Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems
Abdullah Alharbi,
Adil Hussain Seh,
Wael Alosaimi,
Hashem Alyami,
Alka Agrawal,
Rajeev Kumar and
Raees Ahmad Khan
Additional contact information
Abdullah Alharbi: Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Adil Hussain Seh: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
Wael Alosaimi: Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Hashem Alyami: Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
Alka Agrawal: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
Rajeev Kumar: Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow 226028, India
Raees Ahmad Khan: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
Sustainability, 2021, vol. 13, issue 22, 1-19
Abstract:
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.
Keywords: machine learning; cybersecurity; hesitant fuzzy logic; AHP-TOPSIS; idealness assessment; IDS (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2021
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2071-1050/13/22/12337/pdf (application/pdf)
https://www.mdpi.com/2071-1050/13/22/12337/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:13:y:2021:i:22:p:12337-:d:674829
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().