Game-Theoretic Lightweight Autoencoder Design for Intrusion Detection

被引:0
作者
Rheey, Joohong [1 ]
Park, Hyunggon [1 ]
机构
[1] Ewha Womans Univ, Dept Elect & Elect Engn, Grad Program Smart Factory, Seoul, South Korea
来源
2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024 | 2024年
关键词
Lightweight; intrusion detection; autoencoder; Shapley value; DIMENSIONALITY;
D O I
10.1109/WCNC57260.2024.10570735
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In response to the security threats in wireless networks with concurrent device connections, deploying Intrusion Detection Systems (IDS) at the network edge is a promising strategy. However, this approach must take into account the resource constraints incurred by power-limited edge devices, requiring a lightweight solution to IDS. At the same time, the lightweight IDS solution has to minimize performance degradation as higher detection performance is also a key requirement of IDS. In this paper, we design a lightweight autoencoder with explainability, employing the Shapley value to measure unit importance and link importance. This approach can selectively activate only critical components, thereby reducing the complexity for IDS while effectively lowering its performance degradation. We confirm that the proposed algorithm is robust against the harsh sparsity of the autoencoder. Moreover, the sparsity of the proposed lightweight autoencoder can be easily manageable, such that it can be controlled to satisfy the potential constraints of power-limited edge devices. Therefore, the solution is a suitable algorithm for IDS that can be deployed on edge devices in wireless networks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Game Theoretic Approach towards Intrusion Detection
    Belavagi, Manjula C.
    Muniyal, Balachandra
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 236 - 240
  • [2] A Game Theoretic Approach for Deploying Intrusion Detection Agent
    Chen, Yi-Ming
    Wu, Dachrahn
    Wu, Cheng-Kuang
    AGENT COMPUTING AND MULTI-AGENT SYSTEMS, 2009, 5044 : 446 - +
  • [3] Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion
    Hu, Yinan
    Chen, Juntao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 516 - 530
  • [4] Axiomatic Characterization of Game-Theoretic Centrality
    Skibski, Oskar
    Michalak, Tomasz P.
    Rahwan, Talal
    JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2018, 62 : 33 - 68
  • [5] Networked control design for coalitional schemes using game-theoretic methods
    Javier Muros, Francisco
    Maria Maestre, Jose
    Algaba, Encarnacion
    Alamo, Teodoro
    Camacho, Eduardo F.
    AUTOMATICA, 2017, 78 : 320 - 332
  • [6] Game Theoretic Framework for Reputation-based Distributed Intrusion Detection
    Bradai, Amira
    Afifi, Hossam
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 558 - 563
  • [7] A Neural Network Model for Intrusion Detection Using a Game Theoretic Approach
    Kaushik, Pallavi
    Dutta, Kamlesh
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 355 - 367
  • [8] Efficient algorithms for game-theoretic betweenness centrality
    Szczepanski, Piotr L.
    Michalak, Tomas P.
    Rahwan, Talal
    ARTIFICIAL INTELLIGENCE, 2016, 231 : 39 - 63
  • [9] Measuring Unfairness Through Game-Theoretic Interpretability
    Cesaro, Juliana
    Cozman, Fabio Gagliardi
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2019, PT I, 2020, 1167 : 253 - 264
  • [10] A game-theoretic approach to resource sharing management
    Parilina, Elena
    Proceedings of the Second International Conference on Game Theory and Applications, 2007, : 49 - 52