Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Egypt.
School of IT and Systems, University of Canberra, Canberra, ACT 2601, Australia.
Sensors (Basel). 2022 May 29;22(11):4123. doi: 10.3390/s22114123.
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems' credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance.
网络攻击日益复杂,因此,入侵检测系统(IDS)的功能关注点越来越难以解决。如果检测不到漏洞,安全服务的可信度,如隐私保护、真实性和可访问性,可能会受到威胁。为了应对这些威胁,不同的组织目前使用各种策略、战略和技术来保护系统的可信度。保护措施包括制定规则和程序、提高用户意识、部署防火墙和验证系统、规范系统访问以及组建计算机问题管理小组。入侵检测系统的有效性尚未得到充分认可。IDS 用于企业检查技术环境中可能出现的有害趋势。对于需要考虑许多关键标准及其子方面的组织来说,确定有效的 IDS 是一项复杂的任务。为了处理这些多个且相互关联的标准及其子方面,应用了多准则决策(MCMD)方法。这些标准及其子方面也可能包含一些模糊性和不确定性,因此使用 q 阶对偶模糊集(q-ROFS)和 q 阶对偶模糊数(q-ROFNs)对其进行了处理。此外,还使用 q 阶对偶模糊加权几何(q-ROFWG)处理了结合专家和专家意见的问题。首先,应用熵方法评估关键标准及其子方面的优先级。然后,根据有效性和可靠性,应用组合妥协解(CoCoSo)方法对六个 IDS 进行评估。之后,进行了比较和敏感性分析,以确认所提出方法的稳定性、可靠性和性能。研究结果表明,大多数 IDS 似乎都是具有高潜力的系统。根据结果,Suricata 是一种基于多线程性能的最佳 IDS。