MG Experimental Evaluation of Adaptive Multi-Agent AI Models for Detecting Stealthy Cyber Attacks in Dynamic Network Environments based on MADDPG MG

Main Article Content

asma ibrahem

Abstract

    Cybersecurity faces increasing challenges due to sophisticated and covert attacks targeting dynamic networks. This research aims to explore the effectiveness of adaptive multi-agent AI models in detecting these attacks using an algorithm MADDPG (Multi-Agent Deep Deterministic Policy Gradient) a dynamic network environment was designed to simulate natural data traffic and covert cyberattacks, where each agent monitors a specific part of the network and makes immediate decisions to detect or mitigate attacks .


 

Downloads

Download data is not yet available.

Article Details

How to Cite
ibrahem, asma. (2026). MG Experimental Evaluation of Adaptive Multi-Agent AI Models for Detecting Stealthy Cyber Attacks in Dynamic Network Environments based on MADDPG: MG. AlKadhim Journal for Computer Science, 4(1), 78–87. https://doi.org/10.61710/kjcs.v4i1.157
Section
Computer Science

References

M. Uddin, M. S. Irshad, I. A. Kandhro et al., “Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations,” Artif. Intell. Rev., vol. 58, p. 236, 2025. doi: 10.1007/s10462-025-11219-5.

A. I. Hussein, M. I. Hussein, and O. S. Hlail, “AI-generated privacy-preserving protocols for cross-cloud data sharing and collaboration,” J. Discrete Math. Sci. Cryptography, vol. 28, no. 4-B, pp. 1265–1279, 2025. doi: 10.47974/JDMSC-2265.

C. Nott, “Organizational Adaptation to Generative AI in Cyber-security: A Systematic Review,” 2025. [Online]. Available: https://arxiv.org/abs/2506.12060

H. Huang, H. Liu, Y. Li, and L. Ma, “ERA-MADDPG: An Elastic Routing Algorithm Based on Multi-Agent Deep Deterministic Policy Gradient in SDN,” Future Internet, vol. 17, no. 7, 2025.

S. Kuang, J. Zheng, S. Liang, Y. Li, S. Liang, and W. Huang, “RS-MADDPG: Routing Strategy Based on Multi-Agent Deep Deterministic Policy Gradient for Differentiated QoS Services,” Future Internet, vol. 17, no. 9, 2025.

H. Mao, Z. Zhang, Z. Xiao, and Z. Gong, “Modelling the Dynamic Joint Policy of Teammates with Attention Multi-agent DDPG,” arXiv preprint arXiv:1811.07029, 2018.

B. Peng, T. Rashid, C. A. Schroeder de Witt, P.-A. Kamienny, P. H. S. Torr, W. Böhmer, and S. Whiteson, “FACMAC: Factored Multi-Agent Centralised Policy Gradients,” arXiv preprint arXiv:2003.06709, 2020.

W. Kim, M. Cho, and Y. Sung, “Message-Dropout: An Efficient Training Method for Multi-Agent Deep Reinforcement Learning,” arXiv preprint arXiv:1902.06527, 2019.

T. Walczyna, D. Jankowski, and Z. Piotrowski, “Enhancing Anomaly Detection Through Latent Space Manipulation in Autoencoders: A Comparative Analysis,” Appl. Sci., vol. 15, no. 1, 2025.

C. I. Chikezie, T. C. Okpara, and A. C. Mmadumbu, “Autoencoders for Anomaly Detection: A Comprehensive Architectural Review, Comparative Insights, and Practical Guidance,” Int. J. Eng. Res. Technol., vol. 8, no. 5, 2025.

“A comprehensive study of autoencoders for anomaly detection: Efficiency and trade-offs,” Machine Learning with Applications, vol. 17, 2024, 100572.

W. T. Lunardi, M. A. Lopez, and J. P. Giacalone, “ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection,” 2022. [Online]. Available: https://arxiv.org/abs/2201.00000

F. Harrou, B. Bouyeddou, A. Dairi, and Y. Sun, “Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids,” Future Internet, vol. 16, no. 6, p. 184, 2024.

D.-M. Tsai and P.-H. Jen, “Autoencoder-based anomaly detection for surface defect inspection,” Adv. Eng. Informatics, vol. 48, p. 101272, Apr. 2021.

F. Fadhil, M. Ali, and N. Safiullin, “The study on usage of table functions instead of basic operators inside encryption algorithm,” Proc. Ural-Siberian Conf. Biomed. Eng., Radioelectronics Inf. Technol. (USBEREIT), 2022. doi: 10.1109/USBEREIT55310.2022.9923412

A. Daoud, W. Khedr, O. Elkomy, and K. Hosny, “New Autoencoder-Based Method for Efficient Anomaly Detection in ECG Bio-Signals,” Int. J. Comput. Inform., vol. 5, pp. 1–12, Oct. 2024.