IDEAS home Printed from https://ideas.repec.org/a/wsi/ijitdm/v22y2023i01ns021962202230004x.html
   My bibliography  Save this article

Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review

Author

Listed:
  • Amneh Alamleh

    (Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia††Department of Artificial Intelligence, Faculty of Information Technology, Zarqa University, Zarqa, Jordan)

  • O. S. Albahri

    (��Computer Techniques Engineering Department, Mazaya University College, Nasiriyah, Iraq)

  • A. A. Zaidan

    (��Faculty of Engineering & IT, the British University in Dubai, UAE)

  • A. H. Alamoodi

    (Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia)

  • A. S. Albahri

    (�Informatics Institute for Postgraduate Studies (IIPS), Iraqi Commission for Computers and Informatics (ICCI), Baghdad, Iraq)

  • B. B. Zaidan

    (�Future Technology Research Center, National Yunlin University of Science and Technology, Douliou, Taiwan)

  • Sarah Qahtan

    (��Department of Computer Center, Middle Technical University’s, Baghdad, Iraq)

  • Amelia Ritahani binti Ismail

    (*Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Kuala Lumpur, Malaysia)

  • R. Q. Malik

    (��‡Department of Medical Instrumentation Techniques Engineering, Al-Mustaqbal University College, Hillah, Iraq)

  • M. J. Baqer

    (�§Foundation of Alshuhda, Baghdad, Iraq)

  • Ali Najm Jasim

    (�§Foundation of Alshuhda, Baghdad, Iraq)

  • Mohammed S. Al-Samarraay

    (Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia)

Abstract

Intrusion detection systems (IDSs) employ sophisticated security techniques to detect malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security of computer and network systems. However, numerous evaluation and selection issues related to several cybersecurity aspects of IDSs were solved using a decision support approach. The approach most often utilized for decision support in this regard is multi-attribute decision-making (MADM). MADM can aid in selecting the most optimal solution from a huge pool of available alternatives when the appropriate evaluation attributes are provided. The openness of the MADM methods in solving numerous cybersecurity issues makes it largely efficient for IDS applications. We must first understand the available solutions and gaps in this area of research to provide an insightful analysis of the combination of MADM techniques with IDS and support researchers. Therefore, this study conducts a systematic review to organize the research landscape into a consistent taxonomy. A total of 28 articles were considered for this taxonomy and were classified into three main categories: data analysis and detection (n=4), response selection (n=7) and IDS evaluation (n=17). Each category was thoroughly analyzed in terms of a variety of aspects, including the issues and challenges confronted, as well as the contributions of each study. Furthermore, the datasets, evaluation attributes, MADM methods, evaluation and validation and bibliography analysis used by the selected articles are discussed. In this study, we highlighted the existing perspective and opportunities for MADM in the IDS literature through a systematic review, providing researchers with a valuable reference.

Suggested Citation

  • Amneh Alamleh & O. S. Albahri & A. A. Zaidan & A. H. Alamoodi & A. S. Albahri & B. B. Zaidan & Sarah Qahtan & Amelia Ritahani binti Ismail & R. Q. Malik & M. J. Baqer & Ali Najm Jasim & Mohammed S. Al, 2023. "Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 22(01), pages 589-636, January.
  • Handle: RePEc:wsi:ijitdm:v:22:y:2023:i:01:n:s021962202230004x
    DOI: 10.1142/S021962202230004X
    as

    Download full text from publisher

    File URL: http://www.worldscientific.com/doi/abs/10.1142/S021962202230004X
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1142/S021962202230004X?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:ijitdm:v:22:y:2023:i:01:n:s021962202230004x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/ijitdm/ijitdm.shtml .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.