{"id":"https://openalex.org/W2884332527","doi":"https://doi.org/10.3233/jifs-18350","title":"Framework for Fuzzy Rule Based Automatic Intrusion Response Selection System (FRAIRSS) using Fuzzy Analytic Hierarchy Process and Fuzzy TOPSIS","display_name":"Framework for Fuzzy Rule Based Automatic Intrusion Response Selection System (FRAIRSS) using Fuzzy Analytic Hierarchy Process and Fuzzy TOPSIS","publication_year":2018,"publication_date":"2018-07-16","ids":{"openalex":"https://openalex.org/W2884332527","doi":"https://doi.org/10.3233/jifs-18350","mag":"2884332527"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-18350","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-18350","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045360395","display_name":"Dileep Kumar Singh","orcid":"https://orcid.org/0000-0002-1202-243X"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dileep Kumar Singh","raw_affiliation_strings":["Department of Computer Science and Engineering, MANIT Bhopal, MP, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, MANIT Bhopal, MP, India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048615209","display_name":"Praveen Kaushik","orcid":"https://orcid.org/0000-0001-6706-0735"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Praveen Kaushik","raw_affiliation_strings":["Department of Computer Science and Engineering, MANIT Bhopal, MP, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, MANIT Bhopal, MP, India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045360395"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":null,"apc_paid":null,"fwci":0.7381,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7440344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"35","issue":"2","first_page":"2559","last_page":"2571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7108704447746277},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6647583842277527},{"id":"https://openalex.org/keywords/topsis","display_name":"TOPSIS","score":0.5920491814613342},{"id":"https://openalex.org/keywords/analytic-hierarchy-process","display_name":"Analytic hierarchy process","score":0.5850319266319275},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.563075065612793},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5601356625556946},{"id":"https://openalex.org/keywords/ideal-solution","display_name":"Ideal solution","score":0.520319938659668},{"id":"https://openalex.org/keywords/multiple-criteria-decision-analysis","display_name":"Multiple-criteria decision analysis","score":0.5066545605659485},{"id":"https://openalex.org/keywords/fuzzy-rule","display_name":"Fuzzy rule","score":0.4771442115306854},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4584192633628845},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44110584259033203},{"id":"https://openalex.org/keywords/vagueness","display_name":"Vagueness","score":0.4354571998119354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4204334318637848},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4010102450847626},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.3088850975036621},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.23364901542663574},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12990134954452515}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7108704447746277},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6647583842277527},{"id":"https://openalex.org/C51566761","wikidata":"https://www.wikidata.org/wiki/Q1235853","display_name":"TOPSIS","level":2,"score":0.5920491814613342},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.5850319266319275},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.563075065612793},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5601356625556946},{"id":"https://openalex.org/C89591040","wikidata":"https://www.wikidata.org/wiki/Q1779030","display_name":"Ideal solution","level":2,"score":0.520319938659668},{"id":"https://openalex.org/C11105738","wikidata":"https://www.wikidata.org/wiki/Q1895805","display_name":"Multiple-criteria decision analysis","level":2,"score":0.5066545605659485},{"id":"https://openalex.org/C2780049643","wikidata":"https://www.wikidata.org/wiki/Q5511139","display_name":"Fuzzy rule","level":4,"score":0.4771442115306854},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4584192633628845},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44110584259033203},{"id":"https://openalex.org/C2776825360","wikidata":"https://www.wikidata.org/wiki/Q1411921","display_name":"Vagueness","level":3,"score":0.4354571998119354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4204334318637848},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4010102450847626},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.3088850975036621},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.23364901542663574},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12990134954452515},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-18350","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-18350","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W344488431","https://openalex.org/W1730152048","https://openalex.org/W1994997349","https://openalex.org/W2002907052","https://openalex.org/W2032897110","https://openalex.org/W2044457569","https://openalex.org/W2059536960","https://openalex.org/W2073823860","https://openalex.org/W2078464333","https://openalex.org/W2079613186","https://openalex.org/W2097209984","https://openalex.org/W2143125131","https://openalex.org/W2208434063","https://openalex.org/W2320647173","https://openalex.org/W2333879426","https://openalex.org/W2535876017","https://openalex.org/W2538633333","https://openalex.org/W2596088180","https://openalex.org/W2963863130","https://openalex.org/W4206520518"],"related_works":["https://openalex.org/W2790901792","https://openalex.org/W3154161952","https://openalex.org/W4235219488","https://openalex.org/W4240892640","https://openalex.org/W2420871302","https://openalex.org/W2466681507","https://openalex.org/W2004631942","https://openalex.org/W2462459838","https://openalex.org/W1779808131","https://openalex.org/W1967317124"],"abstract_inverted_index":{"Intrusion":[0,11,99],"Detection":[1],"System":[2,13,102],"(IDS)":[3],"detects":[4],"the":[5,18,27,35,54,64,74,82,87,93,124,154,165,169,201],"intrusions":[6],"and":[7,16,50,70,121,189],"produces":[8],"alerts.":[9],"Automated":[10],"Response":[12,100],"(AIRS)":[14],"selects":[15],"triggers":[17],"appropriate":[19,166,198],"response":[20,37,51,106,155,167,171,199],"based":[21],"on":[22],"some":[23],"criteria":[24],"to":[25,80,116,139,152,163],"mitigate":[26],"intrusion":[28],"without":[29],"delay.":[30],"The":[31,178],"big":[32],"challenges":[33],"in":[34,86,114,123,150,183],"automated":[36,105],"selection":[38],"process":[39,61],"are":[40],"a":[41],"precise":[42,119],"measurement":[43,120],"of":[44,57,67,127,135,176],"importance":[45,88,125],"weight":[46],"for":[47,53,104,133,173],"each":[48,68,128,174],"criterion":[49,69],"prioritization":[52],"specific":[55],"category":[56,175],"attacks.":[58,177],"Analytic":[59],"hierarchy":[60],"(AHP)":[62],"uses":[63],"pair-wise":[65],"comparison":[66],"does":[71],"not":[72],"require":[73],"accurate":[75],"quantification":[76],"but":[77],"is":[78,161,191,195],"unable":[79],"handle":[81],"vagueness":[83],"or":[84],"uncertainty":[85,122],"judgment.":[89],"This":[90],"paper":[91],"presents":[92],"framework":[94,179],"called":[95],"Fuzzy":[96,108,130,157],"Rule-Based":[97],"Automatic":[98],"Selection":[101],"(FRAIRSS)":[103],"selection.":[107],"AHP":[109],"model":[110],"has":[111,147,180],"been":[112,148,181],"created":[113],"order":[115,151],"deal":[117],"with":[118,185],"judgment":[126],"criterion.":[129],"TOPSIS":[131],"(Technique":[132],"Order":[134],"Preference":[136],"by":[137],"Similarity":[138],"Ideal":[140],"Solution)":[141],"multi-criteria":[142],"decision":[143],"making":[144],"(MCDM)":[145],"approach":[146],"applied":[149],"resolve":[153],"prioritization.":[156],"Rule-based":[158],"inference":[159],"system":[160],"modeled":[162],"select":[164],"from":[168],"prioritized":[170],"sets":[172],"simulated":[182],"MATLAB":[184],"various":[186],"attack":[187,203],"scenarios":[188],"it":[190],"found":[192],"that":[193],"FRAIRSS":[194],"selecting":[196],"most":[197],"under":[200],"given":[202],"scenarios.":[204]},"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
