An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions

Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if br...

Full description

Bibliographic Details
Main Authors: Mohamed Abdel-Basset, Abduallah Gamal, Karam M. Sallam, Ibrahim Elgendi, Kumudu Munasinghe, Abbas Jamalipour
Format: Article
Language:English
Published: MDPI AG 2022-05-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/11/4123
_version_ 1797491710892179456
author Mohamed Abdel-Basset
Abduallah Gamal
Karam M. Sallam
Ibrahim Elgendi
Kumudu Munasinghe
Abbas Jamalipour
author_facet Mohamed Abdel-Basset
Abduallah Gamal
Karam M. Sallam
Ibrahim Elgendi
Kumudu Munasinghe
Abbas Jamalipour
author_sort Mohamed Abdel-Basset
collection DOAJ
description Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance.
first_indexed 2024-03-10T00:53:14Z
format Article
id doaj.art-c04ebcf23e92469f9fb9069b3f1df8be
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T00:53:14Z
publishDate 2022-05-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-c04ebcf23e92469f9fb9069b3f1df8be2023-11-23T14:48:59ZengMDPI AGSensors1424-82202022-05-012211412310.3390/s22114123An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and SolutionsMohamed Abdel-Basset0Abduallah Gamal1Karam M. Sallam2Ibrahim Elgendi3Kumudu Munasinghe4Abbas Jamalipour5Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, EgyptFaculty of Computers and Informatics, Zagazig University, Zagazig 44519, EgyptSchool of IT and Systems, University of Canberra, Canberra, ACT 2601, AustraliaSchool of IT and Systems, University of Canberra, Canberra, ACT 2601, AustraliaSchool of IT and Systems, University of Canberra, Canberra, ACT 2601, AustraliaSchool of Electrical and Information Engineering, The University of Sydney, Sydney, NSW 2006, AustraliaCyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance.https://www.mdpi.com/1424-8220/22/11/4123cyber-attacksintrusion-detection systemMCDMq-rung orthopair fuzzy setsq-ROFWG
spellingShingle Mohamed Abdel-Basset
Abduallah Gamal
Karam M. Sallam
Ibrahim Elgendi
Kumudu Munasinghe
Abbas Jamalipour
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
Sensors
cyber-attacks
intrusion-detection system
MCDM
q-rung orthopair fuzzy sets
q-ROFWG
title An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_full An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_fullStr An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_full_unstemmed An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_short An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_sort optimization model for appraising intrusion detection systems for network security communications applications challenges and solutions
topic cyber-attacks
intrusion-detection system
MCDM
q-rung orthopair fuzzy sets
q-ROFWG
url https://www.mdpi.com/1424-8220/22/11/4123
work_keys_str_mv AT mohamedabdelbasset anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT abduallahgamal anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT karammsallam anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT ibrahimelgendi anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT kumudumunasinghe anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT abbasjamalipour anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT mohamedabdelbasset optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT abduallahgamal optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT karammsallam optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT ibrahimelgendi optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT kumudumunasinghe optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT abbasjamalipour optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions