264 181
Full Length Article
International Journal of Neutrosophic Science
Volume 23 , Issue 3, PP: 195-207 , 2024 | Cite this article as | XML | Html |PDF

Title

Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study

  Ali Alqazzaz 1 *

1  Department of Information Systems and Cybersecurity, College of Computing and Information Technology, University of Bisha, P.O. Box 344, Bisha 61922, Saudi Arabia
    (aqzaz@ub.edu.sa)


Doi   :   https://doi.org/10.54216/IJNS.230317

Received: August 16, 2023 Revised: November 22, 2023 Accepted: January 30, 2024

Abstract :

 

Information technology security, or Cybersecurity, guards against hostile cyberattacks on computers, mobile devices, servers, electronic systems, and networks. Cybersecurity risks have been a significant concern for any vital digital infrastructure in recent years, and different online cyberattacks are also becoming a significant problem for society. Consequently, it's critical to adopt technology created to provide cybersecurity. However, one should consider the associated hazards while selecting among Cybersecurity systems. We have developed a multi-criteria decision-making (MCDM) approach based on a single-valued neutrosophic set (SVNS). This allows specialists more latitude in assessing the criteria and alternatives using language and overcoming uncertain information. The VIKOR is an MCDM methodology used to rank the other options. The VIKOR method is integrated with the neutrosophic set. There are 18 criteria, and 10 alternatives are used in this study. The sensitivity analysis and comparative analysis are conducted in this study. The sensitivity analysis results show the alternatives' rank is stable under different cases. The comparative analysis compares the suggested method with other MCDM methods. The comparative analysis shows the suggested method was effective compared with other MCDM methods. Machine learning methods predict the type of attack in Cybersecurity. This study uses Three machine learning methods: decision tree, random forest, and support vector machine.

Keywords :

Cybersecurity; Risk Evaluation; SVNS; Machine Learning; Neutrosophic Set 

References :

[1]        S. Musman and A. Turner, “A game theoretic approach to Cybersecurity risk management,” The Journal of Defense Modeling and Simulation, vol. 15, no. 2, pp. 127–146, 2018.

[2]        Y. Cherdantseva et al., “A review of Cybersecurity risk assessment methods for SCADA systems,” Computers & security, vol. 56, pp. 1–27, 2016.

[3]        J. J. Cebula and L. R. Young, “A taxonomy of operational Cybersecurity risks,” Software Engineering Institute, Carnegie Mellon University, 2010.

[4]        H. I. Kure, S. Islam, and M. A. Razzaque, “An integrated Cybersecurity risk management approach for a cyber-physical system,” Applied Sciences, vol. 8, no. 6, p. 898, 2018.

[5]        P. A. S. Ralston, J. H. Graham, and J. L. Hieb, “Cybersecurity risk assessment for SCADA and DCS networks,” ISA transactions, vol. 46, no. 4, pp. 583–594, 2007.

[6]        C. Florackis, C. Louca, R. Michaely, and M. Weber, “Cybersecurity risk,” The Review of Financial Studies, vol. 36, no. 1, pp. 351–407, 2023.

[7]        P. Katsumata, J. Hemenway, and W. Gavins, “Cybersecurity risk management,” in 2010-MILCOM 2010 Military Communications Conference, IEEE, 2010, pp. 890–895.

[8]        M. G. Cains, L. Flora, D. Taber, Z. King, and D. S. Henshel, “Defining Cybersecurity and Cybersecurity risk within a multidisciplinary context using expert elicitation,” Risk Analysis, vol. 42, no. 8, pp. 1643–1669, 2022.

[9]        D. W. Hubbard and R. Seiersen, How to measure anything in cybersecurity risk. John Wiley & Sons, 2023.

[10]      S. L. Pfleeger and D. D. Caputo, “Leveraging behavioral science to mitigate Cybersecurity risk,” Computers & security, vol. 31, no. 4, pp. 597–611, 2012.

[11]      L. Allodi and F. Massacci, “Security events and vulnerability data for cybersecurity risk estimation,” Risk Analysis, vol. 37, no. 8, pp. 1606–1627, 2017.

[12]      S. L. Garfinkel, “The cybersecurity risk,” Communications of the ACM, vol. 55, no. 6, pp. 29–32, 2012.

[13]      A. El-Douh, S. Lu, A. Abdelhafeez, and A. Aziz, “A Neutrosophic Multi-Criteria Model for Evaluating Sustainable Soil Enhancement Methods and their Cost 2 Implications in Construction,” SMIJ, vol. 5, no. 2, p. 11, 2023.

[14]      R. Mohamed and M. M. Ismail, “Harness Ambition of Soft Computing in Multi-Factors of Decision-Making Toward Sustainable Supply Chain in the Realm of Unpredictability,” Multicriteria Algorithms with Applications, vol. 2, pp. 29–42, 2024.

[15]      A. H. Abdel-aziem, H. K. Mohamed, and A. Abdelhafeez, “Neutrosophic Decision Making Model for Investment Portfolios Selection and Optimizing based on Wide Variety of Investment Opportunities and Many Criteria in Market,” Neutrosophic Systems with Applications, vol. 6, pp. 32–38, 2023.

[16]      S. Manna, T. M. Basu, and S. K. Mondal, “A soft set based VIKOR approach for some decision-making problems under complex neutrosophic environment,” Engineering Applications of Artificial Intelligence, vol. 89, p. 103432, 2020.

[17]      M. Abdel-Baset, V. Chang, A. Gamal, and F. Smarandache, “An integrated neutrosophic ANP and VIKOR method for achieving sustainable supplier selection: A case study in importing field,” Computers in Industry, vol. 106, pp. 94–110, 2019.

[18]      A. Abdelhafeez, H. Mahmoud, and A. S. Aziz, “Identify the most Productive Crop to Encourage Sustainable Farming Methods in Smart Farming using Neutrosophic Environment,” Neutrosophic Systems with Applications, vol. 6, pp. 17–24, 2023.

[19]      K. M. Sallam and A. W. Mohamed, “Single Valued Neutrosophic Sets for Assessment Quality of Suppliers under Uncertainty Environment,” Multicriteria Algorithms with Applications, vol. 1, no. 1, pp. 1–10, 2023.

[20]      M. Abdel-Basset, Y. Zhou, M. Mohamed, and V. Chang, “A group decision making framework based on neutrosophic VIKOR approach for e-government website evaluation,” Journal of Intelligent & Fuzzy Systems, vol. 34, no. 6, pp. 4213–4224, 2018.

[21]      H. Eroğlu and R. Şahin, “A neutrosophic VIKOR method-based decision-making with an improved distance measure and score function: case study of selection for renewable energy alternatives,” Cognitive Computation, vol. 12, no. 6, pp. 1338–1355, 2020.

[22]      X. Luo, Z. Wang, L. Yang, L. Lu, and S. Hu, “Sustainable supplier selection based on VIKOR with single-valued neutrosophic sets,” Plos one, vol. 18, no. 9, p. e0290093, 2023.

[23]      S. Yassine and A. Stanulov, “A comparative analysis of machine learning algorithms for the purpose of predicting Norwegian air passenger traffic,” International Journal of Mathematics, Statistics, and Computer Science, vol. 2, pp. 28–43, 2024.

[24]      A. Singh, N. Thakur, and A. Sharma, “A review of supervised machine learning algorithms,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), Ieee, 2016, pp. 1310–1315.

[25]      S. K. Parhi and S. K. Panigrahi, “Alkali–silica reaction expansion prediction in concrete using hybrid metaheuristic optimized machine learning algorithms,” Asian Journal of Civil Engineering, vol. 25, no. 1, pp. 1091–1113, 2024.

[26]      I. H. Sarker, “Machine learning: Algorithms, real-world applications and research directions,” SN computer science, vol. 2, no. 3, p. 160, 2021.

[27]      L. Zheng, M. Mueller, C. Luo, and X. Yan, “Predicting whole-life carbon emissions for buildings using different machine learning algorithms: A case study on typical residential properties in Cornwall, UK,” Applied Energy, vol. 357, p. 122472, 2024.

[28]      B. J. Chelliah, T. P. Latchoumi, and A. Senthilselvi, “Analysis of demand forecasting of agriculture using machine learning algorithm,” Environment, Development and Sustainability, vol. 26, no. 1, pp. 1731–1747, 2024.

[29]      L. Lewis, H.-Y. Huang, V. T. Tran, S. Lehner, R. Kueng, and J. Preskill, “Improved machine learning algorithm for predicting ground state properties,” Nature Communications, vol. 15, no. 1, p. 895, 2024.

[30]      Z. Zhang, C. Johansson, M. Engardt, M. Stafoggia, and X. Ma, “Improving 3-day deterministic air pollution forecasts using machine learning algorithms,” Atmospheric Chemistry and Physics, vol. 24, no. 2, pp. 807–851, 2024.

[31]      M. Khan et al., “Intelligent prediction modeling for flexural capacity of FRP-strengthened reinforced concrete beams using machine learning algorithms,” Heliyon, vol. 10, no. 1, 2024.

[32]      G. Bonaccorso, Machine learning algorithms. Packt Publishing Ltd, 2017.

[33]      B. Mahesh, “Machine learning algorithms-a review,” International Journal of Science and Research (IJSR).[Internet], vol. 9, pp. 381–386, 2020.

[34]      M. Alyami et al., “Predictive modeling for compressive strength of 3D printed fiber-reinforced concrete using machine learning algorithms,” Case Studies in Construction Materials, vol. 20, p. e02728, 2024.

[35]      D. Hu, Y. Wang, G. Ji, and Y. Liu, “Using machine learning algorithms to predict the prognosis of advanced nasopharyngeal carcinoma after intensity-modulated radiotherapy,” Current Problems in Cancer, vol. 48, p. 101040, 2024.

[36]      A. Borodulin, A. Gladkov, A. Gantimurov, V. Kukartsev, and D. Evsyukov, “Using machine learning algorithms to solve data classification problems using multi-attribute dataset,” in BIO Web of Conferences, EDP Sciences, 2024, p. 2001.

 

 


Cite this Article as :
Style #
MLA Ali Alqazzaz. "Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study." International Journal of Neutrosophic Science, Vol. 23, No. 3, 2024 ,PP. 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)
APA Ali Alqazzaz. (2024). Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study. Journal of International Journal of Neutrosophic Science, 23 ( 3 ), 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)
Chicago Ali Alqazzaz. "Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study." Journal of International Journal of Neutrosophic Science, 23 no. 3 (2024): 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)
Harvard Ali Alqazzaz. (2024). Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study. Journal of International Journal of Neutrosophic Science, 23 ( 3 ), 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)
Vancouver Ali Alqazzaz. Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study. Journal of International Journal of Neutrosophic Science, (2024); 23 ( 3 ): 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)
IEEE Ali Alqazzaz, Integrated Neutrosophic methodology and Machine Learning Models for Cybersecurity Risk Assessment: An exploratory study, Journal of International Journal of Neutrosophic Science, Vol. 23 , No. 3 , (2024) : 195-207 (Doi   :  https://doi.org/10.54216/IJNS.230317)