Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model

被引:15
作者
Alyami, Hashem [1 ]
Ansari, Md Tarique Jamal [2 ]
Alharbi, Abdullah [3 ]
Alosaimi, Wael [3 ]
Alshammari, Majid [3 ]
Pandey, Dhirendra [2 ]
Agrawal, Alka [2 ]
Kumar, Rajeev [4 ]
Khan, Raees Ahmad [2 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, At Taif 21944, Saudi Arabia
[2] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow 226025, Uttar Pradesh, India
[3] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, At Taif 21944, Saudi Arabia
[4] Babu Banarasi Univ, Dept Comp Sci & Engn, Lucknow 226028, Uttar Pradesh, India
关键词
intrusion-detection systems; threat; cyber-attacks; MCDM; fuzzy logic; SECURITY; TOPSIS; AHP; SYSTEM;
D O I
10.3390/electronics11060859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations nowadays use a variety of approaches, techniques, and technologies to safeguard the systems' credibility. Establishing policies and procedures, raising user awareness, implementing firewall and verification systems, controlling system access, and building computer-issue management groups are all examples of safeguarding methods. There is a lack of sufficient emphasis on the effectiveness of intrusion-detection systems. In enterprises, IDS is used to analyze the potentially dangerous activities taking place within the technological settings. The selection of efficient IDS is a challenging task for organizations. This research evaluates the impact of five popular IDSs for their efficiency and effectiveness in information security. The authors used the fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS)-based integrated multi-criteria decision-making (MCDM) methodology to evaluate the efficacy of the popular IDSs. The findings of this research suggest that most of the IDSs appear to be highly potential tools. Even though Snort is extensively deployed, Suricata has a substantial advantage over Snort. Suricata uses multi-threading functionality in comparison to Snort to boost the processing performance.
引用
收藏
页数:20
相关论文
共 37 条
  • [1] Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective
    Abushark, Yoosef B.
    Khan, Asif Irshad
    Alsolami, Fawaz Jaber
    Almalawi, Abdulmohsen
    Alam, Md Mottahir
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 1203 - 1218
  • [2] Atrocious Impinging of COVID-19 Pandemic on Software Development Industries
    Alhakami, Wajdi
    Binmahfoudh, Ahmed
    Baz, Abdullah
    Alhakami, Hosam
    Ansari, Md Tarique Jamal
    Khan, Raees Ahmad
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 36 (02): : 323 - 338
  • [3] MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System
    Ali, Muhammad
    Shiaeles, Stavros
    Bendiab, Gueltoum
    Ghita, Bogdan
    [J]. ELECTRONICS, 2020, 9 (11) : 1 - 20
  • [4] Evaluating the Impact of Different Symmetrical Models of Ambient Assisted Living Systems
    Alosaimi, Wael
    Ansari, Md Tarique Jamal
    Alharbi, Abdullah
    Alyami, Hashem
    Seh, Adil Hussain
    Pandey, Abhishek Kumar
    Agrawal, Alka
    Khan, Raees Ahmad
    [J]. SYMMETRY-BASEL, 2021, 13 (03):
  • [5] Anafcheh Ali, 2018, Intrusion Detection with OSSEC
  • [6] Ansari J.T., 2017, INT J ADV RES COMPUT, V8, P16
  • [7] Worldwide COVID-19 Vaccines Sentiment Analysis Through Twitter Content
    Ansari, Md Tarique Jamal
    Khan, Naseem Ahmad
    [J]. ELECTRONIC JOURNAL OF GENERAL MEDICINE, 2021, 18 (06):
  • [8] P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements
    Ansari, Md Tarique Jamal
    Baz, Abdullah
    Alhakami, Hosam
    Alhakami, Wajdi
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8287 - 8310
  • [9] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [10] A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
    Ansari, Md Tarique Jamal
    Al-Zahrani, Fahad Ahmed
    Pandey, Dhirendra
    Agrawal, Alka
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2020, 20 (01)