Cargando…

An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions

Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if br...

Descripción completa

Detalles Bibliográficos
Autores principales: Abdel-Basset, Mohamed, Gamal, Abduallah, Sallam, Karam M., Elgendi, Ibrahim, Munasinghe, Kumudu, Jamalipour, Abbas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185350/
https://www.ncbi.nlm.nih.gov/pubmed/35684744
http://dx.doi.org/10.3390/s22114123
_version_ 1784724703073533952
author Abdel-Basset, Mohamed
Gamal, Abduallah
Sallam, Karam M.
Elgendi, Ibrahim
Munasinghe, Kumudu
Jamalipour, Abbas
author_facet Abdel-Basset, Mohamed
Gamal, Abduallah
Sallam, Karam M.
Elgendi, Ibrahim
Munasinghe, Kumudu
Jamalipour, Abbas
author_sort Abdel-Basset, Mohamed
collection PubMed
description Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance.
format Online
Article
Text
id pubmed-9185350
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91853502022-06-11 An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions Abdel-Basset, Mohamed Gamal, Abduallah Sallam, Karam M. Elgendi, Ibrahim Munasinghe, Kumudu Jamalipour, Abbas Sensors (Basel) Article Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance. MDPI 2022-05-29 /pmc/articles/PMC9185350/ /pubmed/35684744 http://dx.doi.org/10.3390/s22114123 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Abdel-Basset, Mohamed
Gamal, Abduallah
Sallam, Karam M.
Elgendi, Ibrahim
Munasinghe, Kumudu
Jamalipour, Abbas
An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_full An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_fullStr An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_full_unstemmed An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_short An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions
title_sort optimization model for appraising intrusion-detection systems for network security communications: applications, challenges, and solutions
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185350/
https://www.ncbi.nlm.nih.gov/pubmed/35684744
http://dx.doi.org/10.3390/s22114123
work_keys_str_mv AT abdelbassetmohamed anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT gamalabduallah anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT sallamkaramm anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT elgendiibrahim anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT munasinghekumudu anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT jamalipourabbas anoptimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT abdelbassetmohamed optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT gamalabduallah optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT sallamkaramm optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT elgendiibrahim optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT munasinghekumudu optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions
AT jamalipourabbas optimizationmodelforappraisingintrusiondetectionsystemsfornetworksecuritycommunicationsapplicationschallengesandsolutions