{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T03:18:15Z","timestamp":1764645495298,"version":"3.37.3"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["30918012204","315075701","61702264","SAST2018-103"],"award-info":[{"award-number":["30918012204","315075701","61702264","SAST2018-103"]}],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["30918012204","315075701","61702264","SAST2018-103"],"award-info":[{"award-number":["30918012204","315075701","61702264","SAST2018-103"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Military Common Information System Equipment Pre-research Special Technology Project","award":["30918012204","315075701","61702264","SAST2018-103"],"award-info":[{"award-number":["30918012204","315075701","61702264","SAST2018-103"]}]},{"name":"National Science Youth Foundation of China","award":["30918012204","315075701","61702264","SAST2018-103"],"award-info":[{"award-number":["30918012204","315075701","61702264","SAST2018-103"]}]},{"name":"Shanghai Aerospace Science and Technology Innovation Fund","award":["30918012204","315075701","61702264","SAST2018-103"],"award-info":[{"award-number":["30918012204","315075701","61702264","SAST2018-103"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2020,3,30]]},"abstract":"<jats:p>The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. The basic idea of safe active defence is to make the defence gain more significant than the attack loss. To encounter the new attacks with uncertain features introduced by the ubiquitous transmission network in the edge computing network, this paper investigates the attack behaviour and presents an attack-defence mechanism based on game theory. Based on the idea of dynamic intrusion detection, we utilize the game theory in the field of edge computing network and suggest a data-driven mimicry intrusion detection game model-based technique called GLIDE. The game income of participants and utility computing methods under different deployment strategies are analysed in detail. According to the proof analysis of the Nash equilibrium condition in the model, the contradictory dynamic game relationship is described. Therefore, the optimal deployment strategy of the multiredundancy edge computing terminal intrusion detection service in the edge computing network is obtained by solving the game balance point. The detection probability of the edge computing network for network attacks is improved, and the cost of intrusion detection of the edge computing network is reduced.<\/jats:p>","DOI":"10.1155\/2020\/7136160","type":"journal-article","created":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T23:31:05Z","timestamp":1585611065000},"page":"1-18","source":"Crossref","is-referenced-by-count":17,"title":["GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":true,"given":"Qianmu","family":"Li","sequence":"first","affiliation":[{"name":"Intelligent Manufacturing Department, Wuyi University, Jiangmen 529020, China"},{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6986-4961","authenticated-orcid":true,"given":"Jun","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Social Science, Nanjing Institute of Industry Technology, Nanjing 210023, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6173-9787","authenticated-orcid":true,"given":"Shunmei","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4977-9911","authenticated-orcid":true,"given":"Huaqiu","family":"Long","sequence":"additional","affiliation":[{"name":"Intelligent Manufacturing Department, Wuyi University, Jiangmen 529020, China"},{"name":"Jiangsu Zhongtian Technology Co., Ltd., Nantong 226463, China"},{"name":"Jiangsu Graduate Workstation, Nanjing Liancheng Technology Development Co., Ltd., Nanjing 210012, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03122-y"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2785305"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2908858"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.007"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2017.2771424"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943493"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2762345"},{"issue":"1","key":"8","first-page":"12","volume":"38","year":"2014","journal-title":"Journal of Nanjing University of Technology (Natural Science Edition)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.242"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.06.004"},{"issue":"11","key":"11","first-page":"1","volume":"36","year":"2015","journal-title":"Journal on Communications"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944007"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2016.2616442"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2806483"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.050"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1561-7"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3075849"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3437854"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.006"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.008"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1016.2009.00817"},{"issue":"6","key":"25","first-page":"1428","volume":"46","year":"2018","journal-title":"Acta Electronica Sinica"},{"key":"26","first-page":"144","volume":"1","year":"2016","journal-title":"Journal of Xidian University"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.07.027"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1177\/0361198119837180"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2010.2091655"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936869"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2896129"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2749"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2019.2906925"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2904047"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.055"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939891"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2891505"},{"issue":"1","key":"38","first-page":"1","volume":"2","year":"2017","journal-title":"Journal of Cyber Security"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700330"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/7136160.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/7136160.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2020\/7136160.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T23:31:21Z","timestamp":1585611081000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/complexity\/2020\/7136160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":37,"alternative-id":["7136160","7136160"],"URL":"https:\/\/doi.org\/10.1155\/2020\/7136160","relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2020,3,30]]}}}