;nior</surname></string-name>, <string-name><given-names>O.</given-names> <surname>Saotome</surname></string-name>, <string-name><given-names>A. L. D.</given-names> <surname>Santos</surname></string-name>, <string-name><given-names>F. A. N.</given-names> <surname>Verri</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>An end-to-end framework for machine learning-based network intrusion detection system</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>9</volume>, pp. <fpage>106790</fpage>&#x2013;<lpage>106805</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Alhajjar</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Maxwell</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Bastian</surname></string-name></person-group>, &#x201C;<article-title>Adversarial machine learning in Network Intrusion Detection Systems</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>186</volume>, no. <issue>2</issue>, pp. <fpage>115782</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sethi</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Prajapati</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Bera</surname></string-name></person-group>, &#x201C;<article-title>Deep reinforcement learning based intrusion detection system for cloud infrastructure</article-title>,&#x201D; in <conf-name>2020 Int. Conf. on COMmunication Systems &#x0026; NETworkS (COMSNETS)</conf-name>, <publisher-loc>Bengaluru, India</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2020</year>. </mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Zhou</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Network intrusion detection algorithm combined with group convolution network and snapshot ensemble</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>13</volume>, no. <issue>10</issue>, pp. <fpage>1814</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. S. A.</given-names> <surname>Daweri</surname></string-name>, <string-name><given-names>K. A. Z.</given-names> <surname>Ariffin</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Abdullah</surname></string-name> and <string-name><given-names>M. F. E. M.</given-names> <surname>Senan</surname></string-name></person-group>, &#x201C;<article-title>An analysis of the kdd99 and unsw-nb15 datasets for the intrusion detection system</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>12</volume>, no. <issue>10</issue>, pp. <fpage>1666</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Kotecha</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Verma</surname></string-name>, <string-name><given-names>P. V.</given-names> <surname>Rao</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Prasad</surname></string-name>, <string-name><given-names>V. K.</given-names> <surname>Mishra</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Enhanced network intrusion detection system</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>21</volume>, no. <issue>23</issue>, pp. <fpage>7835</fpage>, <year>2021</year>; <pub-id pub-id-type="pmid">34883839</pub-id></mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Ahmad</surname></string-name>, <string-name><given-names>Q. E. Ul</given-names> <surname>Haq</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Imran</surname></string-name>, <string-name><given-names>M. O.</given-names> <surname>Alassafi</surname></string-name> and <string-name><given-names>R. A.</given-names> <surname>AlGhamdi</surname></string-name></person-group>, &#x201C;<article-title>An efficient network intrusion detection and classification system</article-title>,&#x201D; <source>Mathematics</source>, vol. <volume>10</volume>, no. <issue>3</issue>, pp. <fpage>530</fpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Jaw</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Feature selection and ensemble-based intrusion detection system: An efficient and comprehensive approach</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>13</volume>, no. <issue>10</issue>, pp. <fpage>1764</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Arora</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Singh</surname></string-name></person-group>, &#x201C;<article-title>Butterfly optimization algorithm: A novel approach for global optimization</article-title>,&#x201D; <source>Soft Computing</source>, vol. <volume>23</volume>, no. <issue>3</issue>, pp. <fpage>715</fpage>&#x2013;<lpage>734</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Dong</surname></string-name>, <string-name><given-names>Z. M.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>X. W.</given-names> <surname>Liao</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Yu</surname></string-name></person-group>, &#x201C;<article-title>A deep reinforcement learning (DRL) based approach for well-testing interpretation to evaluate reservoir parameters</article-title>,&#x201D; <source>Petroleum Science</source>, vol. <volume>19</volume>, no. <issue>1</issue>, pp. <fpage>264</fpage>&#x2013;<lpage>278</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Man</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Tong</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Qiu</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>A new beetle antennae search algorithm for multi-objective energy management in microgrid</article-title>,&#x201D; in <conf-name>2018 13th IEEE Conf. on Industrial Electronics and Applications (ICIEA)</conf-name>, <publisher-loc>Wuhan</publisher-loc>, pp. <fpage>1599</fpage>&#x2013;<lpage>1603</lpage>, <year>2018</year>. </mixed-citation></ref>
</ref-list>
</back>
</article>















