{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:13:27Z","timestamp":1772824407624,"version":"3.50.1"},"reference-count":94,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p> Intrusion detection systems (IDSs) employ sophisticated security techniques to detect malicious activities on hosts and\/or networks. IDSs have been utilized to ensure the security of computer and network systems. However, numerous evaluation and selection issues related to several cybersecurity aspects of IDSs were solved using a decision support approach. The approach most often utilized for decision support in this regard is multi-attribute decision-making (MADM). MADM can aid in selecting the most optimal solution from a huge pool of available alternatives when the appropriate evaluation attributes are provided. The openness of the MADM methods in solving numerous cybersecurity issues makes it largely efficient for IDS applications. We must first understand the available solutions and gaps in this area of research to provide an insightful analysis of the combination of MADM techniques with IDS and support researchers. Therefore, this study conducts a systematic review to organize the research landscape into a consistent taxonomy. A total of 28 articles were considered for this taxonomy and were classified into three main categories: data analysis and detection ([Formula: see text]), response selection ([Formula: see text]) and IDS evaluation ([Formula: see text]). Each category was thoroughly analyzed in terms of a variety of aspects, including the issues and challenges confronted, as well as the contributions of each study. Furthermore, the datasets, evaluation attributes, MADM methods, evaluation and validation and bibliography analysis used by the selected articles are discussed. In this study, we highlighted the existing perspective and opportunities for MADM in the IDS literature through a systematic review, providing researchers with a valuable reference. <\/jats:p>","DOI":"10.1142\/s021962202230004x","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T07:42:30Z","timestamp":1659080550000},"page":"589-636","source":"Crossref","is-referenced-by-count":24,"title":["Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review"],"prefix":"10.1142","volume":"22","author":[{"given":"Amneh","family":"Alamleh","sequence":"first","affiliation":[{"name":"Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia"},{"name":"Department of Artificial Intelligence, Faculty of Information Technology, Zarqa University, Zarqa, Jordan"}]},{"given":"O. S.","family":"Albahri","sequence":"additional","affiliation":[{"name":"Computer Techniques Engineering Department, Mazaya University College, Nasiriyah, Iraq"}]},{"given":"A. A.","family":"Zaidan","sequence":"additional","affiliation":[{"name":"Faculty of Engineering & IT, the British University in Dubai, UAE"}]},{"given":"A. H.","family":"Alamoodi","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia"}]},{"given":"A. S.","family":"Albahri","sequence":"additional","affiliation":[{"name":"Informatics Institute for Postgraduate Studies (IIPS), Iraqi Commission for Computers and Informatics (ICCI), Baghdad, Iraq"}]},{"given":"B. B.","family":"Zaidan","sequence":"additional","affiliation":[{"name":"Future Technology Research Center, National Yunlin University of Science and Technology, Douliou, Taiwan"}]},{"given":"Sarah","family":"Qahtan","sequence":"additional","affiliation":[{"name":"Department of Computer Center, Middle Technical University\u2019s, Baghdad, Iraq"}]},{"given":"Amelia Ritahani","family":"binti Ismail","sequence":"additional","affiliation":[{"name":"Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Kuala Lumpur, Malaysia"}]},{"given":"R. Q.","family":"Malik","sequence":"additional","affiliation":[{"name":"Department of Medical Instrumentation Techniques Engineering, Al-Mustaqbal University College, Hillah, Iraq"}]},{"given":"M. J.","family":"Baqer","sequence":"additional","affiliation":[{"name":"Foundation of Alshuhda, Baghdad, Iraq"}]},{"given":"Ali Najm","family":"Jasim","sequence":"additional","affiliation":[{"name":"Foundation of Alshuhda, Baghdad, Iraq"}]},{"given":"Mohammed S.","family":"Al-Samarraay","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Tanjung Malim 35900, Malaysia"}]}],"member":"219","published-online":{"date-parts":[[2022,8,31]]},"reference":[{"key":"S021962202230004XBIB003","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"Denning D. E.","year":"1987","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S021962202230004XBIB005","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04117-4","volume-title":"Handbook of Information and Communication Security","author":"Stavroulakis P.","year":"2010"},{"key":"S021962202230004XBIB006","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCE.2017.2714744","volume":"6","author":"Puthal D.","year":"2017","journal-title":"IEEE Consum. Electron. Mag."},{"key":"S021962202230004XBIB007","first-page":"1","volume-title":"2015 11th European Dependable Computing Conf. (EDCC)","author":"Tabrizi F. M.","year":"2015"},{"key":"S021962202230004XBIB008","first-page":"21","volume-title":"2013 IEEE 19th Real-Time and Embedded Technology and Applications Symp. (RTAS)","author":"Yoon M.-K.","year":"2013"},{"key":"S021962202230004XBIB009","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1795194.1795210","volume-title":"Proc. 1st ACM\/IEEE Int. Conf. Cyber-Physical Systems","author":"Zimmer C.","year":"2010"},{"key":"S021962202230004XBIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.09.022"},{"key":"S021962202230004XBIB013","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"Lunt T. F.","year":"1993","journal-title":"Comput. Secur."},{"key":"S021962202230004XBIB014","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"Mukherjee B.","year":"1994","journal-title":"IEEE Netw."},{"key":"S021962202230004XBIB015","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"Debar H.","year":"1999","journal-title":"Comput. Netw."},{"key":"S021962202230004XBIB017","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"Mishra A.","year":"2004","journal-title":"IEEE Wireless Commun."},{"key":"S021962202230004XBIB020","first-page":"570","volume-title":"Proc. 15th IEEE Int. Conf. Tools with Artificial Intelligence","author":"Mukkamala S.","year":"2003"},{"key":"S021962202230004XBIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.07.002"},{"key":"S021962202230004XBIB022","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.91"},{"key":"S021962202230004XBIB023","first-page":"84","volume":"1","author":"Kabiri P.","year":"2005","journal-title":"Int. J. Netw. Secur."},{"key":"S021962202230004XBIB024","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-0-387-33112-6_7","volume-title":"Wireless Network Security","author":"Anantvalee T.","year":"2007"},{"key":"S021962202230004XBIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"S021962202230004XBIB026","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1108\/10662240710730515","volume":"17","author":"Tucker C.","year":"2007","journal-title":"Internet Res."},{"key":"S021962202230004XBIB027","first-page":"1","volume":"2","author":"Mandala S.","year":"2007","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"S021962202230004XBIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"S021962202230004XBIB029","first-page":"23","volume":"13","author":"Amer S. H.","year":"2010","journal-title":"Defense Cyber Secur."},{"key":"S021962202230004XBIB030","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/SRDS.2010.38","volume-title":"2010 29th IEEE Symp. Reliable Distributed Systems","author":"Xiang G.","year":"2010"},{"key":"S021962202230004XBIB031","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"S021962202230004XBIB032","first-page":"2266","volume":"6","author":"Das N.","year":"2014","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"S021962202230004XBIB034","volume-title":"Principles of Information Security","author":"Whitman M. E.","year":"2011"},{"key":"S021962202230004XBIB035","first-page":"901","volume":"2","author":"KR K.","year":"2010","journal-title":"Int. J. Comput. Theory Eng."},{"key":"S021962202230004XBIB036","first-page":"931","volume-title":"2012 IEEE 11th Int. Conf. Trust, Security and Privacy in Computing and Communications","author":"Day D. J.","year":"2012"},{"key":"S021962202230004XBIB037","doi-asserted-by":"crossref","first-page":"12060","DOI":"10.1109\/ACCESS.2017.2787719","volume":"6","author":"Li L.","year":"2017","journal-title":"IEEE Access"},{"key":"S021962202230004XBIB038","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.jnca.2015.12.006","volume":"62","author":"Inayat Z.","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"S021962202230004XBIB039","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.1109\/COMST.2017.2781126","volume":"20","author":"Nespoli P.","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"S021962202230004XBIB040","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/TDSC.2016.2615622","volume":"15","author":"Shameli-Sendi A.","year":"2016","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"S021962202230004XBIB041","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"S021962202230004XBIB042","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"Thaseen I. S.","year":"2017","journal-title":"J. King Saud Univ. \u2014 Comput. Inform. Sci."},{"key":"S021962202230004XBIB043","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00c7avu\u015fo\u011flu \u00dc.","year":"2019","journal-title":"Appl. Intell."},{"key":"S021962202230004XBIB044","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"Sultana N.","year":"2019","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"S021962202230004XBIB045","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.013"},{"key":"S021962202230004XBIB046","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.procs.2020.03.271","volume":"167","author":"Dua M.","year":"2020","journal-title":"Proc. Comput. Sci."},{"key":"S021962202230004XBIB047","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2021-0037"},{"key":"S021962202230004XBIB048","doi-asserted-by":"crossref","first-page":"107852","DOI":"10.1016\/j.knosys.2021.107852","volume":"238","author":"Liu Q.","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"S021962202230004XBIB049","first-page":"73","volume-title":"Proc. 2011 Military Modeling & Simulation Symp.","author":"Chapman I. M.","year":"2011"},{"key":"S021962202230004XBIB050","first-page":"496","volume-title":"International Conference on Security in Computer Networks and Distributed Systems","author":"Khasawneh M.","year":"2014"},{"key":"S021962202230004XBIB051","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/1514274.1514286","volume-title":"Proc. Second ACM Conf. Wireless Network Security","author":"Tews E.","year":"2009"},{"key":"S021962202230004XBIB052","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/ICCSIT.2009.5234856","volume-title":"2009 2nd IEEE Int. Conf. Computer Science and Information Technology","author":"Lashkari A. H.","year":"2009"},{"key":"S021962202230004XBIB053","first-page":"77","volume":"3","author":"Choi M.-K.","year":"2008","journal-title":"Int. J. Multimedia Ubiquitous Eng."},{"key":"S021962202230004XBIB054","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"S021962202230004XBIB055","doi-asserted-by":"crossref","first-page":"e4010","DOI":"10.1002\/dac.4010","volume":"32","author":"KP V.","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"S021962202230004XBIB056","first-page":"1","volume":"33","author":"Yan Q.","year":"2016","journal-title":"Adhoc Sens. Wireless Netw."},{"key":"S021962202230004XBIB057","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/585432","volume":"2015","author":"El-Alfy E.-S. M.","year":"2015","journal-title":"Mobile Inform. Syst."},{"key":"S021962202230004XBIB058","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.037"},{"key":"S021962202230004XBIB059","first-page":"102359","volume":"48","author":"Singh D. K.","year":"2019","journal-title":"J. Inform. Secur. Appl."},{"key":"S021962202230004XBIB060","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/RAICS.2015.7488411","volume-title":"2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS)","author":"Robinson R. R.","year":"2015"},{"key":"S021962202230004XBIB061","doi-asserted-by":"crossref","first-page":"107204","DOI":"10.1016\/j.compeleceng.2021.107204","volume":"93","author":"Priyadarshini I.","year":"2021","journal-title":"Comput. Electric. Eng."},{"key":"S021962202230004XBIB062","first-page":"1","volume-title":"Int. Conf. Cloud Technologies and Applications (CloudTech)","author":"Zbakh M.","year":"2015"},{"key":"S021962202230004XBIB063","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.33.5.589"},{"key":"S021962202230004XBIB064","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01532-2"},{"key":"S021962202230004XBIB065","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-15009-9","volume-title":"New Methods and Applications in Multiple Attribute Decision Making (MADM)","volume":"277","author":"Alinezhad A.","year":"2019"},{"key":"S021962202230004XBIB066","doi-asserted-by":"crossref","first-page":"8279","DOI":"10.3390\/su13158279","volume":"13","author":"Torkayesh A. E.","year":"2021","journal-title":"Sustainability"},{"key":"S021962202230004XBIB067","first-page":"3514","author":"Alsalem M. A.","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"S021962202230004XBIB068","first-page":"1","volume":"21","author":"Mohammed R.","year":"2021","journal-title":"Int. J. Inform. Technol. Decis. Mak."},{"key":"S021962202230004XBIB069","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.comcom.2021.04.019","volume":"175","author":"Verma R.","year":"2021","journal-title":"Comput. Commun."},{"key":"S021962202230004XBIB070","doi-asserted-by":"publisher","DOI":"10.1016\/j.matdes.2004.10.027"},{"key":"S021962202230004XBIB071","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.030"},{"key":"S021962202230004XBIB072","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106595"},{"key":"S021962202230004XBIB073","doi-asserted-by":"crossref","first-page":"4723","DOI":"10.1002\/int.22489","author":"Krishnan E.","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"S021962202230004XBIB074","doi-asserted-by":"publisher","DOI":"10.1002\/int.22322"},{"key":"S021962202230004XBIB075","first-page":"1","volume-title":"2010 13th Int. Conf. Information Fusion","author":"Smarandache F.","year":"2010"},{"key":"S021962202230004XBIB076","author":"Smarandache F.","year":"2015","journal-title":"Infinite Study"},{"issue":"1","key":"S021962202230004XBIB077","doi-asserted-by":"crossref","first-page":"61","DOI":"10.32604\/iasc.2022.019624","volume":"31","author":"Nadeem M.","year":"2022","journal-title":"Intelligent Automation and Soft Computing"},{"key":"S021962202230004XBIB078","doi-asserted-by":"crossref","first-page":"859","DOI":"10.3390\/electronics11060859","volume":"11","author":"Alyami H.","year":"2022","journal-title":"Electronics"},{"key":"S021962202230004XBIB079","doi-asserted-by":"crossref","first-page":"1765","DOI":"10.32604\/cmc.2022.025604","volume":"72","author":"Abushark Y. B.","year":"2022","journal-title":"CMC-Comput. Mater. Contin."},{"key":"S021962202230004XBIB080","doi-asserted-by":"crossref","first-page":"12337","DOI":"10.3390\/su132212337","volume":"13","author":"Alharbi A.","year":"2021","journal-title":"Sustainability"},{"key":"S021962202230004XBIB081","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.procs.2018.05.186","volume":"132","author":"Panigrahi R.","year":"2018","journal-title":"Proc. Comput. Sci."},{"key":"S021962202230004XBIB082","author":"Alamleh A.","year":"2022","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"S021962202230004XBIB083","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2014.02.139","volume":"270","author":"Fessi B. A.","year":"2014","journal-title":"Inform. Sci."},{"key":"S021962202230004XBIB084","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2349899"},{"key":"S021962202230004XBIB085","first-page":"1830","volume":"5","author":"Ahmad I.","year":"2010","journal-title":"Int. J. Phys. Sci."},{"key":"S021962202230004XBIB086","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.3233\/JIFS-18350","volume":"35","author":"Singh D. K.","journal-title":"J. Intell. Fuzzy Syst."},{"key":"S021962202230004XBIB087","first-page":"4871","volume-title":"Industrial Electronics Society, IECON 2016 \u2014 42nd Annual Conf. IEEE","author":"Bernieri G.","year":"2016"},{"key":"S021962202230004XBIB088","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jnca.2015.05.004","volume":"55","author":"Shameli-Sendi A.","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"S021962202230004XBIB089","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.01.009"},{"key":"S021962202230004XBIB090","first-page":"586","volume-title":"2010 12th Int. Conf. Computer Modelling and Simulation (UKSim)","author":"Ahmad I.","year":"2010"},{"key":"S021962202230004XBIB091","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1109\/CSO.2011.43","volume-title":"2011 Fourth Int. Joint Conf. Computational Sciences and Optimization (CSO)","author":"Lv J.-J.","year":"2011"},{"key":"S021962202230004XBIB092","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.12.005","volume":"104","author":"Paul A. B.","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"S021962202230004XBIB093","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1049\/iet-ifs.2012.0145","volume":"8","author":"Xia H.","year":"2013","journal-title":"IET Inform. Secur."},{"key":"S021962202230004XBIB094","author":"Martinez M.","year":"2020","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"S021962202230004XBIB096","first-page":"1","volume-title":"2014 IEEE Colombian Conf. Communications and Computing (COLCOM)","author":"Vilela D. W.","year":"2014"},{"key":"S021962202230004XBIB097","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-021-10124-x","volume":"55","author":"Alsalem M. A.","year":"2022","journal-title":"Artif. Intell. Rev."},{"key":"S021962202230004XBIB098","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941640"},{"key":"S021962202230004XBIB099","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994746"},{"key":"S021962202230004XBIB100","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.03.009"},{"key":"S021962202230004XBIB101","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-021-00256-y"},{"issue":"6","key":"S021962202230004XBIB102","doi-asserted-by":"crossref","first-page":"3391","DOI":"10.1109\/TSMC.2021.3068759","volume":"52","author":"Li G.","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybernet.: Syst."},{"key":"S021962202230004XBIB103","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.118680"},{"key":"S021962202230004XBIB104","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101494"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021962202230004X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T05:36:38Z","timestamp":1675402598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S021962202230004X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,31]]},"references-count":94,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1142\/S021962202230004X"],"URL":"https:\/\/doi.org\/10.1142\/s021962202230004x","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,31]]}}}