Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia.
PLoS One. 2024 May 14;19(5):e0302559. doi: 10.1371/journal.pone.0302559. eCollection 2024.
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks, complex and sophisticated strategies that challenge traditional security measures. This research provides a complete investigation of recent intrusion detection systems designed to mitigate the consequences of Gen V Multi-Vector Attacks. Using the Fuzzy Analytic Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), we evaluate the efficacy of several different intrusion detection techniques in adjusting to the dynamic nature of sophisticated cyber threats. The study offers an integrated analysis, taking into account criteria such as detection accuracy, adaptability, scalability, resource effect, response time, and automation. Fuzzy AHP is employed to establish priority weights for each factor, reflecting the nuanced nature of security assessments. Subsequently, TOPSIS is employed to rank the intrusion detection methods based on their overall performance. Our findings highlight the importance of behavioral analysis, threat intelligence integration, and dynamic threat modeling in enhancing detection accuracy and adaptability. Furthermore, considerations of resource impact, scalability, and efficient response mechanisms are crucial for sustaining effective defense against Gen V Multi-Vector Attacks. The integrated approach of Fuzzy AHP and TOPSIS presents a strong and adaptable strategy for decision-makers to manage the difficulties of evaluating intrusion detection techniques. This study adds to the ongoing discussion about cybersecurity by providing insights on the positive and negative aspects of existing intrusion detection systems in the context of developing cyber threats. The findings help organizations choose and execute intrusion detection technologies that are not only effective against existing attacks, but also adaptive to future concerns provided by Gen V Multi-Vector Attacks.
网络威胁的持续演变催生了第五代多向量攻击,这种复杂而精妙的策略对传统安全措施构成了挑战。本研究全面调查了最近设计的入侵检测系统,旨在减轻第五代多向量攻击的后果。我们使用模糊层次分析法(AHP)和逼近理想解的排序技术(TOPSIS),评估了几种不同入侵检测技术在适应复杂网络威胁的动态性质方面的效果。该研究考虑了检测精度、适应性、可扩展性、资源影响、响应时间和自动化等标准,进行了综合分析。模糊 AHP 用于为每个因素建立优先级权重,反映安全评估的细微差别。然后,使用 TOPSIS 根据整体性能对入侵检测方法进行排名。我们的研究结果强调了行为分析、威胁情报整合和动态威胁建模在提高检测精度和适应性方面的重要性。此外,考虑资源影响、可扩展性和高效响应机制对于维持对第五代多向量攻击的有效防御至关重要。模糊 AHP 和 TOPSIS 的综合方法为决策者提供了一种强大而适应性强的策略,以应对评估入侵检测技术的困难。本研究通过提供现有入侵检测系统在应对不断发展的网络威胁方面的优缺点的见解,为网络安全的持续讨论做出了贡献。研究结果有助于组织选择和执行不仅能有效应对现有攻击,而且能适应第五代多向量攻击带来的未来问题的入侵检测技术。