Literature DB >> 35684744

An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions.

Mohamed Abdel-Basset1, Abduallah Gamal1, Karam M Sallam2, Ibrahim Elgendi2, Kumudu Munasinghe2, Abbas Jamalipour3.   

Abstract

Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems' credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance.

Entities:  

Keywords:  MCDM; cyber-attacks; intrusion-detection system; q-ROFWG; q-rung orthopair fuzzy sets

Mesh:

Year:  2022        PMID: 35684744      PMCID: PMC9185350          DOI: 10.3390/s22114123

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.847


1. Introduction

The continuous development of computer systems has led to the increasing dependence of companies, organizations, and people on computer networks in performing their functions and offering their services in modern ways [1]. However, at the same time, it has become vulnerable to penetration by attackers with the aim of making illegal gains by exploiting some security vulnerabilities, which led to an increase in interest in issues of protection and security of these systems. Today there are many methods used within this field, and there are many intrusion-detection systems (IDSs) available [2]. IDSs are a necessity for the stability of an organization’s normal system performance. In this regard, traditional intrusion-detection techniques are highly unrewarding and ineffective due to the multiplicity of attack methods and their different forms. Among the traditional methods used previously are obfuscation, transformation, and polymorphism techniques, which lead to malware resistance [3]. Despite the prominent role it plays, it still has some shortcomings. Therefore, there was a need to continue conducting research on intrusion-detection systems in order to reach an optimal structure that achieves a high protection rate. The internet changed the concept of computing as we know it. The possibilities and opportunities available became unlimited, and with it, the risks and opportunities for breakthroughs increased. Computer security primarily focuses on protecting a specific source or valuable data and information within a single computer device. Security is defined as the reaction taken to security threats resulting from a harmful act by some people. The value of the data can be violated in three ways: privacy, integrity, and availability of information [4]. Computer protection is generally referred to by the term CIA, which is represented by the following three concepts: Confidentiality: Preventing unauthorized persons from disclosing or accessing information; i.e., accessing information only by authorized persons. Integrity: Maintaining information integrity by preventing unauthorized modification. Availability: It is the ability of a computer to work and provide the resources and services expected of it to legitimate people upon request. Network security includes all actions or activities taken by organizations and companies in order to protect resources and ensure the integrity and continuity of operations across networks [5]. Security policies also define the permissions available to users in the way they use network components and resources. In order to build an effective network-protection strategy, all potential security threats must be identified, and then the most effective set of tools to combat them must be selected [6]. Preventing all exploits for vulnerabilities in networks and systems is not possible [7]. Network protection is achieved through the use of a set of components at several levels, with the aim of protecting organizations from internal attacks and external attacks as much as possible. A firewall is a component that achieves the most basic level of protection but is not sufficient on its own. Designing and implementing a completely secure system is very difficult in practice, but it is possible to detect intrusions and take appropriate measures to protect against them. This is what the IDS basically does, as it is used as an alert system, within the security and protection system, that gives an alert when it detects an attempt by someone to penetrate the computer system or network [8]. As a result, IDSs are important in a network security solution. The primary goal of IDSs is to detect an intrusion while it is occurring rather than after it has ended, and then alert the person responsible for the problem by sending an email or setting off an alert. It must be able to take any action to minimize harm to the system due to the hack. The second goal is to collect data from the system, record all important events, and determine the source of the attack, and these data are used for legal purposes as evidence or proof against the attacker. IDSs must be placed in strategic places so that they are able to see network traffic in order to analyze it and thus achieve the maximum benefit from it [9]. In this regard, several ways to classify IDSs are described using different analysis and control methods. The most common way to classify intrusion-detection systems is to group them according to the location of the information source. Basic information sources are network packets captured from a network backbone or local network segments, operating systems, and critical files. Intrusion-detection systems can be classified into host-based detection-intrusion systems, network-based intrusion-detection systems, and hybrid systems. On the user’s computer, a host-based intrusion-detection system (HIDS) is installed. HIDSs operate on information collected from within a single computer system [10]. HIDSs employ monitoring sensors, also called clients, on each host to be monitored. In general, the most common forms of information sources for HIDSs are operating system audit logs, system logs, and critical system files [10]. The customer checks these sources for unauthorized changes or patterns of suspicious activity. This allows HIDSs to reliably analyze activities, accurately identifying which users and which processes are participating in a specific attack on the operating system. The most common form of IDSs is network-based intrusion-detection systems (NIDSs) [11]; also, most companies and organizations are often supported by NIDSs along with firewalls. These systems detect attacks by capturing and analyzing network packets by listening to network segments or switches [11]. In this case, the system is placed on an entire network segment and not on a single device within the network, or it is placed to monitor a gateway on the switch. Thus, it can monitor all mobile packets between groups of computers connected to the network, by matching one or more packets with the database of signatures of attacks, or by analyzing the traffic to detect anomalies. NIDSs can be taken advantage of by placing it outside of firewalls, thus alerting the responsible person to incoming packets that might circumvent the firewall. Both HIDSs and NIDSs have strengths and benefits that complement each other [12]. Figure 1 introduces the general architecture of an HIDS and NIDS. The next generation of IDSs must combine the two technologies in order to improve the network’s resistance to attacks and abuse. In addition, they should enhance security policy and provide greater flexibility in application and deployment options. A hybrid IDS is a mixture of an HIDS and NIDS. It provides a combination of the strengths of the two methods. Their modus operandi varies from product to product, making it difficult to define and determine hybrid intrusion systems in a more accurate manner.
Figure 1

Comparison of the HIDS and NIDS structure [23].

Afterward, detection methods are the basis of intrusion-detection techniques, which are the engine in detecting the malicious activities of the information source. Detection methods analyze the information they monitor and trigger alerts if malicious traffic is detected. Accordingly, IDSs can be categorized, according to the detection methods used, into anomaly-based intrusion-detection systems (AIDSs) [13] and signature-based intrusion-detection systems (SIDSs) [14]. In this regard, AIDSs operate on the assumption that malicious events are different from normal actions, and thus the differences are sought to detect the attack. These systems constitute profiles of historical data collected during a period of normal operation. It then collects event data to determine when the monitored activity deviates from normal behavior and triggers an alarm. SIDSs also are called signature-based detection because alerts are generated based on the signatures of specific attacks. This type of signature attack involves specific traffic or activity based on known hacking activity. It is also called misuse-based detection. The basic premise is the model that has been written to describe bad behavior, after which the system compares the sequence of information with this model to decide what is normal and what is malicious. These systems are accurate and emit fewer false alarms, but they do not detect a hack unless there is a predetermined model for it. Nowadays, Internet networks are vulnerable to a wide range of threats and attacks, such as impersonation, privilege breaches, data loss, altered and fraudulent data units, and denial of connections [15]. Therefore, IDSs have an essential task to protect the normal system performance of an organization. It is, therefore, necessary to add new security requirements and additional networking measures to the network security requirements [16]. IDSs must constantly change and adapt to all these new threats and assault technologies. Therefore, the process of determining the best IDS for network protection, threat warning, and cyber-attacks is a very difficult task in light of the various criteria on which an IDS is developed. Thus, IDSs should not be chosen to quickly secure the network without a thorough understanding of the technology, solutions, and potential consequences. In this study, a set of criteria were adopted to evaluate IDSs according to previous studies and expert opinions. The criteria that have been adopted were divided into four basic criteria—protected system, audit source location, alerts, and types—and each main criterion includes several sub-aspects. The set of sub-aspects are as follows: HIDS, NIDS, hybrids, host log files, network packets, application log files, IDS sensor application, network, host, open-source, closed source, and freeware. In order to solve such complex problems related to the evaluation of IDSs, multi-criteria decision-making (MCDM) has been proven to be one of the best tools for the effective evaluation of IDS [16]. MCDM is popular in complex problems because it enables the decision-maker to take care of all the available criteria and take an appropriate decision as per the priority [17]. Since the ideal choice is governed by multiple criteria, a good decision-maker, in certain situations, may look for criteria of high impact on which to focus. Consequently, due to the assessment of IDSs under multiple criteria and a pluralistic viewpoint, the assessment process is tainted by ambiguity and uncertainty, which is difficult to deal with in real numbers. Hence, the q-rung orthopair fuzzy sets (q-ROFSs) theory has been applied to deal with such complex problems [18]. The q-ROFS proved to be effective in solving ambiguous and uncertain problems as it came as a generalization of the intuitionistic fuzzy sets (IFSs) [19] and Pythagorean fuzzy sets (PFSs) theories [20]. Finally, to deal with the problem of evaluating the effectiveness of IDSs, a hybrid approach consisting of two multi-criteria decision-making methods, the entropy method [21] and the combined compromised solution (CoCoSo) method [22], was adopted. The proposed hybrid approach is presented under the q-rung orthopair fuzzy environment and by utilizing the q-rung orthopair fuzzy numbers (q-ROFNs) numbers. Firstly, the entropy method was adopted to evaluate the main and sub-aspects and to determine the final weights. Secondly, the CoCoSo method was applied to evaluate the available alternatives and determine the best alternative. The main contributions of this study can be listed as follows: (i) a novel hybrid MCDM approach is proposed for the evaluation of the IDS; (ii) this hybrid MCDM approach is named q-ROF entropy-CoCoSo, which give assessments of subjective and impartial expert insights; (iii) the q-ROFSs method is conducted to handle the uncertainty in experts’ evaluations; (iv) a q-ROF entropy is utilized to compute the criteria weights; and (v) a q-ROF CoCoSo is suggested to evaluate the selected IDSs. The article is organized as follows: Section 2 highlights the IDS and insights into MCDM; Section 3 introduces some preliminaries of q-ROFS and the proposed research approach; Section 4 illustrates the application of the MCDM approach in evaluating the IDS and discussion; and Section 5 contains the conclusions. Comparison of the HIDS and NIDS structure [23].

2. Background Information

This section provides basic knowledge about IDSs to enable a deeper understanding of this topic; also, some basic information related to MCDM is presented. Afterward, some studies related to q-ROF theory are introduced. Alyami et al. presented a study based on a hybrid MCDM approach consisting of the fuzzy analytical hierarchy process (AHP) and the fuzzy technique for order performance by similarity to ideal solution (TOPSIS) to evaluate the effectiveness of the IDSs [16]. In their study, they used four main criteria and thirteen sub-aspects to evaluate five IDSs. Their results indicate that Suricata is the most effective IDS. Their results also indicate that most of the IDSs that were evaluated in the study are effective and close in their results. Abushark et al. developed a study to evaluate the optimization of machine learning-based IDSs using a hybrid MCDM approach that comprises the AHP and TOPSIS in a fuzzy environment [24]. Their findings aim to identify attributes related to cyber security, allowing the design of more effective and efficient IDSs. Al-Harbi et al. presented a study for an optimal evaluation of machine learning-based IDSs using a hybrid MCDM model that includes AHP and TOPSIS under hesitant fuzzy conditions [8]. Their findings aim to identify features related to cyber security, allowing the design of more effective and IDSs. Almotiri presented an evaluation system to detect malicious traffic based on system performance [25]. They adopted an MCDM approach consisting of AHP–TOPSIS methods to rank the impact of alternatives according to their overall performance. Their study aims to be a reference for practitioners working in the field of evaluating and selecting the most effective traffic detection approach. Afterward, some studies related to MCDM approaches and their applications in different fields were presented. Sharma and Kaul presented a study to deal with network performance delays and disruptions due to cluster-based communications that place a significant burden on the cluster head (CH) [26]. They used an MCDM approach including two AHP–TOPSIS methods to reduce the overburden on a single CH through a multi-CH scheme. Ogundoyin and Kamil presented a study to address security and privacy issues where fog servers can be used to process private and respond to time-sensitive information [27]. They applied the fuzzy AHP MCDM approach to determine and prioritize confidence parameters in fog computing. Their results indicate that quality of service is the best priority parameter that a service requester can use to evaluate the trusted standard of a service provider. Kumar et al. introduced a study to evaluate the impact of various malware analysis methods on the perspective of web applications [28]. They applied an MCDM approach that comprises AHP and TOPSIS methods under a fuzzy environment. Their results indicate that reverse engineering is the most effective method for analyzing complex malware. There are many theories dealing with uncertainty, including the q-ROFS theory. Thus, we present some related studies as follows. Duane et al. introduced a study to deal with risks in information sharing and software piracy, which poses a threat to any system [29]. They applied the q-rung orthopair double hierarchy linguistic term set (q-RODHLTS) in the MCDM process. To prove the validity of their results, they applied the proposed approach to many information security systems. Panetikul et al. presented a study to analyze computer security threat analysis and control under a q-ROF environment [30]. They applied an approach based on the combination of the Heronian mean (HM) operator with complex q-ROFS is to initiate the complex q-rung orthopair fuzzy HM (Cq-ROFHM) operator. To prove the reliability and efficiency of the techniques used, some illustrative examples are introduced. Cheng et al. presented a study for evaluating sustainable enterprise risk management in manufacturing small and medium-sized enterprises [31]. They adopted a new extended Vlse Kriterijumska Optimizacija Kompromisno Resenje (VIKOR) approach using q-ROFSs. Peng et al. introduced a study for presenting a new score function of q-ROFN for solving the failure issues when comparing two q-ROFNs [32]. Finally, given the importance of IDSs and the importance of implementing them in a manner appropriate to their specific situation, choosing the most effective and appropriate one is a great challenge. Hence, there is an urgent and great need to evaluate IDSs. In this regard, a set of main and sub-criteria affecting the selection of the most effective IDS is identified; also, a set of alternatives are identified to be evaluated according to these criteria, using an MCDM approach and under a q-ROF environment.

3. Proposed Research Approach

3.1. Prelimianries

In this section, we list some concepts, procedures, and fundamental definitions related to IFSs, PFSs, and q-ROFSs.

3.1.1. Intuitionistic Fuzzy Sets

Atanassov developed IFSs as an extension of fuzzy set theory in 1986. IFSs are distinguished by the grade of membership and the grade of non-membership when their total is 1 or less than 1. It is explained as stated in Definition 1 [19]. Let be in where the function : and : , with the condition that The grade of hesitancy is computed as follows: Let = ( , ) and = ( , ) be two intuitionistic fuzzy numbers (IFNs), then the addition and multiplication operations on these two IFNs as follows:

3.1.2. Pythagorean Fuzzy Sets

Yager developed PFSs as an extension of the IFSs [20]. They are distinguished by two membership grades termed as membership and non-membership. The total membership and non-membership grades in PFSs are unlike in IFSs. In PFSs, the membership and non-membership grade may be more than 1, but the total of their squares has to be at most 1. It is explained as stated in Definition 3. Let be in where the function : to the sets and : to the sets , with the condition that The grade of uncertainty is computed as follows: Let = ( , ) and = ( , ) be two Pythagorean fuzzy numbers (PFNs), then the addition and multiplication operations on these two PFNs as follows:

3.1.3. Q-Rung Orthopair Fuzzy Sets

Yager presented q-ROFSs in 2018 with the grade of membership and non-membership. In q-ROFSs, the total of the qth power of the membership and non-membership grades should be at most equal to 1 [18]. In Figure 2, it is readily noted that q-ROFSs have a reasonable membership degree extent greater than that of the IFSs and PFSs. q-ROFSs are explained as stated in Definition 5.
Figure 2

Comparison of the geometric area of various fuzzy membership degrees: IFNs, PFNs, and q-ROFNs.

A q-ROFS in a finite universe of discourse = , , …, is defined by Yager as follows [ where the function : to the sets and : to the sets , with the condition that The grade of uncertainty is computed as follows Let = ( , ), = ( , ), = ( , ), be three q-ROFNs, then their procedures can be well-defined as follows [ Let = ( , ) be a q-ROFN; the score function S( ) of can be expressed as in [ ) of can be well defined, as in [ Let=(i = 1, 2, … n) be set of q-ROFNs and Ⱳ =be weight vector ofwith= 1 and [0, 1]. Q-rung orthopair fuzzy weighted average (q-ROFWA) and q-rung orthopair fuzzy weighted geometric (q-ROFWG) operators can be expressed as in [ Darko and Liang developed an operator named the weighted q-rung orthopair fuzzy Hamacher average (Wq-ROFHA) [35] as in Equations (24) and (25). Let = (i = 1, 2, … n) be set of q-ROFNs and Ⱳ = be a weight vector of with = 1 and   [0, 1]. where > 0, q ≥ 0. Darko and Liang presented an operator named the weighted q-rung orthopair fuzzy Hamacher geometric mean (Wq-ROFHGM) [Let= (i = 1, 2, … n) be set of q-ROFNs andⱲ=be the weight vector ofwith= 1 and [0, 1].where > 0, q ≥ 0.

3.2. Suggested Approach

In this part, a sequential multi-step approach is presented to evaluate several intrusion-detection systems by combining two MCDM methods, namely, Entropy-CoCoSo. The proposed approach was performed under the q-rung orthopair fuzzy environment and by using q-ROFNs. The proposed approach was divided into three main parts. The data aggregation part includes identifying experts, selecting the criteria used, and determining the IDSs alternatives available. Then, the criteria evaluation part assesses the selected criteria using the q-ROF Entropy method. After that, the alternatives evaluation part assesses the available IDSs using the q-ROF CoCoSo method. The steps of the proposed approach are shown in Figure 3. Consequently, the steps of the suggested approach used are presented in detail as follows:
Figure 3

Decision framework for IDS evaluation.

. The problem was studied and its main and sub-aspects were identified. The basic criteria for selecting the participating experts also were established. The criteria for selecting experts were determined as follows: the participants should have sufficient experience in the field of cyber security and the field of information security in general; also, their experience in the field of information security should not be less than 10 years. In addition, the participants should have practical experience in the field of information security technology and in the academic field. Next, the number of experts () participating in the study was considered. After that, the participating experts were divided into several groups and the appropriate weight for each group was determined according to the measure of experience. Finally, the most appropriate means of communication with the participating experts were determined. . The main criteria and their sub-aspects used in the study were determined based on an analysis of the relevant literature, as well as insight from the participating experts. = , with j = 1, 2…n. Let Ⱳ = be the vector set utilized for determining the criteria weights, where > 0 and = 1. . After studying the problem and its details and identifying the most important criteria, the available alternatives were determined to be used in the study. After that, experts’ opinions were taken on the selected alternatives and a final list of alternatives to be used in the evaluation process was prepared. The set = , having i = 1, 2,..,m alternatives, was evaluated by n decision criteria of set = , with j = 1, 2, …, n. . After defining the main criteria and their sub-aspects and adopting a set of final alternatives, all these aspects were organized in the form of a hierarchical structure. This hierarchy shows the main objective of the problem, the criteria used, and the alternatives determined. .Verbal variants and their equivalent q-ROFNs were identified. These variables were used in the evaluation process to assist the participating experts. These variants were divided into two parts in the same table. The first part refers to the variables that are used in evaluating the main criteria and their sub-aspects. The second part refers to the variables that are used in evaluating the available alternatives, as shown in Table 1.
Table 1

Verbal variables and their corresponding q-ROFNs for the weighting criteria and ranking alternatives.

Verbal Variables for CriteriaAbbreviations for CriteriaVerbal Variables for AlternativesAbbreviations for Alternativesq-ROFNs
μʋ
Extremely poorELPExtremely lowEXO0.110.99
Very poorVPOVery lowVLO0.220.88
PoorPOOLowLLO0.330.77
Medium poorMDPMedium lowMEL0.440.66
FairFARMediumMED0.550.55
Medium goodMDGMedium highMEH0.660.44
GoodGOOHighHGH0.770.33
Very goodVGOVery highVEH0.880.22
Extremely goodEXGExtremely highEXH0.990.11
. Build the q-ROF decision matrices, , according to experts’ preferences () to evaluate the criteria by each expert using verbal variables in Table 1, and then by using q-rung orthopair fuzzy scale q-ROFNs, as shown in Table 2.
Table 2

The evaluation matrix for criteria based on q-ROFN with respect to experts.

CriteriaExperts
Ex1 Ex2 Ex3 Ex4
C1 [μ1Ex1 ,ʋ1Ex1] [μ1Ex2 ,ʋ1Ex2] [μ1Ex3 ,ʋ1Ex3] [μ1Ex4 ,ʋ1Ex4]
C2 [μ2Ex1 ,ʋ2Ex1] [μ2Ex2 ,ʋ2Ex2] [μ2Ex3 ,ʋ2Ex3] [μ2Ex4 ,ʋ2Ex4]
Cn [μnEx1 ,ʋnEx1] [μnEx2 ,ʋnEx2] [μnEx3 ,ʋnEx3] [μnEx4 ,ʋnEx4]
. Aggregate the evaluations on criteria weights. The individual expert evaluations are collected by using q−ROFWG given in Equation (23). Here , presents the q-ROF weight of the jth criterion. . The steps of the entropy method based on q-ROFSs are applied to evaluate and weight the main criteria and their sub-aspects [36]. Compute the entropy values of each q-ROFN of the aggregated experts’ evaluations by applying Equations (28) and (29). . The main criteria weights are calculated based on the entropy values using Equation (30). where = refers to the q-ROF entropy value. . In the same way, the weights of the sub-aspects of the main criteria are calculated as in Steps 6–9. . A q-ROF evaluation decision matrix () is generated by each expert (EX) individually among the selected sub-aspects and alternatives to determine the best intrusion-detection system through the use of verbal variables, as shown in Table 1, and then by using the q-ROFNs in Table 1, as shown in Table 3. Here, = , in which = is created by applying the verbal variables in Table 1. Consequently, refers the performance of intrusion-detection systems (alternatives) according to criteria of the expert.
Table 3

Decision evaluation matrix for alternatives in terms of criteria based on q-ROFN.

CriteriaAlternatives (Intrusion-Detection Systems)
A1 A2 Am
C1 [μ11Ex ,ʋ11Ex] [μ12Ex ,ʋ12Ex] [μ1mEx ,ʋ1mEx]
C2 [μ21Ex ,ʋ21Ex] [μ22Ex ,ʋ22Ex] [μ2mEx ,ʋ2mEx]
Cn [μn1Ex ,ʋn1Ex] [μn2Ex ,ʋn2Ex] [μnmEx ,ʋnmEx]
. After the q-ROF evaluation decision matrix () is generated by each expert (EX) between the sub-aspects and the available alternatives by all experts, the q-ROF evaluation decision matrices () were aggregated into one matrix by utilizing q−ROFWG, as presented in Equation (23). A combined q-ROF evaluation decision matrix () was created as in Table 4. Accordingly, = in which = is utilized to refer to the combined q-ROFN of the ith substitute with regard to the jth criteria.
Table 4

Combined evaluation matrix for alternatives in terms of the criteria based on q-ROFN.

CriteriaAlternatives (Intrusion-Detection Systems)
A1 A2 Am
C1 [μ11 ,ʋ11] [μ12 ,ʋ12] [μ1m ,ʋ1m]
C2 [μ21 ,ʋ21] [μ22 ,ʋ22] [μ2m ,ʋ2m]
Cn [μn1 ,ʋn1] [μn2 ,ʋn2] [μnm ,ʋnm]
. Compute the normalized aggregated q-ROF evaluation decision matrix () by applying Equation (31). where refers to the set of benefit criteria and refers to the set of cost criteria. . Calculate the total of the weighted comparability arrangement () for all substitutes by applying the Wq-ROFHA operator as presented in Equations (24) and (25). . Calculate the full of the power weight () of comparability arrangements for all substitutes by applying the Wq-ROFHGM operator as exhibited in Equations (26) and (27). . Determine the score values of the substitutes by applying the values of values of the Wq-ROFHA and Wq-ROFHGM operators for each substitute by applying Equation (20). . Calculate the proportional weight of the substitutes with the assistance of Equations (32)–(34). where refers to the arithmetic mean of sums of the weighted sum method (WSM) and weighted product model (WPM) scores. Then, indicates the sum of proportional scores of WSM and WPM. also refers to the stable adjustment of the WSM and WPM models scores. . Determine the evaluation values () of the substitutes by applying Equation (35). Then, rank the available intrusion-detection systems according to the most possible value of the evaluation values ().

4. Empirical Results and Interpretation

In this section, the steps of the proposed multistep hybrid MCDM approach consisting of Entropy-CoCoSo methods are applied to evaluate the efficiency and reliability of some IDSs. The proposed approach was applied under the q-rung orthopair fuzzy environment and by using q-ROFNs. In this regard, the process of evaluating intrusion-detection systems and selecting the most effective and reliable one is necessary and inevitable in light of the recent cyber-attacks and intrusion methods. In this regard, the intrusion-detection systems are revealed in the next sub-section.

4.1. Description of Intrusion-Detection Systems

In this subsection, a brief description of the intrusion-detection systems are considered; also, Figure 4 demonstrates the general structure of the network and IDS.
Figure 4

The general structure of the network and IDS.

Suricata (): Suricata was developed by the Open Information Security Foundation in 2010. Suricata is the main alternative to Snort because the design of Suricata is very close to that of Snort [37]. Suricata has an advantage over Snort, which is that it collects data at the application layer. Suricata consists of so-called threads, thread units, and queues. Suricata is a multi-threaded program, so there will be multiple threads running at the same time [37]. Thread units are divided according to functions; for example, one unit is used to analyze data packets, and the other unit is used to discover data packets. Each data packet can be processed by several different threads, and the queue is used to transfer the data packet from one thread to another. At the same time, a thread can contain several thread units, but only one unit runs at a given time. Zeek (): Zeek (previously known as Bro until 2019) is a network intrusion-detection system that is compatible with Linux, Unix, and Mac OS [38]. Zeek uses network-based intrusion-detection methods by tracking the network and searching for malicious activities. The Zeek intrusion detection function is realized in two stages: traffic logging, and analysis. As with Suricata, Zeek has a significant advantage over Snort in that its analysis runs at the application layer, resulting in a broader analysis of network protocol activity. Security onion (): Security Onion is a Linux-based IDS that is a mixture of several IDS that are both HIDS and NIDS solutions [16]. Although Security Onion is classified as NIDS, it includes HIDS functionality as well. It monitors log and configuration files for suspicious activity and checks those files for any unexpected changes. One of the downsides to Security Onion’s comprehensive network monitoring system is its complexity. Thus, the Security Onion analysis engine is where things get complicated because there are so many different tools with different operating procedures that most of them may end up being overlooked. Snort (): Snort is a Linux-based lightweight cross-platform network intrusion-detection system that can be used to monitor TCP/IP networks [39]. Snort is easy to deploy and can be configured to monitor network traffic for intrusion attempts, log intrusion behavior, and perform specific actions when intrusion attempts are detected. It is one of the most widely deployed IDS tools and can also be used as an intrusion-prevention system. Snort can be traced back to 1998, and there are still no signs of disappearing. There are some active communities that offer good help and support. The high level of personalization that Snort provides makes it a good choice for many different organizations. Wazuh (): Wazuh is an IDS used to detect security and monitor compliance with security rules. Wazuh is an open-source intrusion-detection system project. It was developed as a fork part of OSSEC HIDS and was later integrated with Elastic Stack and Opens CAP. It relies on a cross-platform approach that redirects system data such as log messages, file tables, and detected anomalies to a central manager, where it is further analyzed and processed, resulting in security alerts. It monitors the file system and identifies changes in content, permissions, ownership, and file properties that need to be monitored. It monitors configuration files to ensure that they comply with security policies, standards, or hardening guides. OSSEC (): OSSEC is an open source IDS developed by Daniel B. Cid, who had sold the system to Trend Micro in 2008 [39]. Its detection methods are based on checking log files, making it a host-based IDS. OSSEC works on Unix, Linux, Mac OS, and Windows. There is no front end for this tool, but you can connect with Kibana or Graylog. OSSEC disclosure rules are called ‘Policies’. You can write your own policies or get packages of them for free from the user community. It is also possible to define actions that should be performed automatically when specific warnings appear.

4.2. Application of the Proposed Approach

In this sub-section, the steps for evaluating the selected intrusion-detection systems through the Entropy-CoCoSo approach are presented as follows: . Initially, a set of standards was identified to select the experts involved with the researchers in the study to evaluate the IDSs. The standards were as follows: the number of years of experience should not be less than 10 years in the field of cyber security and the field of information security in general; also, the scientific degree of the participating experts must not be lower than M.Sc. Accordingly, 60 experts were selected to participate in the IDSs evaluation process. After that, the participating experts were divided into four groups. Each group included a certain number of experts. The first and fourth groups included 12 experts. Whereas, the second and third groups included 18 experts. Accordingly, the appropriate weight was assigned to each group according to the years of experience and the number of experts. So, the first, second, third, and fourth groups had weights of 0.20, 0.30, 0.30, and 0.20, respectively. In addition, a leader was assigned to each group to express the final opinion in the evaluation process. Finally, the experts were contacted online. . Based on the literature analysis and expert review, a set of main and sub-criteria were defined to evaluate the effectiveness and reliability of the IDSs. Initially, four main criteria were defined, which are as follows: protected system, ; audit source location, ; targets, ; and types, . The main criteria also contained several sub-criteria, as follows: HIDS (), NIDS (), hybrids (), host log files (), network packets (), application log files (), IDS sensors alerts (), applications (), network (), host (), open source (), closed source (), and freeware (). . A definitive list of available IDSs for use was prepared, as follows: Suricata (), Zeek (), Security onion (), Snort (), Wazuh (), and OSSEC (). . A final hierarchical form of the problem was prepared, defining the main objective of the study, which was to evaluate the effectiveness of several IDSs, as shown in Figure 5; this in addition to regulating the relationship between the basic criteria and their sub-aspects, with the IDSs used as alternatives.
Figure 5

The hierarchy structure of the problem.

. A set of verbal variants and their equivalent q-ROFNs were prepared by reviewing the previous literature and expert opinions. Verbal variants were divided into two parts. The first part of the verbal variants is presented in Table 1, to assess the main criteria and their sub-aspects. The second part of the verbal variants is presented in Table 1, to evaluate the alternatives used. . The decision matrix was built with the help of Table 2 by the four experts to assess the main criteria using the verbal variables as shown in Table 5.
Table 5

Verbal evaluations of the main criteria by each expert and the aggregated main criteria weights.

Main Criteria Ex1 Ex2 Ex3 Ex4 Aggregated Results KEq, ij (x) ENq, ij (x) j j
PSC1 GOOVGOEXGVGO[0.887, 0.253]0.5495760.4504240.1660670.278
ASC2 FARMDGMDGGOO[0.656, 0.461]0.1331210.8668790.3196100.226
TGC3 GOOVGOVGOVGO[0.856, 0.260]0.4601830.5398170.1990250.266
TPC4 MDGPOOVGOMDP[0.538, 0.651]0.1448200.8551800.3152960.230
. Individual expert evaluations of the main criteria were compiled using a q-ROFWG operator in Equation (23), and using the weights assigned to the four experts, namely, 0.2, 0.3, 0.3, and 0.2, respectively, as exhibited in Table 5. The parameter was determined in a discretionary manner to reflect the position of the experts in terms of optimism and pessimism. In this case, q = 5 was introduced for a stronger illustration of the uncertainty. The entropy method was applied to calculate the entropy values for each q-ROFN from the aggregated experts’ evaluations by applying Equations (28) and (29), as shown in Table 5. The weights of the main criteria were calculated based on the entropy values using Equation (30), as presented in Table 5. Likewise, the weights of the sub-aspects of the main criteria were calculated, as presented in Table 6, Table 7, Table 8 and Table 9. Accordingly, the global weights of the sub-aspects were calculated, as in Table 10.
Table 6

Verbal evaluations of the protected system’s criteria and aggregated main criteria weights.

Sub-Criteria Ex1 Ex2 Ex3 Ex4 Aggregated Results KEq, ij(x) ENq, ij(x) j j
HIC1_1 MDPFARVPOEXG[0.449, 0.748]0.2437940.7562060.3603310.319
NIC1_2 ELPVGOMDPMDG[0.445, 0.862]0.4848830.5151170.2454520.377
HYC1_3 VGOGOOGOOPOO[0.667, 0.576]0.1726810.8273190.3942160.304
Table 7

Verbal evaluations of the audit source location’s criteria and aggregated main criteria weights.

Sub-Criteria Ex1 Ex2 Ex3 Ex4 Aggregated Results KEq, ij(x) ENq, ij(x) j j
HLC2_1 VPOEXGMDPFAR[0.510, 0.922]0.6841800.3158200.1515570.282
NPC2_2 ELPVGOMDPMDG[0.445, 0.862]0.4848830.5151170.2471970.251
ALC2_3 VGOMDGMDGPOO[0.609, 0.588]0.1335880.8664120.4157790.196
ISC2_4 VGOMDPELPMDG[0.361, 0.906]0.6135250.3864750.1854640.271
Table 8

Verbal evaluations of the targets’ criteria and aggregated main criteria weights.

Sub-Criteria Ex1 Ex2 Ex3 Ex4 Aggregated Results KEq, ij(x) ENq, ij(x) j j
APC3_1 FARMDGMDGGOO[0.656, 0.461]0.1331210.8668790.4313770.284
NEC3_2 VGOMDPELPMDG[0.361, 0.906]0.6135250.3864750.1923180.404
HOC3_3 MDPFARVPOEXG[0.449, 0.748]0.2437940.7562060.3763040.312
Table 9

Verbal evaluations of the types’ criteria and aggregated main criteria weights.

Sub-Criteria Ex1 Ex2 Ex3 Ex4 Aggregated Results KEq, ij(x) ENq, ij(x) j j
OSC4_1 MDPFARVPOGOO[0.427, 0.748]0.2415680.7584320.3562830.322
CSC4_2 MDGPOOVGOMDP[0.538, 0.651]0.1448200.8551800.4017320.299
FRC4_3 ELPVGOMDPMDG[0.445, 0.862]0.4848830.5151170.2419830.379
Table 10

The global weights of the sub criteria for evaluating intrusion-detection systems.

Main Criteria PSC1 (0.278) ASC2 (0.226)
Sub-criteria HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4
Local weights0.3190.3770.3040.2820.2510.1960.271
Global weights0.0890.1050.0850.0640.0560.0450.061
Main Criteria TGC3 (0.266) TPC4 (0.230)
Sub-criteria APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
Local weights0.2840.4040.3120.3220.2990.379
Global weights0.0750.1070.0830.0740.0690.087
An evaluation decision matrix was established to evaluate the IDSs according to the sub-aspects by the four experts and with the assistance of Table 3, as presented in Table 11.
Table 11

Evaluations of the IDSs in terms of criteria.

IDS Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS1 Ex1 VEHVEHVEHVEHMEHMEHHGHHGHHGHVLOVLOVLOHGH
Ex2 VEHVEHVEHHGHVEHHGHHGHVEHVEHMELHGHHGHMED
Ex3 HGHHGHHGHHGHHGHHGHHGHVEHVEHMEDMELMELMED
Ex4 HGHHGHHGHVEHEXHHGHHGHEXHVEHHGHVLOHGHMED
Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS2 Ex1 HGHLLOEXOVEHLLOMELHGHVEHVEHVLOVLOVLOVEH
Ex2 VEHLLOEXOHGHHGHMEHVEHVEHVEHMELHGHHGHVLO
Ex3 HGHLLOEXOHGHMELMEDHGHVEHVEHMEDMELMELMED
Ex4 HGHLLOEXOEXHVEHMEDHGHEXHVEHHGHVLOHGHLLO
Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS3 Ex1 HGHVEHVEHVEHHGHMEDHGHVEHMELVLOVLOVLOEXO
Ex2 VEHVEHVEHHGHEXHVEHVEHVEHMELMELHGHHGHEXO
Ex3 HGHHGHHGHHGHVEHMEHHGHVEHMELMEDMELMELEXO
Ex4 HGHHGHHGHVEHEXHHGHHGHVEHMELHGHVLOHGHEXO
Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS4 Ex1 VEHVEHVEHVEHLLOMELHGHHGHMEDVLOVLOVLOMEL
Ex2 VEHVEHVEHHGHHGHMEHVEHHGHMEDMELHGHHGHMEL
Ex3 HGHHGHHGHHGHMELMEDHGHHGHMEDMEDMELMELMEL
Ex4 HGHHGHHGHEXHVEHMEDHGHHGHMEDHGHVLOHGHMEL
Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS5 Ex1 HGHVEHVLOVEHHGHMEDHGHVLOVEHVLOVLOVLOHGH
Ex2 VEHVEHHGHHGHEXHVEHVEHVLOVEHMELHGHHGHMED
Ex3 HGHHGHMELHGHVEHMEHHGHVLOVEHMEDMELMELMED
Ex4 HGHHGHVLOVEHEXHHGHHGHVLOVEHHGHVLOHGHMED
Exs HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4 APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS6 Ex1 HGHVEHVEHVEHHGHMEDHGHVEHMEHVLOVLOVLOVLO
Ex2 VEHVEHVEHHGHEXHVEHVEHVEHMEHMELHGHHGHVLO
Ex3 HGHHGHHGHHGHVEHMEHHGHVEHMEHMEDMELMELVLO
Ex4 HGHHGH HGHVEHEXHHGHHGHVEH MEHHGHVLOHGHVLO
. Individual expert evaluations of the alternatives between the sub-aspects and the available alternatives were compiled using the q-ROFWG operator in Equation (23), and using the weights assigned to the four experts, namely, 0.2, 0.3, 0.3, and 0.2, respectively, as exhibited in Table 12. The parameter also was determined in a discretionary manner to reflect the position of the experts in terms of optimism and pessimism. In this case, q = 5 and =1 were introduced for a stronger illustration of the uncertainty.
Table 12

The aggregated evaluations matrix of the IDSs.

IDS HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4
IDS1 [0.823, 0.295][0.823, 0.295][0.823, 0.295][0.823, 0.295][0.817, 0.342][0.747, 0.365][0.770, 0.330]
IDS2 [0.801, 0.318][0.330, 0.770][0.110, 0.990][0.832, 0.301][0.564, 0.630][0.555, 0.562][0.801, 0.311]
IDS3 [0.801, 0.318][0.823, 0.295][0.823, 0.295][0.832, 0.301][0.909, 0.248][0.715, 0.438][0.801, 0.311]
IDS4 [0.823, 0.295][0.823, 0.295][0.823, 0.295][0.832, 0.301][0.817, 0.342][0.555, 0.562][0.801, 0.311]
IDS5 [0.801, 0.318][0.823, 0.295][0.394, 0.780][0.812, 0.303][0.909, 0.284][0.715, 0.438][0.801, 0.318]
IDS6 [0.801, 0.318][0.823, 0.295][0.823, 0.295][0.812, 0.303][0.909, 0.284][0.715, 0.438][0.801, 0.318]
IDS APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS1 [0.877, 0.259][0.857, 0.260][0.458, 0.713][0.394, 0.780][0.507, 0.704][0.588, 0.528]
IDS2 [0.901, 0.211][0.880, 0.220][0.458, 0.715][0.441, 0.661][0.507, 0.706][0.414, 0.765]
IDS3 [0.880, 0.220][0.440, 0.660][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.110, 0.990]
IDS4 [0.770, 0.330][0.550, 0.550][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.440, 0.432]
IDS5 [0.220, 0.880][0.880, 0.220][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.588, 0.528]
IDS6 [0.880, 0.220][0.660, 0.440][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.220, 0.880]
. The normalized aggregated q-ROF evaluation decision matrix was calculated by applying Equation (31), as presented in Table 13.
Table 13

The normalized evaluation matrix of the IDSs.

IDS HIC1_1 NIC1_2 HYC1_3 HLC2_1 NPC2_2 ALC2_3 ISC2_4
IDS1 [0.823, 0.295][0.823, 0.295][0.823, 0.295][0.823, 0.295][0.817, 0.342][0.747, 0.365][0.770, 0.330]
IDS2 [0.801, 0.318][0.330, 0.770][0.110, 0.990][0.832, 0.301][0.564, 0.630][0.555, 0.562][0.801, 0.311]
IDS3 [0.801, 0.318][0.823, 0.295][0.823, 0.295][0.832, 0.301][0.909, 0.248][0.715, 0.438][0.801, 0.311]
IDS4 [0.823, 0.295][0.823, 0.295][0.823, 0.295][0.832, 0.301][0.817, 0.342][0.555, 0.562][0.801, 0.311]
IDS5 [0.801, 0.318][0.823, 0.295][0.394, 0.780][0.812, 0.303][0.909, 0.284][0.715, 0.438][0.801, 0.318]
IDS6 [0.801, 0.318][0.823, 0.295][0.823, 0.295][0.812, 0.303][0.909, 0.284][0.715, 0.438][0.801, 0.318]
IDS APC3_1 NEC3_2 HOC3_3 OSC4_1 CSC4_2 FRC4_3
IDS1 [0.877, 0.259][0.857, 0.260][0.458, 0.713][0.394, 0.780][0.507, 0.704][0.588, 0.528]
IDS2 [0.901, 0.211][0.880, 0.220][0.458, 0.715][0.441, 0.661][0.507, 0.706][0.414, 0.765]
IDS3 [0.880, 0.220][0.440, 0.660][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.110, 0.990]
IDS4 [0.770, 0.330][0.550, 0.550][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.440, 0.432]
IDS5 [0.220, 0.880][0.880, 0.220][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.588, 0.528]
IDS6 [0.880, 0.220][0.660, 0.440][0.458, 0.714][0.394, 0.780][0.507, 0.705][0.220, 0.880]
. Calculate the total of the weighted comparability arrangement for all alternatives by applying the Wq-ROFHA operator, as presented in Equations (24) and (25), and as exhibited in Table 14.
Table 14

The and values of the IDSs.

IDSsWq-ROFHA OperatorWq-ROFHGM Operator
IDS1 0.784 0.382 0.139 0.567
IDS2 0.741 0.489 0.102 0.789
IDS3 0.767 0.438 0.113 0.777
IDS4 0.741 0.421 0.127 0.578
IDS5 0.760 0.483 0.119 0.671
IDS6 0.771 0.419 0.125 0.651
. Calculate the full power weight of the comparability arrangements for all alternatives by applying the Wq-ROFHGM operator, as exhibited in Equations (26) and (27), and as exhibited in Table 14. . The score values of the all alternatives are computed by applying the values of the Wq-ROFHA and Wq-ROFHGM operators for each alternative by applying Equation (20), as presented in Table 15.
Table 15

The score values of the IDSs for and .

IDS j j
IDS1 0.701 0.286
IDS2 0.626 0.156
IDS3 0.665 0.168
IDS4 0.660 0.275
IDS5 0.639 0.224
IDS6 0.676 0.237
. The proportional weight of the alternatives is calculated with the assistance of Equations (32)–(34), as shown in Table 16.
Table 16

The proportional importance and the final ranking of the IDSs.

IDS Ɣja Ɣjb Ɣjc Ɣj Rank
IDS1 0.1862.9521.0002.3981
IDS2 0.1472.0000.7921.5956
IDS3 0.1572.1360.8431.7015
IDS4 0.1762.8140.9472.0892
IDS5 0.1622.4550.8741.8674
IDS6 0.1722.5970.9251.9763
. The evaluation values () of the alternatives are identified by applying Equation (35). Then, the six intrusion-detection systems are rated according to the most possible value of the evaluation values (), as presented in Table 16 and in Figure 6.
Figure 6

Ranking of the IDSs using the CoCoSo method.

4.3. Results Interpretation

In this subsection, some interpretations are introduced of the results obtained from applying the proposed approach, Entropy-CoCoSo, under a q-rung orthopair fuzzy environment. The results obtained are divided into two parts. The first part relates to the results of the main criteria weights and their sub-aspects. The second part relates to the results of the intrusion-detection systems evaluation used in the study. Initially, the four main criteria were evaluated by the participating experts. The results obtained indicate that the criterion has the highest weight, with a weight of 0.278, followed by the criterion with a weight of 0.266. Whereas, the criterion has the lowest weight, 0.226, and occupies the last rank in the ranking of the main criteria. Accordingly, the sub-criteria related to each main criterion were evaluated. Thus, the sub-criteria related to the criterion were evaluated as follows: the criterion has the top weight with a weight of 0.377, followed by the criterion with a weight of 0.319; the criterion has the lowest weight, 0.304. The sub-criteria related to the criterion were calculated as follows: the criterion has the maximum weight, with a weight of 0.282, followed by the criterion, with a weight of 0.271; the criterion has the minimum weight, 0.196. In addition, the sub-criteria related to the criterion were estimated as follows: the criterion has the highest weight, with a weight of 0.404, followed by the criterion with a weight of 0.312; the criterion has the lowest weight, 0.284. Afterward, the sub-criteria related to the criterion were assessed as follows: the criterion has the largest weight, with a weight of 0.379, followed by the criterion with a weight of 0.322; the criterion has the smallest weight, 0.299. In the end, the results of the intrusion-detection systems used in the evaluation process were revealed as follows: Suricata () has the top rank with a weight of 2.398 followed by Snort () with a weight of 2.089. In turn, Zeek () has the lowest rank with a weight of 1.595.

4.4. Comparative Analysis

In this sub-section, a comparative analysis is demonstrated to test and verify the effectiveness of the developed approach, q-ROF Entropy-CoCoSo. Consequently, the assessment results were compared with Alyami et al.’s [16] fuzzy AHP–TOPSIS approach. In this regard, the same weights of the main criteria and sub-aspects obtained by applying the proposed approach were used, as shown in Table 10. Accordingly, the results of ranking the alternatives used in the study using the two approaches are presented in Table 17 and in Figure 7. The results of the comparison show that is the best alternative according to the results of the two approaches. is the least alternative in the order. According to the results, it can be seen that there are some changes in the order of some alternatives, such as , , , and . The presence of some differences in the order of the alternatives can be explained by the difference in the mathematical basis for each approach. Finally, the results of the comparative analysis and the reliability of the proposed approach can be verified by the experts.
Table 17

Comparative analysis with other approach for ranking the IDSs.

Approaches IDS1 IDS2 IDS3 IDS4 IDS5 IDS6
q-ROF Entropy-CoCoSo2.3981.5951.7012.0891.8671.976
Ranking165243
Fuzzy AHP-TOPSIS0.9270.2870.5820.6750.4970.723
Ranking164352
Figure 7

Final ranking of the six IDSs using various approaches.

4.5. Sensitivity Analysis

We have conducted a sensitivity analysis from the three perspectives of changes in parameter q, parameter γ, and parameter Ѱ. Sensitivity analysis was conducted on the results obtained to confirm their reliability and stability and to examine the change that occurred to them as a result of the change in some inputs and parameters. In decision-making approaches, some parameters are defined subjectively based on the perception of the problem by decision-makers and the extent of the risks in the environment. Consequently, these parameters change according to the circumstances in which the decision-making system is being modeled. In our proposed Entropy-CoCoSo q-ROF approach, three parameters—q, γ, and Ѱ—are defined, which are determined based on the personal preferences of the experts. Accordingly, several changes were made to these parameters to show their decisive influence on the final IDS’s ranking results. These changes were divided into four scenarios. The first scenario refers to the change in the values of parameter q. The second scenario indicates the change in the values of parameter γ. The third scenario refers to the change in the values of parameters q and γ. Lastly, the fourth scenario refers to the change in the values of parameter Ѱ. The first scenario is the effect of a change in parameter q on the evaluation of IDSs. Accordingly, the value of the parameter q was changed several times, from q = 2 to q = 20, to show its impact on the evaluation of IDSs, as presented in Figure 8. Although the value of the q parameter has been changed several times, the order of the IDSs has not changed at all. remains the best alternative throughout the sensitivity analysis and parameter value change q, followed by . By contrast, remains the lowest in order despite the change in the value of the parameter q. The changes that can be observed based on the change in the value of the parameter q in the order of the IDSs, show there is a large convergence between the values of the assessment of and at the value of q = 2. Significant convergence occurs between the and assessment values at q = 8; otherwise, the order of the IDSs remains the same despite the presence of some increases in the weights of the IDSs.
Figure 8

Closeness coefficient values of IDSs in terms of different values of q.

The second scenario is the effect of a change in parameter γ on the evaluation of IDSs. Accordingly, the value of the parameter γ was changed several times, from γ = 0.1 to γ = 1.0, to show its effect on the evaluation of IDSs, as shown in Figure 9. Although the value of the parameter γ was changed several times, the order of the IDSs changed only when the value of parameter γ = 1.0. remains the best alternative throughout the sensitivity analysis and parameter value change γ = 0.1 to γ = 0.9 followed by , except when parameter value γ = 1.0, then becomes the second rank in the analysis process. In contrast, remains lowest in order throughout the change of the value of the parameter γ = 0.0 to γ = 0.9, except when the value of γ = 1.0 is changed, then becomes the fifth rank, penultimate. The changes that can be observed based on the change in the value of the parameter q in the order of IDSs, is that when the value of the parameter γ = 1.0, the order of the IDSs changes so that is in the first order, while is in the second order, and is in the third order. On the contrary, the rank of some IDSs was changed, such as the rank of and the , which became the fifth and sixth, respectively.
Figure 9

Closeness coefficient values of IDSs in terms of different values of γ.

The third scenario is the effect of a change in parameter q and γ on the evaluation of IDSs. Accordingly, the values of q and γ were changed several times, from q = 2 to q = 15, and γ = 0.1 to γ = 1 to show their combined effect on the assessment of the IDSs, as shown in Figure 10. Although the values of the parameters q and γ changed many times, the order of the IDSs has not changed at all. remains the best alternative during sensitivity analysis and changing the values of q and γ parameters, followed by . In contrast, remains the lowest in terms of rank despite the change in the values of the two parameters q and γ. Changes that can be observed based on the change in the value of parameters q and γ for the order of IDSs, is that there is a great convergence between the values of the evaluation process weights for the IDSs used in the study. The convergence between the weights of the IDSs is difficult to see in Figure 10, and this is one of the shortcomings of Figure 10.
Figure 10

Closeness coefficient values of IDSs in terms of the different values of q and .

The fourth scenario is the effect of a change in parameter Ѱ on the evaluation of IDSs. Accordingly, the value of parameter Ѱ was changed several times from Ѱ = 0.1 to Ѱ = 1.0, to show its effect on the evaluation of the IDSs, as shown in Figure 11. Although the value of parameter Ѱ was changed several times, the order of the IDSs did not change at all. remains the best alternative throughout the sensitivity analysis and parameter value change Ѱ = 0.1 to Ѱ = 0.9, followed by . On the contrary, remains in the lowest order by changing the parameter value Ѱ = 0.1 to Ѱ = 1.0.
Figure 11

Closeness coefficient values of the IDSs in terms of the different values of .

5. Conclusions

Given the spread of computer networks and the dependence of public and private institutions on their efficiency and quality of work, any disruption or sabotage of them may lead to great losses. Information systems and networks are constantly subject to cyber-attacks. Thus, firewalls and antivirus are not enough to fend off all these attacks, as they are only able to protect the “front entrance” of computer systems and networks. IDSs can help protect your corporation from malicious activities. There are different types of IDSs to protect networks, as intrusion attacks are becoming more and more common on a global scale. In addition, hackers using new technologies are trying to penetrate systems. An IDS is a tool that identifies these attacks and will take an immediate step to get the system back to normal, as the IDS can also detect network traffic and send an alarm if a breach is found. In this regard, this study discusses the most effective and used IDSs. This study was conducted with the participation of many experts under the q-ROF environment to deal with the uncertainty that may occur as a result of different circumstances and differences in evaluation frameworks. Six intrusion-detection systems, namely, Suricata (), Zeek (), Security onion (), Snort (), Wazuh (), and OSSEC (), were evaluated according to four key criteria and thirteen sub-aspects. The main criteria were protected system, audit source location, targets, and types. The sub-aspects, on the basis of which the effectiveness of the intrusion-detection systems was evaluated, were HIDS, NIDS, hybrids, host log files, network packets, application log files, IDS sensors alerts, applications, network, host, open-source, closed source, and freeware. A hybrid MCDM approach, including q-ROF entropy-CoCoSo techniques, was proposed, where entropy was applied to evaluate the main criteria and their sub-aspects. The CoCoSo method is applied to rate six IDSs according to their effectiveness. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance. Although the results here confirm that the proposed method is applicable and effective, it has some limitations. The key limitation of the approach is the difficult mathematical algorithm for the computation of Hamacher functions.
  3 in total

1.  Internet of Things: Evolution, Concerns and Security Challenges.

Authors:  Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Kumar Bangotra; Pradeep Kumar Singh; Wei-Chiang Hong
Journal:  Sensors (Basel)       Date:  2021-03-05       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.