Next Article in Journal
A Review of the Processes Associated with the Removal of Oil in Water Pollution
Previous Article in Journal
Food Insecurity, Population Growth, Urbanization and Water Availability: The Role of Government Stability
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

1
Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
2
Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow 226025, India
3
Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
4
Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow 226028, India
*
Author to whom correspondence should be addressed.
Sustainability 2021, 13(22), 12337; https://doi.org/10.3390/su132212337
Submission received: 28 September 2021 / Revised: 29 October 2021 / Accepted: 2 November 2021 / Published: 9 November 2021

Abstract

:
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.

1. Introduction

The progress in ICT is one of the most noticeable changes in the modern world. In the last few decades, the technological revolution has greatly influenced the whole world and changed the thinking of people and their lifestyles. One of the prominent and well-known technologies in this domain is machine learning. Machine learning, a sub-domain of artificial intelligence, was first proposed by Arthur Samuel 1959 [1,2]. After that, there was a significant increase in the use of ML techniques in various fields of life, and today, it is recognized as one of the most imminent and fast growing technologies, particularly for addressing issues such as future event prediction, disease diagnosis, market analysis, email filtering, intrusion detection, image and speech recognition, etc. [3]. ML algorithms have a strong ability to learn from both structured and unstructured data, and they may assist automated systems in a variety of real-life fields. Machine learning allows algorithms to learn from previous (historical) data. As we all know, the digital world is driven by data. In such a scenario, with the use of data mining and machine learning techniques, the scientists and researchers find new and productive insights from these data. The existing data contain interesting patterns that help us to make future predictions about both the normal and abnormal events. Initially, data as a dataset are provided as input to the devised ML models to train itself accordingly. With the help of ML algorithms, these ML-based models learn from the data and improve their performance accordingly. After the completion of the training phase, the proposed model is to be tested and validated with new but relevant data so as to determine the efficiency and accuracy of the proposed ML model. Thus, with less human intervention and explicit programming, it would be possible to use the learning behavior and predict future events and activities [4]. At every correct decision, the input data program improves its performance measure. More formally, ML is defined as “A computer program is said to learn from experience E with respect to some class of tasks T and performance measure P, if its performance at tasks in T, as measured by P, improves with experience E” [2]. Here, the main focus is on these three things: a set of tasks represented by T; estimation of performance, which is denoted by P; and E, which represents the source of experience for the program.
In recent times, ML has gained significant importance in the field of cyber security [5]. Generally, supervised and unsupervised techniques are two common classes of machine learning that are mostly focused on by researchers to design and build compact intrusion detection systems [6]. Intrusion detection systems provide proactive security mechanisms to detect different types of intrusions. Supervised ML-based intrusion detection systems as the name imply works under a supervised environment [7]. In it, labeled historical data is used to train and test the devised models. Supervised ML algorithms are implemented to build models that map the given inputs with the outputs based on the existing knowledge [8]. It infers the output class for an input object according to the knowledge perceived from labeled examples of training data. The input object is usually a vector of attributes of a most ideal class of which it has common characteristics. In supervised ML, the models are completely subjected to labeled data, and efficiency and accuracy of models are directly proportional to the quality of data, whereas unsupervised ML is a contrastive study against supervised ML, and in this, unsupervised ML algorithms are implemented to build intrusion detection systems. Data used in this context are completely unlabeled, and models are exclusively autonomous to compact internal representation of the given data according to their common characteristics [2]. Data are analyzed by the unsupervised ML models, and significant insights are found from this data to classify future data on the basis of these insights. ML makes deep insights into different real-life domains, and cybersecurity is one of them. On the basis of cybersecurity datasets, namely malware training data sets, spam identification data sets, intuition detention data sets, unified host and network datasets, malicious URLs, etc., ML-based models have to be trained first and then used to detect future cyber security threats. However, considering the idealness and prioritization of the idealness attributes at the initial stages of intrusion, detection system development has become a challenging and fascinating issue for cybersecurity experts and researchers. Attribute identification and prioritization is a decision-making problem and needs experts’ views and deep research insights [8]. Moreover, idealness assessment of software security systems is a continuous process that must be performed periodically by the experts to test the proactive security preparedness, effectiveness, and accuracy of these products [9]. Hence, in this research endeavor, our focus is to analyze the impact of cyber security related attributes for intrusion detection systems and make an idealness assessment of ML-based intrusion detection systems owned by Indian hospitals under the hesitant fuzzy conditions through MCDM approaches. For this assessment, the identification and selection of the relevant attributes is based on the experts’ views. This idealness assessment will help the researchers and cybersecurity experts to identify and prioritize the ideal cybersecurity attributes in the context of ML-based intrusion detection systems. Besides this, the study’s findings will also help in building more robust and ideal intrusion detection systems. MCDM approaches have been used frequently by the researchers in several studies for various project assessments and evaluations. However, we did not find any research study that used the hesitant fuzzy-based MCDM techniques to make idealness assessment of intrusion detection systems. Thus, this work aims at using a novel approach to assess the ML based intrusion detection systems by practicing AHP-TOPSIS approaches under the hesitant fuzzy conditions.
AHP, an MCDM approach, offers a lot of potential when it comes to solving hierarchical decision-making problems. T.L. Saaty initially suggested the proposed approach in 1970 [8]. The method has undergone numerous improvements since then. It offers a practical method for calculating the weight of criteria (attributes). Instead of merely affixing a particular value, it assists the specialists in finding the decision that best matches their objective and understanding of the situation [10]. Furthermore, including hesitant fuzzy in this approach improves its efficiency and aids in the elicitation of more accurate findings [11]. Experts frequently experience a hesitation when making a decision in AHP and are unable to settle on a specific value, because they want to go above or below the values. These values, however, are not accessible [12,13]. In this case, the hesitant fuzzy sets are quite important. Reluctant fuzzy Sets are used to reflect the hesitant preferences of decision-makers. HF-logic can be used to eliminate hesitancies that may arise during the decision-making process, especially when determining an element’s membership in a fixed set is challenging. Such issues are beyond the scope of conventional fuzzy logic [14]. Since its introduction, the hesitant fuzzy collection has garnered a lot of attention from academics both at home and abroad. Furthermore, the TOPSIS method is well known for its ability to provide the greatest possible alternative ranking [8]. As a result, combining hesitant fuzzy logic with the AHP-TOPSIS technique improves the efficiency of this study and makes it suitable for evaluating the performance of ML-based intrusion detection systems.
Hesitant fuzzy based AHP-TOPSIS has a substantial capacity to solve MCDM problems caused by imprecise and uncertain data [11,14]. AHP under hesitant fuzzy conditions provides more accurate attribute weights, resulting in more effective outcomes [15], [16]. A more familiar technique for ranking options in MCDM problem solving is TOPSIS under hesitant fuzzy conditions [13]. Eight cybersecurity features are used as criteria in this study, while 10 machine learning-based intrusion detection systems are used as alternatives. The experts’ views and well-known research works are used to identify and choose the characteristics. Here, the domain experts were consulted by our research team. Our team had also undertaken various research studies using different MCDM approaches. With knowledge and experience in this domain, the experts identified and choses the suitable attribute sets for the specified problem that needed to be solved using the MCDM approaches. Consultation with the domain experts helped us to remove the redundancy, inconsistency, and ambiguity from the data (attribute set).
Furthermore, the study has been detailed in the following order: Section 2 presents the review of the existing relevant studies; Section 3 describes the framework of cybersecurity attributes related to the ML-based intrusion detection systems; Section 4 elaborates upon the implemented methodology; Section 5 describes the mathematical calculations and results; Section 6 incorporates the discussion; and Section 7 concludes the study.

2. Review of Existing Relevant Studies

Review of the existing relevant research works is an effective tool that provides ways to identify the actual research gap and establish the objectives for the current work. The few eminent and pertinent research studies that we found relevant to our proposed research endeavor are briefly discussed here:
  • S. Bekesiene and colleagues (2021) organized a research endeavor to evaluate distance learning modules through integrated AHP TOPSIS approach under the fuzzy based environment [17]. In this study, three distance learning courses have been evaluated at three level stage assessment namely course structure, quality of information tools, and student opinion. The fuzzy TOPSIS technique was found to be a practical method that delivered an excellent value analysis and ranking, according to the survey data.
  • Almotiri (2021) proposed a study to assess the effectiveness of malicious traffic detention systems. In this study, he used AHP-TOPSIS under fuzzy environment to evaluate six malicious traffic detention systems [18]. The Host-based malicious traffic detection strategy (MTD4) was shown to be the most successful and long-lasting malicious traffic detection mechanism among the six alternatives in this investigation.
  • Sahu and Colleagues (2020) presented a novel framework for software durability assessment using AHP-TOPOSIS under the hesitant fuzzy conditions [15]. They discovered that trustworthiness and maintainability are two essential and vital qualities for preserving the software durability.
  • Agarwal and Colleagues (2020) used well-known patterns, sometimes known as design strategies, to create a fuzzy ANP-TOPSIS evaluation of the university’s various software systems [8]. To analyze the university’s software security, a unique set of security qualities in terms of security techniques was identified and selected.
  • Alharbe (2020) conducted a research study for usable-security evaluation of information software systems [12]. For that, he used the MCDM approaches and enunciated guidelines that would help the practitioners in recognizing and prioritizing usable-security attributes while designing and developing the software.
  • Kaur and colleagues (2020) worked on the detection and assessment of security risk-factors during web application development; the suggested study employs an adaptive neural fuzzy inference system [19]. This study offers practitioners suggestions for analyzing and prioritizing security concerns in healthcare web apps throughout the early phases of development in order to create safe software solutions.
  • Solangi and colleagues (2019) created a system for evaluating the best renewable energy resource for electricity production [10]. Fuzzy-based TOPSIS and Delphi-AHP algorithms were used to conduct this experiment. In this study, wind energy was considered to be the greatest option for generating electricity in Pakistan.
  • Goutam and colleagues (2019) proposed a tactic for calculating the vulnerability of online applications [20]. Penetration testing is a technique for identifying software flaws. To establish their security, financial web apps have been submitted to both manual and automated testing. Throughout the study, the results of both vulnerability assessment approaches are nearly identical.
  • Sengul and colleagues (2015) developed a fuzzy-TOPSIS-based model to assess Turkey’s renewable energy systems [13]. Shannon’s entropy approach was used to compute the weights of the qualities. In this study, the hydro-power plant was found to be the best renewable energy supply system.
  • The significance of hesitant fuzzy sets in MCDM systems was investigated by Qian and colleagues (2013) [14]. According to the findings, generalised HF sets are the best fit for cases when decision makers are confused which membership to choose due to a number of possible memberships with unknown probability.
  • Buyukozkan and colleagues (2012) the authors used the integrated AHP-TOPSIS approach under fuzzy conditions to conduct an analytical research on healthcare electronic service quality [21]. Specialization, interactivity, service correctness, dependability, and responsiveness were determined to be the most important characteristics in providing satisfying and effective healthcare web services, according to the study.
From the analysis of the studies mentioned above, it was found that different MCDM techniques have been endorsed in various approaches/ methods such as F-AHP, TOPSIS, and F-ANP to find out the solutions for MCDM problems. However, we did not find any research study that used the integration of hesitant fuzzy logic with AHP-TOPSIS to make an idealness assessment of ML-based intrusion detection systems. Further, our identified criteria set are ideal to assess the effective characteristics of ML-based intrusion detection systems. This depicts the significance of our proposed research work.

3. Machine Learning in Cybersecurity

Machine learning as an emerging technology provides great flexibility to make insights into big data. This in turn helps researchers to analyze the existing huge amounts of data and find interesting patterns from it [4]. The insights examined from historical data through machine learning provide enormous benefits to modern industries and business organizations. Additionally, one of the interesting characteristics of machine learning techniques is to provide proactive security mechanism in the cybersecurity domain [5]. ML-based intuition detection systems provide an effective security approach for addressing cybersecurity issues, examining threats and responding to intrusions and security incidents swiftly in an instinctive way. Cybersecurity experts and researchers have practiced different ML algorithms to address various cybersecurity issues [22]. The most commonly used machine learning algorithms are decision trees, support vector machine, naïve Bayes classifier, artificial neural networks, k-means clustering, convolutional neural networks, k-nearest neighbor, recurrent neural network, restricted Boltzmann machine, and fuzzy c-means clustering to design and develop intrusion detection systems [23,24]. These algorithms are practiced by researchers in different working scenarios to address cybersecurity issues. However, here, our aim is to make an idealness assessment of these ML-based intrusion detection systems with respect to the identified cybersecurity attributes.
To improve the efficiency of intrusion detection systems and to prioritize the cybersecurity attributes concerning the ML-based intrusion detection systems, a case study was performed on ten ML-based intrusion detection systems installed in the hospitals of UP, India. The identification and selection of the attributes for the assessment of machine learning algorithms is a consensual decision based on the expert viewpoints and experience of authors. For this work, eight cybersecurity attributes concerning machine learning with 10 different alternatives for the idealness assessment of intrusion detection systems have been considered. These ten alternatives (intrusion detection systems) are symbolized as IDS-1, IDS-2, IDS-3, IDS-4, IDS-5, IDS-6, IDS-7, IDS-8, IDS-9, and IDS-10. The process of alternative selection is a result of collective decision of domain experts and owners of intrusion detection systems of different Indian hospitals for their comparative cyber-security assessment. The 10 selected intrusion detection systems have been installed at different hospitals for the detection of various cyber-security attacks. These detection systems have used different machine learning algorithms from basic to complex level of algorithm integration and hybridization. Each of the IDS uses more than one ML algorithm to detect different types of attacks. Additionally, with respect to our identified attribute set each intrusion detection system has gained a value between 0 and 1 for each attribute, as authors of the study have practiced hesitant fuzzy logic for this assessment. Moreover, the subjective cognition results of evaluators in linguistic terms for each intrusion detection system are based on the scale and experts’ opinion, which is discussed in the methodology section. On the basis of the identified attribute set, the process of evaluation and quantitative results about the 10 different intrusion detection systems have been presented in Section 5 of this work. Figure 1 represents the identified attributes and alternatives. The subsection description and significance of the identified attributes are discussed in the figure below:
(1)
Spam Detection: Spam detection is a significant feature of ML-based intrusion detection systems that are used to identify spams. Spam, as a technical term, is mostly related to electronic mails and is known by some other names, such as junk mail or unsolicited bulk mail. It is unwanted and unwelcomed digital content that is used by spammers through different messaging systems [25]. Mostly, it comes in the form of unwanted and unnecessary mails through internet. Most of the times spams are used for commercial purposes and are just unpleasant in nature. However, sometimes, spam messages can be catastrophic for the system and system’s user. In this scenario, the intention of spammers is to send malicious codes, execute phishing scams, and to earn money.
(2)
Phishing Identification: Cyber intrusions are very common at present, and there has been a rampant increase in their occurrence. Phishing is one of the common and interesting social engineering attacks used by intruders to steal confidential data. The targeted data often include credit card details and login credentials. In phishing, cyber criminals use the concept of spoofing, which helps them to masquerade as a legitimate and known source to the victim [24]. Mostly, they use it to spoof the websites of reputed organizations so that the victims can easily trust and share their confidential data. In addition, phishing attacks are also used to spread malware for system cookie stealing and keystroke capturing. Thus, detection of phishing attacks has become one of the significant features of ML-based intrusion detection systems.
(3)
Malware Identification: Malware, as a collective suit of various malicious software mainly, compromises viruses, spyware, key loggers, and ransomware. Malware is a code designed by cyber-attackers with the intention to cause severe damage in the victim’s system or to acquire illegitimate network access. Generally, it is a coded file that is spread by cyber-attackers through different messaging systems such as e-mail and requires the victim to execute the malware. Different types of malware programs are designed for different purposes by the intruders and are often used to compromise the financial data of organizations and enterprises [24]. Machine learning algorithms have been produced by researchers for both malware detection and malware classification into different classes or families. Hence, detection of malware is also one of the key characteristics of ML-based intrusion detection systems.
(4)
DoS Attacks Detection: The three main components of security or cyber-security are confidentiality, integrity, and availability (CIA). These are commonly known as CIA triad and are considered the basic components for the security of any system or network. Among the three, one of the vital components is availability. Availability literally defines the character that is to be used or obtained, but in information security, it ensures that, whenever information and other resources are needed by the authentic users, there should be timely and reliable access to them [26]. To interrupt the functioning of the system and system resource access for its users, the cyber intruders use the DOS attacks. Denial of service (DoS) attacks are used to make online system resources unavailable to its users by flooding a server with traffic. The different types of DoS attack are teardrop attack, flooding attack, IP fragmentation attack, protocol attack, and application-based attack [24]. Researchers have practiced different ML algorithms to detect DoS attacks. Thus, detection of these attacks is also a key characteristic of ML-based intrusion detection models.
(5)
Misuse Detection: Misuse detection is a significant characteristic of ML-based intrusion detection systems. Misuse detection ensures the identification of those cybersecurity attacks that are familiar to an intrusion detection system [27]. The intrusion detection system already knows the nature of these attacks and has signatures of these attacks in their supporting database. Analysis and detection of new attacks are based on these existing signatures. Therefore, detection systems merely having this characteristic are very poor in detecting the unknown attacks whose signatures are not present in the supporting database.
(6)
Anomaly Detection: Identification or detection of zero-day attacks (unknown attacks) is a challenging issue and one of the important characteristics addressed by the ML-based approaches. The behavior of zero-day attack types is not recorded in the model’s supporting database. An intelligent model based on machine learning analyzes these types of attacks and attempts to forecast their class based on its knowledge and experience [27]. Thus, identification of zero-day attacks is an essential attribute for an ML-based intrusion detection system. It plays a crucial role in making an ML-based intrusion detection model ideal for installation environment.
(7)
Implementation Complexity: As the name implies, it specifies all those complications that are considered during the whole implementation process of a system. Here, it defines all those complexity parameters that are considered by researchers, scientists, and other stockholders to build an ML-based intrusion detection system. It includes processing power, amount of training data, working complexity of model, implementation complexity of an algorithm, overall cost of model and other required resources, etc. Thus, implementation complexity is also an essential attribute for evaluating an ML-based intrusion detection system and has been considered for this assessment.
(8)
Accuracy: This defines the measure of degree of correctness and precision of any computation or process corresponding to the right standard. It is one of the most notable features of ML algorithms. In machine learning, accuracy is determined by how well the proposed ML-based models generate the required results [27]. It is measured using precision, sensitivity, specificity, area under the curve, and other measures. It describes how accurate a machine learning-based model is when compared to the other models or techniques.
All the above discussed attributes are relevant to the ML-based intrusion detection systems in some way. Moreover, all the identified attributes, by their implicit specifications, have a significant role in the overall idealness of ML-based intrusion detection systems. The authors of the study first identified a set of 20 attributes relevant to this study. After that, the domain experts’ team was approached to finalize the attribute set. Experts made a group discussion about all the identified attributes and removed redundant and inconsistent attributes. Individual conflicts of experts regarding attribute selection were minimized, and finally, a set of eight cyber security attributes were selected in this expert group discussion. Hence, each of these attributes were considered for this assessment.

4. Adopted Methodology

The methodology for our proposed work lays out a sequential approach for machine learning-based intrusion detection systems in the cyber security perspective. In order to complete this task, reluctant AHP and TOPSIS were used under fuzzy conditions. This technique helped us to obtain more accurate findings. In sectors where the solution to a problem could be anything from definitely true to absolutely false, hesitant fuzzy logic has acquired a lot of momentum as an improved variant of classical logic. It might be entirely true, half true, half false, or entirely false. It comes with the capacity to deal with information ambiguity [10]. The most appropriate approach for tackling issues that might yield numerous hierarchical solutions is the AHP. It does a hierarchical analysis of the problem. When it comes to the subjective and objective values of characteristics, AHP delivers reliable calculations [8]. TOPSIS is well recognized in the MCDM problem space for alternative ranking and examines the best alternative in the specified alternative set [8]. In this work, the weights of attributes are determined using AHP under fuzzy conditions, and then TOPSIS is used to rank the alternatives. The sequential working process for this study’s analysis is shown in Figure 2. Numerical equations are presented in the next part to assist researchers in performing a numerical analysis of this work.
In this study, we presented hesitant fuzzy-AHP techniques to evaluate the priority of ML-based cybersecurity attributes, and then we calculated their testing and influence on alternatives (10 intrusion detection systems) for similar characteristics. The following is a detailed description of the approached methodology:
Point_1: The suggested methodology’s first step was to create hierarchical models for various attributes.
Point_2: Using linguistic words and pair-wise comparisons between those attributes, decision makers used Table 1 as a guide.
Point_3: Fuzzy wrappers [27] were applied to modified outcomes. In the stated linguistic scale, it was assumed that T0 had the smallest priority and Tg has the greatest. The evaluations were between Ti and Tj, such that T0TiTjTg, and an ordered weighted average of the attribute was performed as in Equation (1).
O W A ( a 1 , a 2 , a n ) = j = 1 n W j b j .
W indicates the weight of attributes, while OWA describes the technique for ordered weighted averaging. Similarly, professionals use Equation (2) to obtain the trapezoidal numbers C = (l, m, n, o) after using Equations (1) and (5).
l = m i n { a L i ,   a M i , a M i + 1 ,   a M j , a R j } = a L i
o = m a x { a L i ,   a M i , a M i + 1 ,   a M j , a R j } = a R j
m = { a M i , i f i + 1 = j O W A w 2 ( a m j ,   a m i + j 2 ) ,   i f i + j i s e v e n O W A w 2 ( a m j ,   a m i + j + 1 2 ) ,   i f i + j i s o d d }
n = { a M i + 1 , i f i + 1 = j O W A w 2 ( a m j a m j 1 ,   a m ( i + j ) 2 ) ,   i f i + j i s e v e n O W A w 2 ( a m j , a m j 1   a m ( i + j + 1 ) 2 ) ,   i f i + j i s o d d }
The 1st and 2nd type weights were calculated with the aid of Equations (6) and (7), using η. This is a number inside the unit interval [0, 1], which experts obtain using Equations (6) and (7).
1st weight types (W1 = ( w 1 1 , w 2 1 , w n 1 )):
w 1 1 = η 2 ,   w 2 1 = η 2 ( 1 η 2 ) , . w n 1 η 2 ( 1 η 2 ) n 2
2nd weight types (W2 = ( w 1 2 , w 2 2 , w n 2 )):
w 1 2 = η 1 n 1 ,   w 2 2 = ( 1 η 1 ) η 1 n 1                                
The formula depicts η 1 = u ( j 1 ) u 1 s and η 2 = l ( j 1 ) u 1 , where u specifies the upper assessment (see in Table 1 u = 10), and i and j specifies the attribute assessment ranks as low and high, respectively.
Point_4: Approaching Equations (8) and (9), pair-wise comparison matrix ( A ˜ ) has been computed by experts as
A ˜ = [ 1 c ˜ 1 n c ˜ n 1 1 ]
c ˜ j i = ( 1 c i j u , 1 c i j m 2 , 1 c i j m 1 , 1 c i j 1 )
Point_5: Approaching Equation (10), to identify a comparison matrix, experts use it for defuzzification of the matrix.
μ x = l + 2 m 1 + 2 m 2 + h 6
In Equation (10), l, m1, m2, and h depict four components of a trapezoidal number, that is, lower bound, upper middle bound, lower middle bound, and higher bound.
Experts approached Equations (11) and (12) to determine the consistency ratio of those values [7,28].
C I = γ m a x n n 1 ,
C R = C I R I ,
where CI stands for consistency index and RI stands for random index, which is established by Saaty [29] and changes for different n numbers. If the value of consistency ration was less than 0.1, our calculated matrix was consistent; otherwise, we returned to Point_2 and updated our evaluation.
Point_6: The geometric mean for row values was computed using Equation (13) by the domain experts.
r ˜ i = ( c ˜ i 1 c ˜ i 2 c ˜ i n ) 1 n
Point_7: Experts analyzed the weight of the most significant qualities by approaching Equation (14) to find the most important attributes.
w ˜ i = r ˜ 1 ( r ˜ 1 r ˜ 2 . r ˜ n ) 1
Point_8: Experts approached Equation (15) to the defuzzified values and conducted an analysis on them.
μ x = l + 2 m 1 + 2 m 2 + h 6
Point_9: By approaching Equation (16), experts defuzzified values and turned them into normalized weights.
w ˜ i i j w ˜ j
Then, among the various alternatives, TOPSIS under hesitant fuzzy is utilized to choose the optimal alternative. TOPSIS has been shown to be one of the finest approaches for selecting the best option and assisting specialists in dealing with real-world situations as a widely used MCDM methodology [8]. The solutions created by TOPSIS are the furthest from the negative ideal solution and the closest to the positive ideal solution [8]. The suggested method is based on using envelopes to measure the distance between H1s and H2s, for example. Given the envelopes envp (H1s) = [Tp, Tq] and   e n v p ( H 2 s ) = [ T p * , T q * ] , the distance is defined as Equation (17).
d ( H 1 s , H 2 s ) = | q * q | + | p * p |
Further, the procedure can be defined as:
Point_10: Here, we assumed for the beginning step that the concerned problem had E alternatives ( C = { C 1 ,   C 2 , C E } ) and n criteria ( C = { C 1 ,   C 2 , C n } ) Here, ex represents the practitioners and k depicts the numeric count of experts in TOPSIS approach.
X ˜ l = [ H S i j l ] E × n in TOPSIS technique is used to present a hesitant fuzzy decision matrix, where H S i j l represents an alternative i(Ci) estimated score against criteria (attribute) j(Aj) specified by practitioners e x .
The HF-TOPSIS standard for evaluating criteria and the impact of outcomes is described as and falls between the extremely bad and highly good scale:
r 1 1 = between medium and good (bt M&G)
r 2 1 = at most medium (am M)
r 1 2 = at least good (al G)
r 2 2 = between very bad and medium (bt VB&M)
The comparative fuzzy envelope has been computed for each linguistic phrase as follows [14]:
e n v p F (EGH (btM&G)) = T (0.3300, 0.5000, 0.6700, 0.8300)
e n v p F (EGH (amM)) = T (0.0000, 0.0000, 0.3500, 0.6700)
e n v p F (EGH (alG)) = T (0.5000, 0.8500, 1.0000, 1.0000)
e n v p F (EGH (btVB&M)) = T (0.0000, 0.3000, 0.3700, 0.6700)
Point_11: The aggregation of practitioners’ individual assessments ( X ˜ 1 , X ˜ 2 X ˜ K ) was taken, and construction of summarized decision matrix X = [xij] was completed with the help of Equation (18).
    T p i j = m i n { m i n i = 1 K ( m a x H t i j x ) , m a x i = 1 K ( m i n H t i j x ) } T q i j = m a x { m i n i = 1 K ( m a x H t i j x ) , m a x i = 1 K ( m i n H t i j x ) }
Point_12: In TOPSIS evaluation, the effective factor is denoted by b, whereas the most effective factor is denoted by Aj, and the cost characteristic is denoted by c. Furthermore, the lowest relative alternatives for cost-related preferences necessitate a high level of precision. Equations (19) and (22) were calculated to make a cost estimation and identify effective attributes [28]:
V ˜ p j + = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α b                                                                                                                                   and           m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α c
V ˜ q j + = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α b                                                                                                                                 and           m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α c
V ˜ p j = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α c                                                                                                                                     and             m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α b )
V ˜ q j = m a x i = 1 K ( m a x i ( m i n H S i j x ) ) j α c and   m i n i = 1 K ( m i n i ( m i n H S i j x ) ) j α b )
Point_13: By approaching Equations (23) and (24), the positive and negative ideal matrixes ( M + and M ) were computed, respectively.
M + = [ d ( x 11 , V ˜ 1 + ) + d ( x 12 , V ˜ 2 + ) + d ( x 21 , V ˜ 1 + ) + d ( x 22 , V ˜ 2 + ) + d ( x m 1 , V ˜ 1 + ) + d ( x m 2 , V ˜ 1 + ) + + d ( x 1 n , V ˜ n + ) + d ( x 21 , V ˜ n + ) + d ( x m n , V ˜ n + ) ]
M = [ d ( x 11 , V ˜ 1 ) + d ( x 12 , V ˜ 2 ) + d ( x 21 , V ˜ 1 ) + d ( x 22 , V ˜ 2 ) + d ( x m 1 , V ˜ 1 ) + d ( x m 2 , V ˜ 1 ) + + d ( x 1 n , V ˜ n ) + d ( x 21 , V ˜ n ) + d ( x m n , V ˜ n ) ]
Point_14: Relative closeness score for each alternative was determined by approaching Equations (25) and (26).
C S ( A i ) = M i + M i + + M i   ,   i = 1 , 2 , m ,
where
M i + = j = 1 n d ( x i j , V j + ) a n d   M i = j = 1 n d ( x i j , V j )
Point_15: Based on the related relative proximity ratings, an ordered ranking of the options was given.
This work will use the above-mentioned systematic step-by-step methodology to conduct a case study on machine learning-based intrusion detection systems for the idealness evaluation in the cybersecurity perspective. The numerical computations for this investigation are detailed in the following part of this paper.

5. Numerical Calculations and Results

Evaluating the quality attribute of any software-based system, including cybersecurity, is a difficult process [8], since quantitative measurement of a qualitative characteristic is a complicated operation. This work’s numerical analysis will give a quantitative assessment of machine learning-based intrusion detection systems. For this reason, this paper conducts a case study on ten different machine learning-based intrusion detection systems in order to assess their idealness characteristic from the cybersecurity perspective. Ten different intrusion detection systems have been selected as alternatives for this work. The alternative identification and their ranking evaluation is an integral part of the methodology chosen for our study. Further, these 10 different intrusion detection systems have been selected as alternatives on the basis of collective decision of domain experts and owners of intrusion detection systems for their comparative cyber-security assessment. AHP-TOPSIS under hesitant fuzzy conditions have been approached to make this task more corroborative and efficient. To determine the idealness assessment of ML-based intrusion detection system, eight attributes, namely spam detection, phishing detection, malware detection, DoS attack detection, misuse detection, anomaly detection, implementation complexity, and accuracy were considered for this experiment. The identified attributes have been represented as: CSA1, CSA2, CSA3, CSA4, CSA5, CSA6, CSA7, and CSA8, respectively, in the further study. Approaching Equations (1)–(26) described in Section 4 of this work, idealness assessment of ML-based intrusion detection systems have been performed using AHP-TOPSIS under hesitant fuzzy conditions as follows.
Initially, approaching Equations (1)–(9), and as a standard scale involving Table 1, the linguistic terms were transformed to the numeric values and later into HF-based crisp numeric values. Then, numerical calculations were carried out to create a pair-wise comparison matrix, and the concluding results are shown in Table 2. To obtain the final results for Table 2, the procedure experienced the implementation of fuzzy wrappers by approaching Equation (1); approaching Equations (2)–(5), estimation of trapezoidal numbers C = (l, m, n, o); and by approaching Equations (6) and (7), and considering η, which represents a number between (0–1), 1st and 2nd weight types have been found. At the end, the experts used Equations (8) and (9) to calculate the pair-wise comparison matrix. We have not represented the intermediately operations here due to the least significance.
With the use of Equations (10)–(16), the level 1 attributes’ defuzzified values and normalized weights were computed, and the final findings are shown in Table 3. The following intermediate procedures were used in the whole process of calculating Table 3: first, Equation (10) was approached for defuzzification process to convert the pair-wise comparison matrixes into combined defuzzified values. Then, to check matrix consistency, Equations (11) and (12) were approached to determine both the consistency index and consistency ratio (CR) and our determined CR = 0.03485540 for this work, that is <0.1 that depicts our evaluated matrix is consistent. Afterwards, approaching Equations (13) and (14), numerical calculations have been carried out for the determination of geometric mean for row values and the most important attributes. Then, Equations (15) and (16) have been used to analyze defuzzified data and convert them to normalized weights, accordingly.
Hereafter, this part of the work presents a realistic assessment of the evaluated results on highly sensitive ML-based intrusion detection systems of Indian hospitals. After obtaining the defuzzified and normalized weights of attributes using an AHP approach under HF conditions, the global ranking of competing alternatives was generated using TOPSIS under HF conditions. Next, we took the inputs on the technological data of 10 ML-based intrusion detection systems, and the summarized results shown in Table 4 were calculated by incorporating the standard scale specified in the Methodology sub-section in point_10 and Equation (17). The attributes’ weights that were obtained by AHP are provided to the TOPSIS method under HF conditions to achieve the ranking order for the alternatives. The normalized fuzzy decision-matrix for 8 attributes and 10 competitive alternatives was determined through some intermediary operations by incorporating point 10 and Equation (18) and is depicted in Table 5. By incorporating Equations (19) and (22), the normalized fuzzy decision-matrix cell values (performance-values) are multiplied by each attribute weight value, yielding a weighted fuzzy normalized decision-matrix, as shown in Table 6. The final findings are given in Table 7 under the column names dist+ and dist-, which were calculated by incorporating Equations (22) and (23) to determine positive and negative idealness of each option with regard to each characteristic. Then, by incorporating Equations (25) and (26), the relative closeness score for each choice was calculated as the CC-i satisfaction degree, and the results are given in Table 7.
The final analysis of the numerical results depicts that, on the basis of the performance scores, the competitive alternative rankings (10 ML-based intrusion detection systems) is generated as: IDS-6, IDS-8, IDS-9, IDS-7, IDS-5, IDS-4, IDS-3, IDS-10, IDS-1, and IDS-2 in an idealness assessment concerning ML-based cybersecurity. On the basis of chosen criteria, the idealness evaluation performed on 10 different ML-based intrusion detection systems revealed that IDS-6 is more ideal and effective in addressing serious cybersecurity concerns and difficulties. Furthermore, using a TOPSIS approach under HF conditions, the identified attributes for the idealness assessment of ML-based intrusion detection systems have been prioritized in the following order: accuracy, anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity, spam detection, and phishing detection with the global normalized weights 0.273937, 0.222015, 0.127306, 0.122505, 0.10973, 0.053217, 0.052354, and 0.038937, respectively.
In addition to this, the applicability of our proposed work is not null. We have considered 10 real-time intrusion detection systems from different hospitals of India as alternatives. As, revealed from existing relevant research works, the alternative selection for assessment is an integral part of our proposed methodology [8,9,10,11,12,13,14,15,16,17]. The alternative selection is a result of collective decision of domain experts and owners of intrusion detection systems for this case study. Further, the above examined quantitative results reveal that the IDS-6 have acquired a maximum number of the attributes among the identified attribute set for this work. Due to its hybrid characteristic, it integrates different machine learning algorithms for the detection of different kinds of cyber-security attacks that are the concern of our study. In the same way, the other intrusion detection systems, namely IDS-8, IDS-9, IDS-7, etc., gain less performance score in descending order with respect to the identified attributes and the domain of their detection of identified cyber-security attacks.

6. Discussion

Cybersecurity ensures real-time protection of information, information systems, and networks from intruders. There has been an immense increase in cybersecurity breaches over the last decade, and instances of data theft continue to rise by the day. To address these cybersecurity issues, organizations have spent huge amounts and various efforts to overcome these intrusions are already underway. Different approaches and techniques have been practiced by experts and researchers to provide reliable and robust security mechanisms. One of the most prominent among them is machine learning, which plays a vital role in the cybersecurity domain [24]. ML has a proactive character that can address cybersecurity issues effectively and examine the threats and respond to intrusions and security incidents swiftly in an instinctive way [24]. Thus, this makes the ML techniques more suitable for detecting and classifying various kinds of cyber-attacks. More specifically, supervised and unsupervised machine learning techniques possess a great ability to address different cybersecurity issues [23]. In this row, cybersecurity experts and researchers have proposed and designed various intrusion detection systems to detect different kinds of cybersecurity attacks [6]. As stated, the main objective of this work was to make an idealness assessment of intrusion detection systems through integrated hesitant fuzzy based AHP-TOPSIS approaches. Experts’ views and current relevant research findings were used to identify and choose the attributes that were included in this evaluation. AHP under HF conditions results reveal that the accuracy attribute has gained the top priority, followed by anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity, spam detection, and phishing detection. TOPSIS under HF conditions depicts that IDS-6 has gained the highest ranking, while the IDS-2 gains the least ranking with a performance score of 0.355475 computed with respect to ML concerned cybersecurity attributes. The findings demonstrate that IDS-6 is more ideal and trustworthy cybersecurity than the security offered by the other nine alternatives. This research will aid in the development of safe and reliable intrusion detection systems, as well as ML-based cybersecurity attribute analyses.
According to the study’s findings, intrusion detection system IDS-6 best meets the ML-based cyber security attributes that were used to evaluate the idealness of intrusion detection systems from a ML-based cybersecurity perspective. With a performance score of 0.635660, it was determined to be the best in terms of delivering an ideal and trustworthy ML-based cybersecurity mechanism against potential threats. The main observations and results of the study are concluded in the following points.
  • In this research experiment, the ML-based cybersecurity attributes are prioritized in this sequential order: accuracy, anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity, spam detection, and phishing detection, having the global normalized weights 0.273937, 0.222015, 0.127306, 0.122505, 0.10973, 0.053217, 0.052354, and 0.038937, respectively.
  • After IDS-6, the following competing alternatives are ranked in order based on their produced performance scores: IDS-8, IDS-9, IDS-7, IDS-5, IDS-4, IDS-3, IDS-10, IDS-1, and IDS-2 in terms of identified weighted ML-based cybersecurity attributes.
  • ML-based cybersecurity provided by intrusion detection systems is a challenging issue, and in this league, our study offers accurate recommendations for developing ideal and effective machine learning-based intrusion detection systems.
  • This study was performed specifically for the intrusion detection systems deployed in healthcare environments. However, it may be used as a guideline for building any sort of ideal and effective intrusion detection systems, because the assessment attributes are identified on the basis of generalization.

7. Conclusions

The findings of this research reveal that cyber security issues and breaches have been a tough challenge to researchers and security experts for the last few years. The experts and the researchers have used a variety of methodologies and strategies to develop trustworthy and effective security systems. Machine learning is one of the most famous ones, and it plays a crucial role in the cybersecurity sphere. In this league, we analyzed the impact of cyber security related attributes for intrusion detection systems through hesitant fuzzy-based AHP-TOPSIS. This methodology will help the researchers and the developers to prioritize the cyber security attributes accordingly and develop more secure and reliable intrusion detection systems. However, research is both a dynamic and continuous activity. As a result, while our ML-based cybersecurity evaluation is accurate, it cannot contend for the optimality of outcomes. There are additional MCDM approaches that may be utilized to provide more efficient outcomes. Nonetheless, our empirical findings show that we have selected a reliable method for this evaluation.

Author Contributions

All authors have contributed equally to the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The project has been funded by Taif University, Kingdom of Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to security and privacy issues.

Acknowledgments

This research was supported by Taif University Researchers Supporting Project number (TURSP-2020/231), Taif University, Taif, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Samuel, A.L. Some Studies in Machine Learning Using the Game of Checkers. IBM J. Res. Dev. 1959, 3, 210–229. [Google Scholar] [CrossRef]
  2. Mitchell, T.M. Machine Learning; McGraw-Hill: New York, NY, USA, 1997; pp. 386–387. [Google Scholar]
  3. Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [Google Scholar] [CrossRef] [PubMed]
  4. Harrington, P. Machine Learning in Action; Simon and Schuster: New York, NY, USA, 2012. [Google Scholar]
  5. Dua, S.; Du, X. Data Mining and Machine Learning in Cybersecurity; CRC Press: New York, NY, USA, 2016. [Google Scholar]
  6. Tsai, C.-F.; Hsu, Y.-F.; Lin, C.-Y.; Lin, W.-Y. Intrusion detection by machine learning: A review. Expert Syst. Appl. 2009, 36, 11994–12000. [Google Scholar] [CrossRef]
  7. Belavagi, M.C.; Muniyal, B. Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection. Procedia Comput. Sci. 2016, 89, 117–123. [Google Scholar] [CrossRef] [Green Version]
  8. Agrawal, A.; Seh, A.H.; Baz, A.; AlHakami, H.; AlHakami, W.; Baz, M.; Kumar, R.; Khan, R.A. Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective. Symmetry 2020, 12, 598. [Google Scholar] [CrossRef] [Green Version]
  9. Kumar, R.; Khan, A.I.; Abushark, Y.B.; ALAM, M.; Agrawal, A.; Khan, R.A. An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications. IEEE Access 2020, 8, 50944–50957. [Google Scholar] [CrossRef]
  10. Solangi, Y.A.; Tan, Q.; Mirjat, N.H.; Das Valasai, G.; Khan, M.W.A.; Ikram, M. An integrated Delphi-AHP and fuzzy TOPSIS approach toward ranking and selection of renewable energy resources in Pakistan. Processes 2019, 7, 118. [Google Scholar] [CrossRef] [Green Version]
  11. Kumar, R.; Baz, A.; Alhakami, H.; Alhakami, W.; Baz, M.; Agrawal, A.; Khan, R.A. A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software. IEEE Access 2020, 8, 72694–72712. [Google Scholar] [CrossRef]
  12. Alharbe, N. A fuzzy-Delphi based decision-making process for measuring usable-security of Web based smart hospital management system. ICIC Express Lett. 2020, 14, 15–21. [Google Scholar]
  13. Şengül, U.; Eren, M.; Shiraz, S.E.; Gezder, V.; Şengül, A.B. Fuzzy TOPSIS method for ranking renewable energy supply systems in Turkey. Renew. Energy 2015, 75, 617–625. [Google Scholar] [CrossRef]
  14. Qian, G.; Wang, H.; Feng, X. Generalized hesitant fuzzy sets and their application in decision support system. Knowl. Based Syst. 2013, 37, 357–365. [Google Scholar] [CrossRef]
  15. Sahu, K.; Alzahrani, F.A.; Srivastava, R.K.; Kumar, R. Hesitant Fuzzy Sets Based Symmetrical Model of Decision-Making for Estimating the Durability of Web Application. Symmetry 2020, 12, 1770. [Google Scholar] [CrossRef]
  16. Torra, V.; Narukawa, Y. On hesitant fuzzy sets and decision. In Proceedings of the 2009 IEEE International Conference on Fuzzy Systems, Jeju, Korea, 20–24 August 2009; pp. 1378–1382. [Google Scholar]
  17. AlMotiri, S.H. Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach. IEEE Access 2021, 9, 10751–10764. [Google Scholar] [CrossRef]
  18. Bekesiene, S.; Vasiliauskas, A.V.; Hošková-Mayerová, Š.; Vasilienė-Vasiliauskienė, V. Comprehensive Assessment of Distance Learning Modules by Fuzzy AHP-TOPSIS Method. Mathematics 2021, 9, 409. [Google Scholar] [CrossRef]
  19. Kaur, J.; Khan, A.I.; Abushark, Y.B.; Alam, M.; Khan, S.A.; Agrawal, A.; Kumar, R.; Khan, R.A. Security risk assessment of healthcare Web application through adaptive neuro-fuzzy inference system: A design perspec-tive. Risk Manag. Healthc. Policy 2020, 13, 355–371. [Google Scholar] [CrossRef]
  20. Goutam, A.; Tiwari, V. Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 601–605. [Google Scholar]
  21. Büyüközkan, G.; Çifçi, G. A combined fuzzy AHP and fuzzy TOPSIS based strategic analysis of electronic service quality in healthcare industry. Expert Syst. Appl. 2012, 39, 2341–2354. [Google Scholar] [CrossRef]
  22. Handa, A.; Sharma, A.; Shukla, S.K. Machine learning in cybersecurity: A review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2019, 9, 1306. [Google Scholar] [CrossRef]
  23. Dasgupta, D.; Akhtar, Z.; Sen, S. Machine learning in cybersecurity: A comprehensive survey. J. Déf. Model. Simul. Appl. Methodol. Technol. 2020, 154, 8. [Google Scholar] [CrossRef]
  24. Thomas, T.; Vijayaraghavan, A.P.; Emmanuel, S. Machine Learning Approaches in Cyber Security Analytics; Springer: New York, NY, USA, 2020; pp. 37–200. [Google Scholar]
  25. Crawford, M.; Khoshgoftaar, T.M.; Prusa, J.D.; Richter, A.N.; Al Najada, H. Survey of review spam detection using machine learning techniques. J. Big Data 2015, 2, 23. [Google Scholar] [CrossRef] [Green Version]
  26. Forouzan, A.B. Data Communications Networking, 3rd ed.; Tata McGraw-Hill Education: New York, NY, USA, 2007. [Google Scholar]
  27. Seh, A.H.; Al-Amri, J.F.; Subahi, A.F.; Agrawal, A.; Kumar, R.; Khan, R.A. Machine Learning Based Framework for Maintaining Privacy of Healthcare Data. Intell. Autom. Soft Comput. 2021, 29, 697–712. [Google Scholar] [CrossRef]
  28. Sahu, K.; Alzahrani, F.A.; Srivastava, R.K.; Kumar, R. Evaluating the Impact of Prediction Techniques: Software Reliability Perspective. Comput. Mater. Contin. 2021, 67, 1471–1488. [Google Scholar] [CrossRef]
  29. Agrawal, A.; Alenezi, M.; Khan, S.A.; Kumar, R.; Khan, R.A. Multi-Level Fuzzy system for usable-Security assessment. J. King Saud Univ. Comput. Inf. Sci. 2019, 1–21. [Google Scholar] [CrossRef]
Figure 1. Idealness assessment attribute tree for ML-based intrusion detection systems.
Figure 1. Idealness assessment attribute tree for ML-based intrusion detection systems.
Sustainability 13 12337 g001
Figure 2. Sequential working procedure of AHP-TOPSIS under fuzzy conditions.
Figure 2. Sequential working procedure of AHP-TOPSIS under fuzzy conditions.
Sustainability 13 12337 g002
Table 1. HF-AHP standard scale.
Table 1. HF-AHP standard scale.
RankAbbreviationLinguistic TermTriangular Fuzzy Number
10AHIAbsolutely High Importance(7.0000, 9.0000, 9.0000)
9VHIVery High Importance(5.0000, 7.0000, 9.0000)
8ESHIEssentially High Importance(3.0000, 5.0000, 7.0000)
7WHIWeakly High Importance(1.0000, 3.0000, 5.0000)
6EHIEqually High Importance(1.0000, 1.0000, 3.0000)
5EEExactly Equal(1.0000, 1.0000, 1.0000)
4ELIEqually Low Importance(0.3300, 1.0000, 1.0000)
3WLIWeakly Low Important(0.2000, 0.3300, 1.0000)
2ESLIEssentially Low Importance(0.1400, 0.2000, 0.3300)
1VLIVery Low Importance(0.1100, 0.1400, 0.2000)
0ALIAbsolutely Low Importance(0.1100, 0.1100, 0.1400)
Table 2. Trapezoidal fuzzy pair-wise comparison matrix at level 1.
Table 2. Trapezoidal fuzzy pair-wise comparison matrix at level 1.
CSA1CSA2CSA3CSA4CSA5CSA6CSA7CSA8
CSA11.00000, 1.00000, 1.00000, 1.000000.02440, 0.07540, 0.23620, 0.888100.01402, 0.04390, 0.12750, 0.469700.01270, 0.03480, 0.09340, 0.343000.00930, 0.03480, 0.08710, 0.293600.00440, 0.01710, 0.06610, 0.210100.00068, 0.03405, 0.12320, 0.332400.01009, 0.04701, 0.15506, 0.16903
CSA2-1.00000, 1.00000, 1.00000, 1.000000.02607, 0.06102, 0.36090, 0.691000.30090, 0.41403, 0.89800, 1.545010.13082, 0.23080, 0.63051, 0.691000.06600, 0.12400, 0.40300, 0.490100.1340, 0.2570, 0.5810, 0.84000.00303, 0.01094, 0.13072, 0.74060
CSA3--1.00000, 1.00000, 1.00000, 1.000000.20400, 0.29100, 0.53500, 1.000000.00500, 0.02109, 0.12604, 0.888010.14100, 0.29100, 0.37100, 0.687000.00200, 0.01208, 0.04703, 0.320270.00016, 0.00093, 0.09052, 0.43061
CSA4---1.00000, 1.00000, 1.00000, 1.000000.20040, 0.29010, 0.53500, 1.000000.00500, 0.02190, 0.12604, 0.880810.14100, 0.29010, 0.37010, 0.680700.00200, 0.01208, 0.04703, 0.32207
CSA5----1.00000, 1.00000, 1.00000, 1.000000.08030, 0.20100, 0.37100, 0.476000.00102, 0.00808, 0.04703, 0.223060.00004, 0.00301, 0.01701, 0.11703
CSA6-----1.00000, 1.00000, 1.00000, 1.000000.03050, 0.08800, 0.18300, 0.342000.00101, 0.00600, 0.02905, 0.23102
CSA7------1.00000, 1.00000, 1.00000, 1.000000.08600, 0.17200, 0.31060, 0.67040
CSA8-------1.00000, 1.00000, 1.00000, 1.00000
Table 3. Defuzzification and normalized weights.
Table 3. Defuzzification and normalized weights.
CSA1CSA2CSA3CSA4CSA5CSA6CSA7CSA8Normalized Weights
CSA11.000000.292550.987080.382030.641300.249600.993300.199900.052354
CSA23.418221.000000.162100.162200.139200.193400.192200.393500.038937
CSA31.559337.183913.886511.079491.000000.712720.120280.911500.10973
CSA42.61766.165238.968611.000000.926360.102240.352110.762700.122505
CSA55.00252.54132.030041.311131.097090.999490.815521.000000.127306
CSA61.006755.202912.948112.840028.313930.994811.000001.226210.222015
CSA71.013096.169031.000000.111500.257300.111200.339200.492600.053217
CSA84.006415.170638.992819.780911.403081.000001.005221.000510.273937
C.R. = 0.03485540
Table 4. Subjective cognition results of evaluators in linguistic terms.
Table 4. Subjective cognition results of evaluators in linguistic terms.
Attributes (SDA/Alternatives)IDS-1IDS-2IDS-3IDS-4IDS-5IDS-6IDS-7IDS-8IDS-9IDS-10
CSA13.25100, 5.12100, 7.14100, 8.712003.15400, 5.15400, 6.91400, 7.742002.82200, 4.62400, 6.64200, 8.722001.55000, 3.18000, 5.18000, 6.720001.46500, 3.18500, 5.18200, 7.724002.54679, 4.26458, 6.22156, 8.644442.91100, 4.64100, 6.00111, 6.415001.45000, 3.00000, 4.91500, 5.435001.18400, 2.84200, 4.84200, 6.454002.09645, 3.73200, 5.74300, 6.45900
CSA24.21800, 5.31700, 6.31700, 7.712002.45400, 4.45400, 6.45400, 7.445002.91200, 4.64200, 6.00200, 6.425001.45000, 3.00000, 4.91000, 5.450001.18100, 2.81200, 4.82200, 6.452002.15469, 3.75467, 5.73124, 6.454673.18100, 5.12800, 7.10225, 8.652001.45400, 3.07200, 4.91400, 5.625000.82400, 2.27400, 4.27400, 6.654003.01640, 4.82300, 6.82300, 7.65400
CSA34.21700, 6.27100, 8.14100, 8.712002.84200, 4.82400, 5.84200, 6.454003.18200, 5.18200, 7.10220, 8.651001.45000, 3.07000, 4.91000, 5.650000.82200, 2.27300, 4.27300, 6.653003.31546, 4.82167, 6.83125, 7.696452.45300, 4.43500, 6.45300, 7.653000.94100, 2.42500, 4.45100, 5.652002.45500, 4.27500, 6.27500, 8.655003.91100, 5.91300, 7.82200, 8.65500
CSA43.25100, 5.11200, 7.14200, 8.722003.14500, 5.15400, 6.94100, 7.724002.82100, 4.61400, 6.64100, 8.712001.55000, 3.18000, 5.18000, 6.720001.43500, 3.18300, 5.18300, 7.723002.91200, 4.64200, 6.00200, 6.425001.45000, 3.00000, 4.91000, 5.450001.18100, 2.81200, 4.82200, 6.452002.15469, 3.75467, 5.73124, 6.454673.18100, 5.12800, 7.10225, 8.65200
CSA54.22800, 5.32700, 6.37200, 7.722002.44500, 4.45400, 6.45400, 7.454002.91100, 4.64100, 6.00111, 6.415001.45000, 3.00000, 4.91500, 5.435001.18400, 2.84200, 4.84200, 6.454003.18200, 5.18200, 7.10220, 8.651001.45000, 3.07000, 4.91000, 5.650000.82200, 2.27300, 4.27300, 6.653003.31546, 4.82167, 6.83125, 7.696452.45300, 4.43500, 6.45300, 7.65300
CSA64.27200, 6.22700, 8.14200, 8.732002.82400, 4.82300, 5.82300, 6.453003.18100, 5.12800, 7.10225, 8.652001.45400, 3.07200, 4.91400, 5.625000.82400, 2.27400, 4.27400, 6.654003.01640, 4.82300, 6.82300, 7.654003.18100, 5.12800, 7.10225, 8.652001.45400, 3.07200, 4.91400, 5.625000.82400, 2.27400, 4.27400, 6.654003.01640, 4.82300, 6.82300, 7.65400
CSA75.36300, 6.33600, 7.12300, 8.513003.7300, 5.73300, 7.55300, 8.653002.45300, 4.43500, 6.45300, 7.653000.94100, 2.42500, 4.45100, 5.652002.45500, 4.27500, 6.27500, 8.655003.91100, 5.91300, 7.82200, 8.655002.45300, 4.43500, 6.45300, 7.653000.94100, 2.42500, 4.45100, 5.652002.45500, 4.27500, 6.27500, 8.655003.91100, 5.91300, 7.82200, 8.65500
CSA84.64300, 5.64300, 7.55300, 8.843003.03000, 5.00300, 7.14300, 7.513002.18300, 4.09300, 6.14400, 7.513002.82400, 4.64400, 6.64400, 8.514001.91500, 3.74300, 5.73500, 7.512002.55700, 4.45500, 6.45600, 8.516002.85464, 4.64540, 6.64000, 8.510001.91000, 3.73000, 5.73000, 7.510001.45000, 3.00000, 4.91000, 5.450001.18000, 2.82000, 4.82000, 6.45000
Table 5. The normalized fuzzy-decision matrix.
Table 5. The normalized fuzzy-decision matrix.
IDS-1IDS-2IDS-3IDS-4IDS-5IDS-6IDS-7IDS-8IDS-9IDS-10
CSA10.32450, 0.46580, 0.55250, 0.634700.60040, 0.81200, 0.85800, 0.960900.63690, 0.81660, 0.58960, 0.966700.23210, 0.38210, 0.54280, 0.732620.35250, 0.55620, 0.62970, 0.847200.62555, 0.87250, 0.93560, 0.985900.48350, 0.61599, 0.70350, 0.839500.34620, 0.55230, 0.66240, 0.812700.43370, 0.63630, 0.73360, 0.858300.33540, 0.52540, 0.61580, 0.78050
CSA20.20040, 0.32200, 0.43700, 0.547000.55440, 0.84564, 0.85467, 0.964970.61160, 0.77620, 0.85660, 0.945600.38020, 0.57240, 0.72220, 0.082200.42210, 0.65278, 0.75720, 0.912900.61520, 0.85500, 0.91570, 0.965800.24520, 0.39570, 0.54750, 0.745300.45220, 0.66820, 0.76210, 0.898000.61310, 0.77320, 0.85360, 0.945300.61250, 0.85500, 0.91570, 0.96850
CSA30.23010, 0.35080, 0.44070, 0.570000.37320, 0.56350, 0.69330, 0.833500.57460, 0.72560, 0.79260, 0.896600.24920, 0.41320, 0.53220, 0.742100.24220, 0.39270, 0.54270, 0.742300.45520, 0.66850, 0.76150, 0.895800.46510, 0.65570, 0.76550, 0.905500.27250, 0.45620, 0.53320, 0.732300.57430, 0.72530, 0.73920, 0.896300.34620, 0.55230, 0.66240, 0.81270
CSA40.25074, 0.38070, 0.43700, 0.540000.03730, 0.10350, 0.24320, 0.510300.03968, 0.10555, 0.19250, 0.384500.42230, 0.62490, 0.76240, 0.882000.46310, 0.65370, 0.76350, 0.903500.27550, 0.45560, 0.53350, 0.735300.42210, 0.65278, 0.75720, 0.912900.61520, 0.85500, 0.91570, 0.965800.24520, 0.39570, 0.54750, 0.745300.45220, 0.66820, 0.76210, 0.89800
CSA50.45090, 0.61020, 0.65030, 0.680800.29430, 0.43840, 0.56330, 0.742030.48350, 0.61599, 0.70350, 0.839500.34620, 0.55230, 0.66240, 0.812700.43370, 0.63630, 0.73360, 0.858300.33540, 0.52540, 0.61580, 0.780500.24220, 0.39270, 0.54270, 0.742300.45520, 0.66850, 0.76150, 0.895800.46510, 0.65570, 0.76550, 0.905500.27250, 0.45620, 0.53320, 0.73230
CSA60.30750, 0.44450, 0.54457, 0.640520.24390, 0.41330, 0.53320, 0.743100.24520, 0.39570, 0.54750, 0.745300.45220, 0.66820, 0.76210, 0.898000.61310, 0.77320, 0.85360, 0.945300.42230, 0.62490, 0.76240, 0.882000.46310, 0.65370, 0.76350, 0.903500.27550, 0.45560, 0.53350, 0.735300.42210, 0.65278, 0.75720, 0.912900.61520, 0.85500, 0.91570, 0.96580
CSA70.61020, 0.80500, 0.91070, 0.960800.42330, 0.64390, 0.76340, 0.880440.46510, 0.65570, 0.76550, 0.905500.27250, 0.45620, 0.53320, 0.732300.57430, 0.72530, 0.73920, 0.896300.34620, 0.55230, 0.66240, 0.812700.43370, 0.63630, 0.73360, 0.858300.33540, 0.52540, 0.61580, 0.780500.24220, 0.39270, 0.54270, 0.742300.45520, 0.66850, 0.76150, 0.89580
CSA80.57400, 0.72500, 0.79200, 0.890600.34560, 0.55350, 0.66450, 0.815700.43570, 0.63650, 0.73650, 0.855800.33240, 0.52420, 0.61820, 0.782000.03980, 0.10022, 0.19220, 0.384200.45220, 0.66820, 0.76210, 0.898000.34650, 0.55530, 0.66450, 0.815700.43750, 0.63650, 0.73560, 0.855800.33540, 0.52540, 0.61850, 0.780500.03580, 0.10555, 0.19520, 0.38450
Table 6. The weighted normalized fuzzy-decision matrix.
Table 6. The weighted normalized fuzzy-decision matrix.
IDS-1IDS-2IDS-3IDS-4IDS-5IDS-6IDS-7IDS-8IDS-9IDS-10
CSA10.00080, 0.01020, 0.01600, 0.021000.11050, 0.16070, 0.18030, 0.190900.14020, 0.17900, 0.19800, 0.210900.05070, 0.08500, 0.10800, 0.130100.05505, 0.08070, 0.10040, 0.122000.04208, 0.05900, 0.06400, 0.068000.05800, 0.08050, 0.09500, 0.118000.02030, 0.03700, 0.04300, 0.055000.00090, 0.02300, 0.04500, 0.059000.08070, 0.09040, 0.09400, 0.10100
CSA20.00807, 0.01035, 0.01700, 0.021000.07074, 0.11800, 0.14400, 0.173000.13300, 0.16800, 0.18400, 0.200800.03701, 0.06106, 0.07900, 0.110000.03020, 0.05300, 0.07200, 0.098000.03020, 0.04070, 0.05030, 0.060300.14800, 0.18091, 0.20060, 0.220400.03404, 0.05700, 0.08200, 0.110000.04070, 0.07040, 0.09020, 0.110200.04304, 0.05010, 0.06060, 0.06090
CSA30.01200, 0.01800, 0.02100, 0.020400.12500, 0.16090, 0.18050, 0.200100.14080, 0.18091, 0.20060, 0.220400.03404, 0.05700, 0.08200, 0.110000.04700, 0.07400, 0.09020, 0.110200.04304, 0.05100, 0.06060, 0.060900.14200, 0.17090, 0.19800, 0.210900.05700, 0.08500, 0.10800, 0.131000.05055, 0.08070, 0.10040, 0.120200.04028, 0.05900, 0.06400, 0.06800
CSA40.00080, 0.01200, 0.01600, 0.020100.11500, 0.16070, 0.18030, 0.190900.14200, 0.17090, 0.19080, 0.219000.05700, 0.08500, 0.10080, 0.130100.05505, 0.08700, 0.10400, 0.120200.04208, 0.05900, 0.06400, 0.060800.13030, 0.16080, 0.18400, 0.200800.03701, 0.06106, 0.07900, 0.110000.03200, 0.05300, 0.07200, 0.098000.03020, 0.04700, 0.05300, 0.06300
CSA50.00807, 0.01305, 0.01070, 0.021000.07704, 0.11800, 0.14400, 0.173000.13300, 0.16800, 0.18400, 0.200800.03701, 0.06016, 0.07090, 0.110000.03200, 0.05300, 0.07020, 0.098000.03200, 0.04700, 0.05300, 0.063000.00090, 0.02030, 0.04050, 0.050900.06300, 0.09709, 0.11400, 0.131000.06010, 0.08700, 0.10100, 0.120000.01900, 0.03025, 0.03800, 0.05100
CSA60.01000, 0.01500, 0.01011, 0.020000.00800, 0.02204, 0.05002, 0.100000.00900, 0.02300, 0.04500, 0.050900.06300, 0.09709, 0.11400, 0.131000.06010, 0.08070, 0.10010, 0.120000.01900, 0.03205, 0.03800, 0.050100.11200, 0.14040, 0.16030, 0.190500.05160, 0.08200, 0.09900, 0.122000.05800, 0.08050, 0.09500, 0.110800.02300, 0.03700, 0.04300, 0.05500
CSA70.01073, 0.02033, 0.02500, 0.027000.06101, 0.10100, 0.11070, 0.154000.11020, 0.14040, 0.16030, 0.190500.05016, 0.08020, 0.09900, 0.122000.05080, 0.08050, 0.09050, 0.118000.02300, 0.03700, 0.04300, 0.055000.14200, 0.17090, 0.19080, 0.210900.05700, 0.08500, 0.10800, 0.131000.05505, 0.08070, 0.10400, 0.122000.04208, 0.05900, 0.06400, 0.06800
CSA80.08504, 0.09030, 0.09300, 0.090860.03701, 0.06016, 0.07090, 0.110000.03200, 0.05030, 0.07200, 0.090800.03020, 0.04700, 0.05030, 0.060300.14020, 0.17090, 0.19080, 0.219000.03200, 0.04700, 0.05300, 0.063000.13300, 0.16800, 0.18400, 0.200800.03701, 0.06106, 0.07900, 0.110000.03200, 0.05300, 0.07200, 0.098000.03200, 0.04700, 0.05300, 0.06300
Table 7. Closeness coefficients to aspired level among different alternatives.
Table 7. Closeness coefficients to aspired level among different alternatives.
AlternativesDist+Dist−Gaps Degree of CC +iSatisfaction Degree of CC −iAlternative Ranks
IDS-10.3384580.5898570.6552560.3585669
IDS-20.0356590.0474550.6404540.35547510
IDS-30.0356590.0434580.5354250.4645977
IDS-40.0394570.0468550.5356350.4654656
IDS-50.0354590.0428570.5834590.4845455
IDS-60.0455660.0258550.3668550.6356601
IDS-70.0354850.0355550.4694570.5256464
IDS-80.0444550.0264600.3945640.6154532
IDS-90.0355490.0264570.4835460.5756263
IDS-100.2988550.4456850.5865990.4556968
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alharbi, A.; Seh, A.H.; Alosaimi, W.; Alyami, H.; Agrawal, A.; Kumar, R.; Khan, R.A. Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems. Sustainability 2021, 13, 12337. https://doi.org/10.3390/su132212337

AMA Style

Alharbi A, Seh AH, Alosaimi W, Alyami H, Agrawal A, Kumar R, Khan RA. Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems. Sustainability. 2021; 13(22):12337. https://doi.org/10.3390/su132212337

Chicago/Turabian Style

Alharbi, Abdullah, Adil Hussain Seh, Wael Alosaimi, Hashem Alyami, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. 2021. "Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems" Sustainability 13, no. 22: 12337. https://doi.org/10.3390/su132212337

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop