4.6 Article

An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

q-Rung double hierarchy linguistic term set fuzzy AHP; applications in the security system threats features of social media platforms

Wen-Qi Duan et al.

Summary: With the rapid spread of information technology in our daily lives, security has become a significant issue. Users' concerns about social media privacy have risen, and incidents of data breaches have raised worries about information security.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Chemistry, Multidisciplinary

On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

Jesus Diaz-Verdejo et al.

Summary: Signature-based Intrusion Detection Systems (SIDS) are crucial for organizations, but activating default rulesets may impact performance. This study experimentally explores the performance of three SIDS in the context of web attacks, finding that predefined settings significantly influence detection capability and false alarm rate.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model

Hashem Alyami et al.

Summary: Cyber-attacks are increasingly complex, posing challenges for intrusion-detection systems and the trustworthiness of security services. Organizations are using various methods to safeguard system credibility, including establishing policies, raising user awareness, and selecting efficient IDS.

ELECTRONICS (2022)

Article Computer Science, Interdisciplinary Applications

Evaluation of circular supply chains barriers in the era of Industry 4.0 transition using an extended decision-making approach

Chao Shang et al.

Summary: The study evaluates the barriers of Circular Supply Chains (CSCs) during the transition to Industry 4.0 using an innovative decision-making approach. The findings identify a lack of knowledge about Industry 4.0 technologies and circular approaches as a primary barrier, followed by issues related to data security, knowledge deficiency in data management, and a lack of awareness of the potential benefits of autonomous systems in labor-oriented activities. The study reveals the importance of understanding these barriers and suggests effective strategies for sustainable development.

JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2022)

Article Computer Science, Information Systems

SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking

Sumit Badotra et al.

Summary: SDN offers many advantages by separating network intelligence from underlying infrastructure, but also introduces security concerns. DDoS attacks pose a significant threat to SDN growth, emphasizing the need for early detection. This study presents an early DDoS detection tool using SNORT IDS, which effectively detects fast DDoS attacks, enhancing SDN controller performance without compromising overall network functionality.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

A survey on intrusion detection and prevention systems in digital substations

Silvio E. Quincozes et al.

Summary: Smart Grids integrate the traditional power grid with information processing and communication technologies, with substation intelligent devices now communicating digitally for remote information gathering, monitoring, and control. The IEC-61850 international standard addresses substation communication networks and systems, but standardized communication brings new cyber-security challenges. Research focuses on analyzing attacks exploiting IEC-61850 substations and efforts to detect and prevent them.

COMPUTER NETWORKS (2021)

Article Green & Sustainable Science & Technology

Hybrid Multi-Criteria Decision Making approach for the evaluation of sustainable photovoltaic farms locations

Mohamed Abdel-Basset et al.

Summary: Due to the increased demand for energy, renewable energy sources like solar energy have become more popular. The need to identify suitable locations for solar photovoltaic farms involves consideration of various factors such as technical, economic, environmental, sociopolitical dimensions, and risks. The hybrid multi-criteria decision-making approach used in this study facilitated the ranking of solar photovoltaic farm locations in Egypt, with the Benban solar photovoltaic farm identified as the most sustainable option.

JOURNAL OF CLEANER PRODUCTION (2021)

Article Computer Science, Artificial Intelligence

Analyzing and controlling computer security threats based on complex q-rung orthopair fuzzy heronian mean operators

Thammarat Panityakul et al.

Summary: The study combines the complex q-rung orthopair fuzzy set (Cq-ROFS) with the principle of Heronian mean (HM) operator to introduce a series of new operators for aggregating attributes to determine reliability and consistency. Physical and non-physical threats exist in computer systems, requiring specific operators for analysis and control. The reliability and efficacy of the proposed approaches are demonstrated through numerical examples, comparative analysis, advantages, and graphical interpretations.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2021)

Article Chemistry, Analytical

Internet of Things: Evolution, Concerns and Security Challenges

Parushi Malhotra et al.

Summary: The rapid growth of IoT has unlocked the vision of a smart world but also raised significant security concerns. The research focuses on intrusion detection systems, analyzes various threats, discusses healthcare applications and security issues in IoT, and addresses research challenges for dealing with anomalies effectively.

SENSORS (2021)

Article Chemistry, Multidisciplinary

Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems

Nuno Oliveira et al.

Summary: This study proposed a sequential approach and evaluated the performance of different machine learning techniques on the CIDDS-001 dataset. Experimental outcomes suggest that anomaly detection can be better addressed from a sequential perspective, with Long-Short Term Memory (LSTM) proving to be highly reliable in acquiring sequential patterns in network traffic data.

APPLIED SCIENCES-BASEL (2021)

Article Green & Sustainable Science & Technology

Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

Abdullah Alharbi et al.

Summary: Machine learning plays a critical role in providing proactive security mechanisms in cybersecurity, swiftly responding to intrusions and security incidents. Current cybersecurity issues include anomaly detection, phishing attacks, and malware identification, with the assessment using multi-criteria decision making methods and hesitant fuzzy sets to build more effective intrusion detection systems.

SUSTAINABILITY (2021)

Article Computer Science, Artificial Intelligence

A q-rung orthopair fuzzy ARAS method based on entropy and discrimination measures: an application of sustainable recycling partner selection

Arunodaya Raj Mishra et al.

Summary: The study proposed an integrated framework to address multi-criteria SRP selection problem using the q-ROFS model, and verified the robustness of the framework through sensitivity analysis.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Automation & Control Systems

A New Extended VIKOR Approach Using q-Rung Orthopair Fuzzy Sets for Sustainable Enterprise Risk Management Assessment in Manufacturing Small and Medium-Sized Enterprises

Sun Cheng et al.

Summary: The study aims to develop a comprehensive framework for implementing the ERM framework under the sustainability platform, considering 29 sub-criteria based on four main aspects. A new fuzzy decision-making approach (VIKOR-q-ROFSs) is introduced to identify, rank, and evaluate the main criteria of SERM.

INTERNATIONAL JOURNAL OF FUZZY SYSTEMS (2021)

Article Computer Science, Information Systems

An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks

Georgios Zachos et al.

Summary: The healthcare sector is undergoing transformation due to the rise of IoT and IoMT technology, which aims to improve patient's quality of life. However, the vulnerability of IoMT networks to threats requires the development of novel security mechanisms, such as effective intrusion detection systems.

ELECTRONICS (2021)

Article Computer Science, Artificial Intelligence

An effective approach for the protection of user commodity viewing privacy in e-commerce website

Zongda Wu et al.

Summary: This paper proposes a method to protect users' commodity viewing privacy by constructing dummy requests on a trusted client to confuse and cover up user preferences on the untrusted server-side. The study introduces a privacy model and an implementation algorithm to measure the effectiveness of confusion and cover-up effects. The results show that the proposed approach effectively enhances the security of users' commodity viewing privacy on the untrusted server-side.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Construction & Building Technology

Using the internet of things in smart energy systems and networks

Tanveer Ahmad et al.

Summary: Private businesses and policymakers are driving the adoption of smart grid technology innovations to support smart energy systems, utilizing advances like IoT for energy applications. The study explores various IoT applications in energy systems, including business operations, data transmission networks, and power generation, aiming to provide insights into recent developments and revenue opportunities in the IoT energy market, which is projected to reach $26.5 billion by 2023.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Chemistry, Analytical

Generator of Slow Denial-of-Service Cyber Attacks

Marek Sikora et al.

Summary: The volume of cyber attacks is growing every year, with DoS attacks being one of the most common and dangerous types. Slow DoS attacks are difficult to detect accurately, leading to the development of an advanced attack generator for testing vulnerabilities and enhancing network system security.

SENSORS (2021)

Review Computer Science, Information Systems

A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0

Valentin Mullet et al.

Summary: Industry 4.0 is a manufacturing revolution that introduces disruptive technologies such as IoT and cloud computing, increasing automation and improving production efficiency, but also posing cybersecurity threats. This paper discusses concepts and practices related to cybersecurity in Industry 4.0 manufacturing factories, presenting vulnerabilities, threats, and recent cybersecurity solutions.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach

Sultan H. Almotiri

Summary: In the rapidly evolving landscape of cyber threats, effective detection of malicious traffic is crucial. Traditional detection systems may fail to recognize many known or modern security threats, highlighting the need for more advanced approaches.

IEEE ACCESS (2021)

Article Automation & Control Systems

Some q-rung orthopair fuzzy Hamacher aggregation operators and their application to multiple attribute group decision making with modified EDAS method

Adjei Peter Darko et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Artificial Intelligence

A Fuzzy-AHP based prioritization of trust criteria in fog computing services

Sunday Oyinlola Ogundoyin et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

A Local Feature Engineering Strategy to Improve Network Anomaly Detection †

Salvatore Carta et al.

FUTURE INTERNET (2020)

Article Computer Science, Information Systems

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

Panagiotis Radoglou-Grammatikis et al.

IEEE ACCESS (2019)

Review Telecommunications

Review of Recent Detection Methods for HTTP DDoS Attack

Ghafar A. Jaafar et al.

JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2019)

Article Computer Science, Artificial Intelligence

Some q-Rung Orthopair Fuzzy Aggregation Operators and their Applications to Multiple-Attribute Decision Making

Peide Liu et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Some q-rung orthopair fuzzy Heronian mean operators in multiple attribute decision making

Guiwu Wei et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Exponential operation and aggregation operator for q-rung orthopair fuzzy set and their decision-making method with a new score function

Xindong Peng et al.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2018)

Review Computer Science, Information Systems

When Intrusion Detection Meets Blockchain Technology: A Review

Weizhi Meng et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

Generalized Orthopair Fuzzy Sets

Ronald R. Yager

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2017)