EconPapers    
Economics at your fingertips  
 

Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

Abdullah Alharbi, Adil Hussain Seh, Wael Alosaimi, Hashem Alyami, Alka Agrawal, Rajeev Kumar and Raees Ahmad Khan
Additional contact information
Abdullah Alharbi: Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Adil Hussain Seh: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
Wael Alosaimi: Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Hashem Alyami: Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Alka Agrawal: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
Rajeev Kumar: Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow 226028, India
Raees Ahmad Khan: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India

Sustainability, 2021, vol. 13, issue 22, 1-19

Abstract: Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.

Keywords: machine learning; cybersecurity; hesitant fuzzy logic; AHP-TOPSIS; idealness assessment; IDS (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2021
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2071-1050/13/22/12337/pdf (application/pdf)
https://www.mdpi.com/2071-1050/13/22/12337/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:13:y:2021:i:22:p:12337-:d:674829

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jsusta:v:13:y:2021:i:22:p:12337-:d:674829