Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach

被引:0
作者
Yang, Zhengrui [1 ]
机构
[1] School of Cyber Science and Engineering, Zhengzhou University, Henan, Zhengzhou
关键词
Attacks; Cyber-Security; Fuzzy OffLogic; Intrusion Detection System; MCDM Approach; Security;
D O I
10.5281/zenodo.15265874
中图分类号
学科分类号
摘要
Modern cybersecurity infrastructures rely heavily on Intrusion Detection Systems (IDS) to detect and prevent malicious activities and unauthorized access. Given the growing complexity of network topologies and the rising frequency of cyber threats, evaluating IDS solutions requires a systematic and unbiased approach. In this study, thirteen widely used IDS models are assessed using a multi-criteria evaluation framework across four key dimensions: detection accuracy, resource efficiency, scalability, and false positive rate. The goal is to support informed, data-driven decision-making for stakeholders such as policymakers, IT administrators, and security analysts when selecting an appropriate IDS. The VIKOR method is employed to rank the IDS alternatives based on the assigned weights, while Fuzzy OffLogic is applied to integrate expert assessments expressed as intervals. The results reveal that modern AI-based IDS models demonstrate strong performance in scalability and resource utilization, and they outperform traditional systems in adaptability and detection accuracy. © 2025, University of New Mexico. All rights reserved.
引用
收藏
页码:343 / 360
页数:17
相关论文
共 23 条
[1]  
Bouyahia T., Cuppens-Boulahia N., Cuppens F., Autrel F., Multi-criteria recommender approach for supporting intrusion response system, In Foundations and Practice of Security: 9Th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers 9, Springer, pp. 51-67, (2017)
[2]  
Abushark Y.B., Et al., Cyber security analysis and evaluation for intrusion detection systems, Comput. Mater. Contin, 72, 1, pp. 1765-1783, (2022)
[3]  
Wang J., Xiong X., Chen G., Ouyang R., Gao Y., Alfarraj O., Multi-Criteria Feature Selection Based Intrusion Detection for Internet of Things Big Data, Sensors, 23, 17, (2023)
[4]  
Kou G., Peng Y., Chen Z., Shi Y., Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection, Inf. Sci. (Ny), 179, 4, pp. 371-381, (2009)
[5]  
Guan S., Wang J., Jiang C., Tong J., Ren Y., Intrusion detection for wireless sensor networks: A multi-criteria game approach, In 2018 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp. 1-6, (2018)
[6]  
Bamakan S.M.H., Amiri B., Mirzabagheri M., Shi Y., A new intrusion detection approach using PSO based multiple criteria linear programming, Procedia Comput. Sci, 55, pp. 231-237, (2015)
[7]  
Bernieri G., Damiani S., Del Moro F., Faramondi L., Pascucci F., Tambone F., A Multiple-Criteria Decision Making method as support for critical infrastructure protection and Intrusion Detection System, IECON 2016-42Nd Annual Conference of the IEEE Industrial Electronics Society, IEEE, pp. 4871-4876, (2016)
[8]  
Upendran V., Gopinath R., Feature selection based on multi-criteria decision making for intrusion detection system, Int. J. Electr. Eng. Technol, 11, 5, pp. 217-226, (2020)
[9]  
Zbakh M., Elmahdi K., Cherkaoui R., Enniari S., A multi-criteria analysis of intrusion detection architectures in cloud environments, 2015 International Conference on Cloud Technologies and Applications (Cloudtech), IEEE, pp. 1-9, (2015)
[10]  
Kruegel C., Valeur F., Vigna G., Intrusion Detection and Correlation: Challenges and Solutions, 14, (2004)