{"id":"https://openalex.org/W4285147178","doi":"https://doi.org/10.1109/tvt.2022.3186834","title":"Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game","display_name":"Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game","publication_year":2022,"publication_date":"2022-06-28","ids":{"openalex":"https://openalex.org/W4285147178","doi":"https://doi.org/10.1109/tvt.2022.3186834"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2022.3186834","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3186834","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050123066","display_name":"Hafsa Benaddi","orcid":"https://orcid.org/0000-0003-2489-0637"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Hafsa Benaddi","raw_affiliation_strings":["Faculty of Sciences, LaRI Laboratory, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of Sciences, LaRI Laboratory, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036440733","display_name":"Khalil Ibrahimi","orcid":"https://orcid.org/0000-0002-9682-9555"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalil Ibrahimi","raw_affiliation_strings":["Faculty of Sciences, LaRI Laboratory, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of Sciences, LaRI Laboratory, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["University of Avignon, CERI/LIA, Avignon, France"],"affiliations":[{"raw_affiliation_string":"University of Avignon, CERI/LIA, Avignon, France","institution_ids":["https://openalex.org/I198415970"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065165118","display_name":"Mohammed Jouhari","orcid":"https://orcid.org/0000-0001-5406-8594"},"institutions":[{"id":"https://openalex.org/I4210131560","display_name":"Universit\u00e9 Mohammed VI Polytechnique","ror":"https://ror.org/03xc55g68","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210131560"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Jouhari","raw_affiliation_strings":["School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir, Morocco"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir, Morocco","institution_ids":["https://openalex.org/I4210131560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037574053","display_name":"Junaid Qadir","orcid":"https://orcid.org/0000-0001-9466-2475"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Junaid Qadir","raw_affiliation_strings":["Department of Computer Science, Engineering, College of Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Engineering, College of Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050123066"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":9.6843,"has_fulltext":false,"cited_by_count":69,"citation_normalized_percentile":{"value":0.9853893,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"71","issue":"10","first_page":"11089","last_page":"11102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8339877128601074},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.6723446846008301},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6689178347587585},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6558747291564941},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6191989779472351},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6124907732009888},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5490081310272217},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5468447208404541},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5404291152954102},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.46788090467453003},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.4321509301662445},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17808398604393005},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1721366047859192},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.13126322627067566}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8339877128601074},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.6723446846008301},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6689178347587585},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6558747291564941},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6191989779472351},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6124907732009888},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5490081310272217},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5468447208404541},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5404291152954102},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.46788090467453003},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.4321509301662445},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17808398604393005},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1721366047859192},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.13126322627067566},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tvt.2022.3186834","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3186834","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/45578","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/45578","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W69782458","https://openalex.org/W1907356258","https://openalex.org/W1977100478","https://openalex.org/W1995064428","https://openalex.org/W2072726185","https://openalex.org/W2099940443","https://openalex.org/W2338211929","https://openalex.org/W2762776925","https://openalex.org/W2801119105","https://openalex.org/W2911171945","https://openalex.org/W2924689635","https://openalex.org/W2939009479","https://openalex.org/W2946127746","https://openalex.org/W2973862992","https://openalex.org/W2974564554","https://openalex.org/W2979997028","https://openalex.org/W2981372033","https://openalex.org/W3011807858","https://openalex.org/W3019922796","https://openalex.org/W3033728179","https://openalex.org/W3046697349","https://openalex.org/W3082999995","https://openalex.org/W3091185763","https://openalex.org/W3093410479","https://openalex.org/W3115101267","https://openalex.org/W3118670180","https://openalex.org/W3120792425","https://openalex.org/W3121165570","https://openalex.org/W3132109934","https://openalex.org/W3136238191","https://openalex.org/W3137192834","https://openalex.org/W3139008799","https://openalex.org/W3153692137","https://openalex.org/W3156050669","https://openalex.org/W3165574415","https://openalex.org/W3175817563","https://openalex.org/W3184395191","https://openalex.org/W3184976423","https://openalex.org/W3203436613","https://openalex.org/W3217115371","https://openalex.org/W4212937121"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W4312141693","https://openalex.org/W1536009559","https://openalex.org/W1969185016","https://openalex.org/W2103821767","https://openalex.org/W2111030377","https://openalex.org/W187740018","https://openalex.org/W2037619003","https://openalex.org/W2162286586","https://openalex.org/W4255368532"],"abstract_inverted_index":{"The":[0],"incorporation":[1],"of":[2,18,25,59,111,159,195,203,246],"advanced":[3],"networking":[4],"technologies":[5],"makes":[6],"modern":[7],"systems":[8],"vulnerable":[9],"to":[10,22,100,173,180,199,242,259],"cyber-attacks":[11],"that":[12,164],"can":[13],"result":[14],"in":[15,66],"a":[16,86,138,168,217],"number":[17],"harmful":[19],"outcomes.":[20],"Due":[21],"the":[23,60,102,112,119,122,143,150,153,160,175,181,193,200,223,229,233,244,247,260],"increase":[24],"security":[26],"incidents":[27],"and":[28,51,125,152,208,232],"massive":[29],"activities":[30],"on":[31,38,47,148],"networks,":[32],"existing":[33,224],"works":[34],"have":[35],"mainly":[36],"focused":[37],"designing":[39],"<italic":[40,94,129],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[41,95,130],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Intrusion":[42],"Detection":[43],"Systems":[44],"(IDSs)</i>":[45],"based":[46],"traditional":[48],"machine":[49,210],"learning":[50,53,77,206,211],"deep":[52,76],"models.":[54],"In":[55,81,106],"recent":[56],"times,":[57],"state":[58,262],"art":[61],"performance":[62,194],"has":[63],"been":[64],"achieved":[65],"various":[67,252],"fields":[68],"through":[69,117],"Deep":[70],"Reinforcement":[71],"Learning":[72],"(DRL),":[73],"which":[74,178],"combines":[75],"with":[78],"reinforcement":[79,205],"learning.":[80],"this":[82],"paper,":[83],"we":[84,136],"propose":[85],"new":[87],"DRL-based":[88],"IDS":[89,103,113,124,151,250],"for":[90],"network":[91],"traffics":[92],"using":[93,128,213],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Markov":[96],"decision":[97,183],"process":[98],"(MDP)</i>":[99],"improve":[101],"decision-making":[104],"performance.":[105],"addition,":[107],"an":[108],"extensive":[109],"analysis":[110],"behavior":[114],"is":[115],"provided":[116,241],"modeling":[118],"interaction":[120],"between":[121,145],"well-behaving":[123],"attacker":[126],"players":[127,187,265],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Stochastic":[131],"Game":[132],"Theory</i>":[133],".":[134],"Specifically,":[135],"used":[137],"non-zero-sum":[139],"stochastic":[140],"game,":[141],"where":[142,185,263],"transitions":[144],"states":[146],"depend":[147],"both":[149,186,228,264],"attacker\u2019s":[154],"actions":[155],"at":[156],"each":[157],"stage":[158],"game.":[161],"We":[162,191],"show":[163],"our":[165,196,219],"game":[166,248],"reaches":[167],"Nash":[169],"Equilibrium":[170],"upon":[171],"convergence":[172,245],"seek":[174],"optimal":[176,182],"solution,":[177],"corresponds":[179,258],"policy":[184],"maximize":[188],"their":[189,268],"profits.":[190],"compared":[192],"proposed":[197,220],"DRL-IDS":[198,221],"baseline":[201],"benchmark":[202],"standard":[204],"(RL)":[207],"several":[209],"algorithms":[212],"NSL-KDD":[214],"dataset.":[215],"As":[216],"result,":[218],"outperforms":[222],"models":[225],"by":[226],"improving":[227],"detection":[230],"rate":[231],"accuracy":[234],"while":[235],"reducing":[236],"false":[237],"alarms.":[238],"Results":[239],"were":[240],"demonstrate":[243],"theory-based":[249],"under":[251],"settings":[253],"toward":[254],"equilibrium.":[255],"This":[256],"equilibrium":[257],"safe":[261],"are":[266],"playing":[267],"respective":[269],"best":[270],"strategies.":[271]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
