
@Article{cmc.2022.025604,
AUTHOR = {Yoosef B. Abushark, Asif Irshad Khan, Fawaz Alsolami, Abdulmohsen Almalawi, Md Mottahir Alam, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan},
TITLE = {Cyber Security Analysis and Evaluation for Intrusion Detection Systems},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {72},
YEAR = {2022},
NUMBER = {1},
PAGES = {1765--1783},
URL = {http://www.techscience.com/cmc/v72n1/46942},
ISSN = {1546-2226},
ABSTRACT = {Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching information security. Anomaly detection, software vulnerability diagnosis, phishing page identification, denial of service assaults, and malware identification are the foremost cyber-security concerns that require efficient clarifications. Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns. In a similar vein, the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making (MCDM)-based Analytical Hierarchy Process (AHP) and a Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS). Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action. The projected work would support practitioners in identifying, prioritising, and selecting cybersecurity-related attributes for intrusion detection systems, allowing them to design more optimal and effective intrusion detection systems.},
DOI = {10.32604/cmc.2022.025604}
}



