{"id":"https://openalex.org/W4297745267","doi":"https://doi.org/10.31577/cai_2022_3_665","title":"GTA-IDS: Game Theoretic Approach to Enhance IDS Detection in Cloud Environment","display_name":"GTA-IDS: Game Theoretic Approach to Enhance IDS Detection in Cloud Environment","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4297745267","doi":"https://doi.org/10.31577/cai_2022_3_665"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.31577/cai_2022_3_665","pdf_url":null,"source":{"id":"https://openalex.org/S4210200093","display_name":"Computing and Informatics","issn_l":"1335-9150","issn":["1335-9150","2585-8807"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001557903","display_name":"Komal Singh Gill","orcid":"https://orcid.org/0000-0002-6411-7457"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Komal Singh Gill","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala 147004, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala 147004, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102784876","display_name":"Sharad Saxena","orcid":null},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sharad Saxena","raw_affiliation_strings":["Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala 147004, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, Patiala 147004, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063031284","display_name":"Anju Sharma","orcid":"https://orcid.org/0000-0003-2533-0033"},"institutions":[{"id":"https://openalex.org/I4210136518","display_name":"Maharaja Ranjit Singh Punjab Technical University","ror":"https://ror.org/03k7qz240","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210136518"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anju Sharma","raw_affiliation_strings":["Department of Computational Sciences, Maharaja Ranjit Singh Punjab Technical University, Bathinda, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computational Sciences, Maharaja Ranjit Singh Punjab Technical University, Bathinda, Punjab, India","institution_ids":["https://openalex.org/I4210136518"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.205,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.441445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":71},"biblio":{"volume":"41","issue":"3","first_page":"665","last_page":"688"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9921,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9889,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/iot-security","display_name":"IoT Security","score":0.605383},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.565279},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge Computing","score":0.545342},{"id":"https://openalex.org/keywords/detection","display_name":"Detection","score":0.528715},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.524319},{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.48157692}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8329172},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78685147},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7807521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6110434},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.48428434},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.48157692},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.45764962},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42793196},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.41810977},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.41465974},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.1655632},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.31577/cai_2022_3_665","pdf_url":null,"source":{"id":"https://openalex.org/S4210200093","display_name":"Computing and Informatics","issn_l":"1335-9150","issn":["1335-9150","2585-8807"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.47}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4306359644","https://openalex.org/W4287010134","https://openalex.org/W4213222909","https://openalex.org/W3119657649","https://openalex.org/W2990561591","https://openalex.org/W2578022262","https://openalex.org/W2266551045","https://openalex.org/W2040004955","https://openalex.org/W2030786136","https://openalex.org/W1980949979"],"abstract_inverted_index":{"The":[0,15,96,152,167,187,206],"Internet":[1],"of":[2,45,94],"Things":[3],"(IoT)":[4],"industry":[5],"is":[6,22,77],"growing":[7],"with":[8,12,73],"the":[9,19,33,36,57,61,68,71,74,92,103,108,112,139,177,193,197,203,214,216,226],"high-quality":[10],"collaboration":[11],"Cloud":[13,132],"Computing.":[14],"data":[16],"generated":[17],"by":[18,32,213],"IoT":[20,46,75,105],"devices":[21,47,76],"quite":[23],"large":[24],"which":[25,55],"can":[26,98],"be":[27,143],"efficiently":[28],"stored":[29],"and":[30,89,110,149,180,196,223],"processed":[31],"cloud.":[34],"Further,":[35],"scenario":[37],"like":[38,87],"COVID-19":[39],"led":[40],"to":[41,51,60,64,107,118,126,142,162,175,183,202],"an":[42],"unexpected":[43],"flood":[44],"on":[48,155,192],"enabling":[49],"networks":[50],"facilitate":[52],"online":[53],"services,":[54],"increases":[56],"potential":[58],"threats":[59],"companies":[62],"fighting":[63],"remain":[65],"operational":[66],"during":[67],"crises.":[69],"Still,":[70],"problem":[72],"their":[78],"weak":[79],"security":[80],"implications":[81],"because":[82],"vendors":[83],"prioritize":[84],"other":[85],"factors":[86],"energy-saving":[88],"efficiency":[90],"at":[91],"cost":[93],"security.":[95],"Attacker":[97],"send":[99],"malicious":[100],"requests":[101],"through":[102],"vulnerable":[104],"device":[106],"network":[109],"exploit":[111],"cloud":[113],"in":[114,131,147],"various":[115],"ways.":[116],"So,":[117],"address":[119],"this":[120],"issue,":[121],"a":[122,220],"Game":[123],"Theoretic":[124],"Approach":[125],"enhance":[127],"IDS":[128],"detection":[129],"(GTA-IDS)":[130],"Environment":[133],"has":[134,159,172,189],"been":[135,160,173,190,200],"devised":[136],"that":[137,209],"helps":[138],"Defender":[140,217],"system":[141],"more":[144],"efficient,":[145],"accurate":[146],"decision-making":[148],"save":[150],"energy.":[151],"algorithm":[153],"based":[154],"relative":[156],"information":[157],"entropy":[158],"developed":[161],"defend":[163],"against":[164],"such":[165],"attacks.":[166],"Bayesian":[168],"Nash":[169],"Equilibrium":[170],"(BNE)":[171],"used":[174],"make":[176],"Defender's":[178],"strategies":[179],"perform":[181],"actions":[182],"maximize":[184],"its":[185],"payoffs.":[186],"model":[188],"tested":[191],"NSL-KDD":[194],"dataset":[195],"results":[198,207],"have":[199],"compared":[201],"existing":[204],"techniques.":[205],"show":[208],"despite":[210],"efforts":[211],"made":[212],"Attacker,":[215],"always":[218],"gets":[219],"better":[221],"gain":[222],"ultimately":[224],"eliminates":[225],"attack.":[227]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4297745267","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2024-12-05T10:42:35.926663","created_date":"2022-09-30"}