Cargando…
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if br...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185350/ https://www.ncbi.nlm.nih.gov/pubmed/35684744 http://dx.doi.org/10.3390/s22114123 |
_version_ | 1784724703073533952 |
---|---|
author | Abdel-Basset, Mohamed Gamal, Abduallah Sallam, Karam M. Elgendi, Ibrahim Munasinghe, Kumudu Jamalipour, Abbas |
author_facet | Abdel-Basset, Mohamed Gamal, Abduallah Sallam, Karam M. Elgendi, Ibrahim Munasinghe, Kumudu Jamalipour, Abbas |
author_sort | Abdel-Basset, Mohamed |
collection | PubMed |
description | Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance. |
format | Online Article Text |
id | pubmed-9185350 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-91853502022-06-11 An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions Abdel-Basset, Mohamed Gamal, Abduallah Sallam, Karam M. Elgendi, Ibrahim Munasinghe, Kumudu Jamalipour, Abbas Sensors (Basel) Article Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance. MDPI 2022-05-29 /pmc/articles/PMC9185350/ /pubmed/35684744 http://dx.doi.org/10.3390/s22114123 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Abdel-Basset, Mohamed Gamal, Abduallah Sallam, Karam M. Elgendi, Ibrahim Munasinghe, Kumudu Jamalipour, Abbas An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title | An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title_full | An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title_fullStr | An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title_full_unstemmed | An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title_short | An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions |
title_sort | optimization model for appraising intrusion-detection systems for network security communications: applications, challenges, and solutions |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185350/ https://www.ncbi.nlm.nih.gov/pubmed/35684744 http://dx.doi.org/10.3390/s22114123 |
work_keys_str_mv | AT abdelbassetmohamed anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT gamalabduallah anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT sallamkaramm anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT elgendiibrahim anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT munasinghekumudu anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT jamalipourabbas anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT abdelbassetmohamed optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT gamalabduallah optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT sallamkaramm optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT elgendiibrahim optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT munasinghekumudu optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions AT jamalipourabbas optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions |