Abstract

Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cited that there has been a rapid increase in both the frequency and the number of cybersecurity breaches in the last decade. Information security has been compromised by intruders at an alarming rate. Anomaly detection, phishing page identification, software vulnerability diagnosis, malware identification, and denial of services attacks are the main cyber-security issues that demand effective solutions. Researchers and experts have been practicing different approaches to address the current cybersecurity issues and challenges. However, in this research endeavor, our objective is to make an idealness assessment of machine learning-based intrusion detection systems (IDS) under the hesitant fuzzy (HF) conditions, using a multi-criteria decision making (MCDM)-based analytical hierarchy process (AHP) and technique for order of preference by similarity to ideal-solutions (TOPSIS). Hesitant fuzzy sets are useful for addressing decision-making situations in which experts must overcome the reluctance to make a conclusion. The proposed research project would assist the machine learning practitioners and cybersecurity specialists in identifying, selecting, and prioritizing cybersecurity-related attributes for intrusion detection systems, and build more ideal and effective intrusion detection systems.

Highlights

  • The progress in ICT is one of the most noticeable changes in the modern world

  • The alternative identification and their ranking evaluation is an integral part of the methodology chosen for our study

  • To determine the idealness assessment of Machine learning (ML)-based intrusion detection system, eight attributes, namely spam detection, phishing detection, malware detection, Denial of service (DoS) attack detection, misuse detection, anomaly detection, implementation complexity, and accuracy were considered for this experiment

Read more

Summary

Introduction

The progress in ICT is one of the most noticeable changes in the modern world. In the last few decades, the technological revolution has greatly influenced the whole world and changed the thinking of people and their lifestyles. One of the prominent and wellknown technologies in this domain is machine learning. A sub-domain of artificial intelligence, was first proposed by Arthur Samuel 1959 [1,2]. There was a significant increase in the use of ML techniques in various fields of life, and today, it is recognized as one of the most imminent and fast growing technologies, for addressing issues such as future event prediction, disease diagnosis, market analysis, email filtering, intrusion detection, image and speech recognition, etc. ML algorithms have a strong ability to learn from both structured and unstructured data, and they may assist automated systems in a variety of real-life fields.

Objectives
Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.