Integrated Fuzzy Based Computational Mechanism for the Selection of Effective Malicious Traffic Detection Approach

被引:12
|
作者
Almotiri, Sultan H. [1 ]
机构
[1] Umm AlQura Univ, Comp Sci Dept, Coll Comp & Informat Sci, Mecca 21955, Saudi Arabia
关键词
Malware; Security; Monitoring; Computer crime; Technological innovation; Market research; Licenses; Anomaly IDS; malicious traffic detection; DDoS; network Security; fuzzy logic; AHP; TOPSIS; PERFORMANCE; DURABILITY; SECURITY; MODEL;
D O I
10.1109/ACCESS.2021.3050420
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become a compelling need. These invaders use overwhelming tactics that mask the nature of attacks and make bad acts seem innocuous. A growing number of trustworthy electronic systems and facilities have been introduced with the fast development of pervasive digital technologies. However threats to cyber-security continue to grow, posing hindrance in the efficient use of digital services. The detection and classification of malicious traffic due to security threats can be done by an efficacious traffic detection approach. The development of a smart, precise malicious traffic detection system has therefore become a subject of extensive research. Current traffic detection systems are typically employed in conventional network traffic detection. These systems sometimes face failure and cannot recognize many known or modern security threats. This is because they rely on conventional algorithms which focus less on precise selection and classification of functions. As a result, several well-known traffic signatures remain unidentified and latent. Hence, there is a need to evaluate each significant malicious traffic detection system based on the performance of the system. In this research work, the author has used the Fuzzy AHP methodology which is designed to address the issues related to the vagueness, uncertainties and total awareness of languages. In addition, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was implemented in order to assess the order of preference. Furthermore, the Multi-Criteria Decision-Making (MCDM) method was used for classifying the impact of the alternatives according to their overall performance. The study's conclusive evaluations will be a corroborative reference for the practitioners working in the domain of assessing and selecting the most effective traffic detection approach for more reliable, efficient and systematic design.
引用
收藏
页码:10751 / 10764
页数:14
相关论文
共 50 条
  • [1] FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection
    Feng, Yongxin
    Kang, Yingyun
    Zhang, Hao
    Zhang, Wenbo
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 240 - 259
  • [2] Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
    Jeon, So-Eun
    Oh, Ye-Sol
    Lee, Yeon-Ji
    Lee, Il-Gu
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 140 (02): : 1669 - 1687
  • [3] Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection
    Saidi, Firas
    Trabelsi, Zouheir
    Ben Ghazela, Henda
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [4] An Adaptive Malicious Domain Detection Mechanism with DNS Traffic
    ShuoXu
    Li, ShuQin
    Meng, Kun
    Wu, LiJun
    Ding, Meng
    [J]. PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 86 - 91
  • [5] A fuzzy set based approach for effective feature selection
    Das, Amit Kumar
    Chakraborty, Basabi
    Goswami, Saptarsi
    Chakrabarti, Amlan
    [J]. FUZZY SETS AND SYSTEMS, 2022, 449 : 187 - 206
  • [6] Anomaly Detection Method for Integrated Encrypted Malicious Traffic Based on RFCNN-GRU
    Zhao, Huiqi
    Ma, Yaowen
    Fan, Fang
    Zhang, Huajie
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 457 - 471
  • [7] A FUZZY-BASED APPROACH FOR TRAFFIC JAM DETECTION
    Abd El-Tawaba, Ayman Hussein
    Fattah, Tarek Abd El
    Mahmood, Mahmood A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 257 - 263
  • [8] Malicious Encryption Traffic Detection Based on NLP
    Yang, Hao
    He, Qin
    Liu, Zhenyan
    Zhang, Qian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [9] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421
  • [10] Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
    Harsha, T.
    Asha, S.
    Soniya, B.
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 471 - 478