Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach

被引:0
作者
Yang, Zhengrui [1 ]
机构
[1] School of Cyber Science and Engineering, Zhengzhou University, Henan, Zhengzhou
关键词
Attacks; Cyber-Security; Fuzzy OffLogic; Intrusion Detection System; MCDM Approach; Security;
D O I
10.5281/zenodo.15265874
中图分类号
学科分类号
摘要
Modern cybersecurity infrastructures rely heavily on Intrusion Detection Systems (IDS) to detect and prevent malicious activities and unauthorized access. Given the growing complexity of network topologies and the rising frequency of cyber threats, evaluating IDS solutions requires a systematic and unbiased approach. In this study, thirteen widely used IDS models are assessed using a multi-criteria evaluation framework across four key dimensions: detection accuracy, resource efficiency, scalability, and false positive rate. The goal is to support informed, data-driven decision-making for stakeholders such as policymakers, IT administrators, and security analysts when selecting an appropriate IDS. The VIKOR method is employed to rank the IDS alternatives based on the assigned weights, while Fuzzy OffLogic is applied to integrate expert assessments expressed as intervals. The results reveal that modern AI-based IDS models demonstrate strong performance in scalability and resource utilization, and they outperform traditional systems in adaptability and detection accuracy. © 2025, University of New Mexico. All rights reserved.
引用
收藏
页码:343 / 360
页数:17
相关论文
共 23 条
[11]  
Scarfone K., Mell P., Guide to intrusion detection and prevention systems (idps), NIST Spec. Publ., 800, 2007, (2007)
[12]  
Milenkoski A., Vieira M., Kounev S., Avritzer A., Payne B.D., Evaluating computer intrusion detection systems: A survey of common practices, ACM Comput. Surv., 48, 1, pp. 1-41, (2015)
[13]  
Devprasad K.D., Ramanujam S., Rajendran S.B., Context adaptive ensemble classification mechanism with multi-criteria decision making for network intrusion detection, Concurr. Comput. Pract. Exp, 34, 21, (2022)
[14]  
Diana L., Dini P., Paolini D., Overview on Intrusion Detection Systems for Computers Networking Security, Computers, 14, 3, (2025)
[15]  
Makris I., Et al., A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions, Comput. Sci. Rev, 56, (2025)
[16]  
Naghib A., Gharehchopogh F.S., Zamanifar A., A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: Current status, challenges, and opportunities, Artif. Intell. Rev, 58, 4, pp. 1-88, (2025)
[17]  
Al-Haija Q.A., Droos A., A comprehensive survey on deep learning-based intrusion detection systems in Internet of Things (IoT, Expert Syst, 42, 2, (2025)
[18]  
Zukaib U., Cui X., Mitigating backdoor attacks in Federated Learning based intrusion detection systems through Neuron Synaptic Weight Adjustment, Knowledge-Based Syst, 314, (2025)
[19]  
Smarandache F., Degrees of membership> 1 and< 0 of the Elements with Respect to a Neutrosophic Offset. Infinite Study, (2016)
[20]  
Smarandache F., Interval-Valued Neutrosophic Oversets, Neutrosophic Understes, and Neutrosophic Offsets, Int. J. Sci. Eng. Investig, 5, 54, pp. 1-4, (2016)