{"id":"https://openalex.org/W7117977777","doi":"https://doi.org/10.3837/tiis.2025.12.018","title":"Peak Synergy Network: A Novel Marl Framework for Enhanced Cyber-Attack Detection","display_name":"Peak Synergy Network: A Novel Marl Framework for Enhanced Cyber-Attack Detection","publication_year":2025,"publication_date":"2025-12-31","ids":{"openalex":"https://openalex.org/W7117977777","doi":"https://doi.org/10.3837/tiis.2025.12.018"},"language":null,"primary_location":{"id":"doi:10.3837/tiis.2025.12.018","is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2025.12.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/105412/TIIS Vol 19, No 12-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"KSII Transactions on Internet and Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://itiis.org/digital-library/manuscript/file/105412/TIIS Vol 19, No 12-18.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014278908","display_name":"Deepa Rajan S.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Deepa Rajan S","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5128219176","display_name":"A. Manikandan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Manikandan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014278908"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7068877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"12","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5722000002861023,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5722000002861023,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.024000000208616257,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.020500000566244125,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/marl","display_name":"Marl","score":0.565500020980835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7709000110626221},{"id":"https://openalex.org/C92927620","wikidata":"https://www.wikidata.org/wiki/Q184053","display_name":"Marl","level":3,"score":0.565500020980835},{"id":"https://openalex.org/C459310","wikidata":"https://www.wikidata.org/wiki/Q117801","display_name":"Computational science","level":1,"score":0.352400004863739},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31200000643730164},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28040000796318054},{"id":"https://openalex.org/C62649853","wikidata":"https://www.wikidata.org/wiki/Q199687","display_name":"Remote sensing","level":1,"score":0.2745000123977661},{"id":"https://openalex.org/C186060115","wikidata":"https://www.wikidata.org/wiki/Q30336093","display_name":"Biological system","level":1,"score":0.25690001249313354},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.22789999842643738},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.21320000290870667},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2101999968290329}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3837/tiis.2025.12.018","is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2025.12.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/105412/TIIS Vol 19, No 12-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"KSII Transactions on Internet and Information Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3837/tiis.2025.12.018","is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2025.12.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/105412/TIIS Vol 19, No 12-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"KSII Transactions on Internet and Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117977777.pdf","grobid_xml":"https://content.openalex.org/works/W7117977777.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Cyber-attack":[0],"detection":[1,27],"is":[2,86,125],"crucial":[3],"for":[4,52,197],"safeguarding":[5],"sensitive":[6],"data,":[7,56],"digital":[8],"assets,":[9],"and":[10,30,57,81,97,110,143,161,185,201],"critical":[11],"infrastructure.This":[12],"research":[13],"introduces":[14],"the":[15,50,105,126,167,193],"\"Peak":[16],"Synergy":[17],"Network":[18],"Model":[19],"Framework":[20],"(PSNM)\",":[21],"a":[22,89,186],"revolutionary":[23],"method":[24],"that":[25],"improves":[26],"accuracy,":[28,178],"resilience,":[29],"adaptability":[31],"to":[32,113,133],"evolving":[33],"threats":[34],"by":[35,67,117],"utilizing":[36],"Multi-Agent":[37],"Reinforcement":[38],"Learning":[39],"(MARL).Conventional":[40],"MARL":[41],"techniques":[42],"face":[43],"several":[44,69],"drawbacks,":[45],"including":[46],"high":[47],"computational":[48],"demands,":[49],"need":[51],"large":[53],"volumes":[54],"of":[55,166],"challenges":[58],"in":[59,141],"agent":[60],"coordination.The":[61],"proposed":[62,100,168],"framework":[63,169],"addresses":[64],"these":[65],"issues":[66],"incorporating":[68],"innovative":[70],"components.First,":[71],"comprehensive":[72],"data":[73],"preprocessing":[74],"ensures":[75,111],"high-quality":[76],"training":[77,160],"inputs":[78],"through":[79,137,173],"cleaning":[80],"normalization.The":[82],"intrusion":[83],"response":[84],"system":[85],"modelled":[87],"as":[88],"multi-attribute":[90],"decisionmaking":[91],"problem,":[92],"optimizing":[93],"time":[94],"efficiency,":[95],"cost,":[96],"resource":[98],"constraints.The":[99],"\"Antecedent":[101],"DQN":[102],"Model\"":[103],"maximizes":[104],"predicted":[106],"cumulative":[107],"discounted":[108],"reward":[109],"convergence":[112,146],"an":[114],"optimal":[115],"policy":[116],"employing":[118],"Markov":[119],"Decision":[120],"Process":[121],"parameters.A":[122],"key":[123],"advancement":[124],"\"Shared":[127],"Decision-Making":[128],"Protocol,\"":[129],"which":[130],"enables":[131],"agents":[132],"independently":[134],"learn":[135],"policies":[136],"local":[138],"observations,":[139],"resulting":[140],"faster":[142],"more":[144],"reliable":[145],"with":[147],"minimized":[148],"communication":[149],"overhead.Furthermore,":[150],"\"Premium":[151],"Hyperparameter":[152],"Optimization\"":[153],"fine-tunes":[154],"each":[155],"parameter's":[156],"learning":[157],"rate,":[158],"accelerating":[159],"enhancing":[162],"overall":[163],"performance.The":[164],"effectiveness":[165],"has":[170],"been":[171],"validated":[172],"performance":[174],"metrics,":[175],"achieving":[176],"99.9%":[177,181,183],"100%":[179],"precision,":[180],"recall,":[182],"F1-score,":[184],"0.0":[187],"false":[188],"positive":[189],"rate.These":[190],"results":[191],"confirm":[192],"framework's":[194],"substantial":[195],"potential":[196],"effectively":[198],"detecting":[199],"advanced":[200],"dynamic":[202],"cyber":[203],"threats.":[204]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2026-01-02T00:00:00"}
