{"id":"https://openalex.org/W4409883271","doi":"https://doi.org/10.1109/tsc.2025.3563680","title":"ML-Based Intrusion Detection as a Service: Traffic Split Offloading and Cost Allocation in a Multi-Tier Architecture","display_name":"ML-Based Intrusion Detection as a Service: Traffic Split Offloading and Cost Allocation in a Multi-Tier Architecture","publication_year":2025,"publication_date":"2025-04-28","ids":{"openalex":"https://openalex.org/W4409883271","doi":"https://doi.org/10.1109/tsc.2025.3563680"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2025.3563680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3563680","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029661382","display_name":"Didik Sudyana","orcid":"https://orcid.org/0000-0001-5378-2622"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]},{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Didik Sudyana","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","Computer and Network Center, National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]},{"raw_affiliation_string":"Computer and Network Center, National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085347760","display_name":"Yuan\u2010Cheng Lai","orcid":"https://orcid.org/0000-0003-3695-5784"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yuan-Cheng Lai","raw_affiliation_strings":["Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103294135","display_name":"Ying-Dar Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ying-Dar Lin","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026890738","display_name":"Piotr Cho\u0142da","orcid":"https://orcid.org/0000-0003-2018-4057"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Piotr Cho\u0142da","raw_affiliation_strings":["Institute of Telecommunications, AGH University of Krakow, Krak&#x00F3;w, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Telecommunications, AGH University of Krakow, Krak&#x00F3;w, Poland","institution_ids":["https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029661382"],"corresponding_institution_ids":["https://openalex.org/I148366613","https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10054361,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"3","first_page":"1557","last_page":"1572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9606999754905701,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8482483625411987},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5306972861289978},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5248793959617615},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.501368522644043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3092927932739258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8482483625411987},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5306972861289978},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5248793959617615},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.501368522644043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3092927932739258},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3563680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3563680","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W52135007","https://openalex.org/W2805402217","https://openalex.org/W2889885925","https://openalex.org/W2913330314","https://openalex.org/W2926701059","https://openalex.org/W2970866953","https://openalex.org/W2990268365","https://openalex.org/W3017752721","https://openalex.org/W3035510612","https://openalex.org/W3039274670","https://openalex.org/W3040552057","https://openalex.org/W3082551002","https://openalex.org/W3092272602","https://openalex.org/W3112126031","https://openalex.org/W3131541364","https://openalex.org/W3199183581","https://openalex.org/W3209024481","https://openalex.org/W4210587242","https://openalex.org/W4211016117","https://openalex.org/W4213166078","https://openalex.org/W4281385709","https://openalex.org/W4294068711","https://openalex.org/W4315629861","https://openalex.org/W4322102176","https://openalex.org/W4352976871"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"An":[0],"Intrusion":[1,38],"Detection":[2,39],"System":[3],"(IDS)":[4],"employing":[5],"machine":[6],"learning":[7],"(ML)":[8],"solutions":[9],"is":[10,77,154],"crucial":[11,78],"for":[12,136,144],"identifying":[13],"network":[14],"intrusions.":[15],"To":[16],"minimize":[17],"operational":[18],"expenses":[19],"and":[20,74,126,140,156,165,169,186,202],"enhance":[21,98],"performance,":[22],"enterprises":[23],"have":[24],"begun":[25],"outsourcing":[26],"IDS":[27,54,105],"management":[28],"to":[29,34,79,97,112,131,162,183,189,193],"service":[30,64],"providers,":[31],"giving":[32],"rise":[33],"the":[35,50,63,85,113,116,133,141,151,163,179,184,187,190],"concept":[36],"of":[37,52,87,181],"as":[40,115],"a":[41,90,121],"Service":[42],"(IDaS).":[43],"Earlier":[44],"research":[45],"primarily":[46],"aimed":[47],"at":[48],"enhancing":[49],"accuracy":[51],"ML-based":[53,104],"models":[55],"or":[56],"expediting":[57],"their":[58],"computational":[59],"process.":[60],"However,":[61],"from":[62],"provider's":[65],"perspective,":[66],"an":[67,195],"optimal":[68],"architecture":[69,153],"ensuring":[70],"minimal":[71],"computation":[72,200],"cost":[73,127,142],"processing":[75,176],"delay":[76],"increasing":[80],"revenue.":[81],"This":[82],"study":[83],"evaluates":[84],"performance":[86,99,173],"IDaS":[88],"in":[89,174],"multi-tier":[91],"architecture,":[92],"utilizing":[93],"traffic":[94,124,138,182],"split":[95],"offloading":[96,117,125,134],"by":[100],"mapping":[101],"three":[102],"in-sequence":[103],"tasks":[106],"(pre-processing,":[107],"binary":[108],"detection,":[109],"multi-class":[110],"classification)":[111],"architectures":[114],"destinations.":[118],"We":[119],"employ":[120],"simulated":[122],"annealing-based":[123],"allocation":[128],"(SA-TOCA)":[129],"algorithm":[130],"determine":[132],"ratio":[135],"each":[137,145],"path":[139],"requirements":[143],"tier.":[146],"The":[147],"results":[148],"indicate":[149],"that":[150],"edge-cloud":[152],"15%":[155],"four":[157],"times":[158],"more":[159],"cost-effective":[160],"compared":[161],"fog-edge":[164],"fog-cloud":[166],"architectures,":[167],"respectively,":[168],"it":[170],"demonstrates":[171],"superior":[172],"minimizing":[175],"delays.":[177,204],"Offloading":[178],"majority":[180],"edge":[185],"remainder":[188],"cloud":[191],"proves":[192],"be":[194],"efficient":[196],"strategy,":[197],"reducing":[198],"both":[199],"costs":[201],"average":[203]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
