A Study and Evaluation of Network Security by Employing Decision-Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators

Walid Emam , Ubaid ur Rehman , Tahir Mahmood , Faisal Mehmood

CAAI Transactions on Intelligence Technology ›› 2025, Vol. 10 ›› Issue (6) : 1703 -1716.

PDF (833KB)
CAAI Transactions on Intelligence Technology ›› 2025, Vol. 10 ›› Issue (6) :1703 -1716. DOI: 10.1049/cit2.70048
ORIGINAL RESEARCH
research-article

A Study and Evaluation of Network Security by Employing Decision-Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators

Author information +
History +
PDF (833KB)

Abstract

The evaluation and assessment of network security is a decision-making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra-related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations where the criteria have both positive and negative aspects and contain extra fuzzy information. Therefore, in this manuscript, we aim to introduce a DM approach based on the concept of bipolar complex fuzzy (BCF) Yager aggregation operators (AOs). The related properties of these ag-gregation operators (AOs) are also discussed. Moreover, in this article, we diagnose the Yager operations in the setting of BCF. The basic idea of the interpreted operators and DM approach is to access the problem linked with the network security that is to evaluate and select the finest network security control and network security protocols for protecting and safeguarding the network of any organization or home (case studies). Finally, to exhibit the supremacy and success of the described theory, we examine them with the prevailing theories.

Keywords

fuzzy logic / fuzzy set theory / security

Cite this article

Download citation ▾
Walid Emam, Ubaid ur Rehman, Tahir Mahmood, Faisal Mehmood. A Study and Evaluation of Network Security by Employing Decision-Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators. CAAI Transactions on Intelligence Technology, 2025, 10(6): 1703-1716 DOI:10.1049/cit2.70048

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

T. Mahmood and U. Ur Rehman, “A Novel Approach Towards Bi-polar Complex Fuzzy Sets and Their Applications in Generalized Sim-ilarity Measures,” International Journal of Intelligent Systems 37, no. 1 (2022): 535-567, https://doi.org/10.1002/int.22639.

[2]

L. A. Zadeh, “Fuzzy Sets,” Information and Control 8, no. 3 (1965): 338-353, https://doi.org/10.1016/s0019-9958(65)90241-x.

[3]

M. V. Pawar and J. Anuradha, “Network Security and Types of At-tacks in Network,” Procedia Computer Science 48 (2015): 503-506, https://doi.org/10.1016/j.procs.2015.04.126.

[4]

D. Zhao and J. Liu, “Study on Network Security Situation Awareness Based on Particle Swarm Optimization Algorithm,” Computers & In-dustrial Engineering 125 (2018): 764-775, https://doi.org/10.1016/j.cie.2018.01.006.

[5]

R. P. Lippmann, K. W. Ingols, C. Scott, et al., “Evaluating and Strengthening Enterprise Network Security Using Attack Graphs,” Project Report IA-2, MIT Lincoln Laboratory (2005).

[6]

A. Xie, Z. Cai, C. Tang, J. Hu, and Z. Chen, “Evaluating Network Security With Two-Layer Attack Graphs,” in 2009 Annual Computer Security Applications Conference IEEE, 2009), 127-136.

[7]

Q. Zhou and J. Luo, “The Study on Evaluation Method of Urban Network Security in the Big Data Era,” Intelligent Automation & Soft Computing (2017): 1-6.

[8]

Z. Fan, Y. Xiao, A. Nayak, and C. Tan, “An Improved Network Se-curity Situation Assessment Approach in Software Defined Networks,” Peer-to-Peer Networking and Applications 12, no. 2 (2019): 295-309, https://doi.org/10.1007/s12083-017-0604-2.

[9]

H. M. Pandey, “Performance Evaluation of Selection Methods of Genetic Algorithm and Network Security Concerns,” Procedia Computer Science 78 (2016): 13-18, https://doi.org/10.1016/j.procs.2016.02.004.

[10]

Z. Jinjing, W. Yan, and W. Dongxia, “A Network Security Evalua-tion Method Framework Based on Multiple Criteria Decision Making Theory,” in 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IEEE, 2011), 371-375.

[11]

L. Jibao, W. Huiqiang, and Z. Liang, “Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory,” in 2006 International Conference on Computational Intelligence and SecurityVol. 2 (IEEE, 2006), 1545-1548, https://doi.org/10.1109/iccias.2006.295320

[12]

S. Y. Enoch, J. B. Hong, M. Ge, and D. S. Kim, “Composite Metrics for Network Security Analysis,” preprint, arXiv:2007. 03486 (2020).

[13]

S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A Survey of Game Theory as Applied to Network Security,” in 2010 43rd Hawaii International Conference on System Sciences IEEE, 2010), 1-10.

[14]

G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider, “Enriching Network Security Analysis With Time Travel,” in Proceedings of the ACM SIGCOMM 2008 Conference on Data Commu-nication 2008), 183-194.

[15]

W. Wang, F. H. Memon, Z. Lian, et al., “Secure-Enhanced Federated Learning for AI-Empowered Electric Vehicle Energy Prediction,” IEEE Consumer Electronics Magazine 12, no. 2 (2021): 27-34, https://doi.org/10.1109/mce.2021.3116917.

[16]

Z. Lian, Q. Zeng, W. Wang, T. R. Gadekallu, and C. Su, “Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System,” IEEE Transactions on Computational Social Systems 10, no. 4 (2022): 1701-1710, https://doi.org/10.1109/tcss.2022.3216802.

[17]

Y. Song, T. Mahmood, and U. ur Rehman, “Selection of Software Development Methodology by Employing a Multi-Criteria Decision-Making Approach Based on Logarithmic Bipolar Complex Fuzzy Ag-gregation Operators,” IEEE Access 12 (2024): 38163-38179, https://doi.org/10.1109/access.2024.3373708.

[18]

T. Mahmood and U. ur Rehman, “Providing Decision-Making Ap-proaches for the Assessment and Selection of Cloud Computing Using Bipolar Complex Fuzzy Einstein Power Aggregation Operators,” Engi-neering Applications of Artificial Intelligence 129 (2024): 107650, https://doi.org/10.1016/j.engappai.2023.107650.

[19]

U. U. Rehman and T. Mahmood, “A Study and Performance Eval-uation of Computer Network Under the Environment of Bipolar Com-plex Fuzzy Partition Heronian Mean Operators,” Advances in Engineering Software 180 (2023): 103443, https://doi.org/10.1016/j.advengsoft.2023.103443.

[20]

U. U. Rehman and T. Mahmood, “Prioritization of Types of Wireless Sensor Networks by Applying Decision-Making Technique Based on Bipolar Complex Fuzzy Linguistic Heronian Mean Operators,” Journal of Intelligent and Fuzzy Systems 46 (2024): 1-24, https://doi.org/10.3233/jifs-232167.

[21]

J. Fan, G. Hao, and M. Wu, “A Bipolar Complex Fuzzy CRITIC-ELECTRE III Approach Using Einstein Averaging Aggregation Opera-tors for Enhancing Decision Making in Renewable Energy In-vestments,” International Journal of Fuzzy Systems 26, no. 7 (2024): 1-11, https://doi.org/10.1007/s40815-024-01739-7.

[22]

J. Gwak, H. Garg, and N. Jan, “Hybrid Integrated Decision-Making Algorithm for Clustering Analysis Based on a Bipolar Complex Fuzzy and Soft Sets,” Alexandria Engineering Journal 67 (2023): 473-487, https://doi.org/10.1016/j.aej.2022.12.003.

[23]

T. Mahmood, U. U. Rehman, Z. Ali, and I. Haleemzai, “Analysis of TOPSIS Techniques Based on Bipolar Complex Fuzzy N-Soft Setting and Their Applications in Decision-Making Problems,” CAAI Transactions on Intelligence Technology 8, no. 2 (2023): 478-499, https://doi.org/10.1049/cit2.12209.

[24]

M. Akram, M. Ali, and T. Allahviranloo, “A Method for Solving Bipolar Fuzzy Complex Linear Systems With Real and Complex Co-efficients,” Soft Computing 26, no. 5 (2022): 2157-2178, https://doi.org/10.1007/s00500-021-06672-7.

[25]

N. Jan, J. Gwak, and D. Pamucar, “A Robust Hybrid Decision Making Model for Human-Computer Interaction in the Environment of Bipolar Complex Picture Fuzzy Soft Sets,” Information Sciences 645 (2023): 119163, https://doi.org/10.1016/j.ins.2023.119163.

[26]

W. R. Zhang, “Bipolar Fuzzy Sets and Relations: A Computational Framework for Cognitive Modeling and Multiagent Decision Analysis,” in NAFIPS/IFIS/NASA'94. Proceedings of the First International Joint Conference of the North American Fuzzy Information Processing Society Biannual Conference. The Industrial Fuzzy Control and Intellige (IEEE, 1994), 305-309.

[27]

D. Ramot, R. Milo, M. Friedman and A. Kandel, “Complex Fuzzy Sets IEEE Transactions on Fuzzy Systems 10, no. 2 (2002): 171-186, https://doi.org/10.1109/91.995119.

[28]

D. E. Tamir, L. Jin, and A. Kandel, “A New Interpretation of Complex Membership Grade,” International Journal of Intelligent Sys-tems 26, no. 4 (2011): 285-312, https://doi.org/10.1002/int.20454.

[29]

T. Mahmood and U. Ur Rehman, “A Method to Multi-Attribute Decision Making Technique Based on Dombi Aggregation Operators Under Bipolar Complex Fuzzy Information,” Computational and Applied Mathematics 41, no. 1 (2022): 1-23, https://doi.org/10.1007/s40314-021-01735-9.

[30]

R. R. Yager, “Aggregation Operators and Fuzzy Systems Modeling,” Fuzzy Sets and Systems 67, no. 2 (1994): 129-145, https://doi.org/10.1016/0165-0114(94)90082-5.

[31]

Z. Xu, “Intuitionistic Fuzzy Aggregation Operators IEEE Trans-actions on Fuzzy Systems 15, no. 6 (2007): 1179-1187, https://doi.org/10.1109/tfuzz.2006.890678.

[32]

Z. Xu and R. R. Yager, “Some Geometric Aggregation Operators Based on Intuitionistic Fuzzy Sets,” International Journal of General Systems 35, no. 4 (2006): 417-433, https://doi.org/10.1080/03081070600574353.

[33]

G. Wei, F. E. Alsaadi, T. Hayat, and A. Alsaedi, “Bipolar Fuzzy Hamacher Aggregation Operators in Multiple Attribute Decision Mak-ing,” International Journal of Fuzzy Systems 20, no. 1 (2018): 1-12, https://doi.org/10.1007/s40815-017-0338-6.

[34]

C. Jana, M. Pal, and J. Q. Wang, “Bipolar Fuzzy Dombi Aggregation Operators and its Application in Multiple-Attribute Decision-Making Process,” Journal of Ambient Intelligence and Humanized Computing 10, no. 9 (2019): 3533-3549, https://doi.org/10.1007/s12652-018-1076-9.

[35]

T. Mahmood, U. Ur Rehman, J. Ahmmad, and G. Santos-García, “Bipolar Complex Fuzzy Hamacher Aggregation Operators and Their Applications in Multi-Attribute Decision Making,” Mathematics 10, no. 1 (2022): 23, https://doi.org/10.3390/math10010023.

[36]

T. Mahmood, U. Ur Rehman, Z. Ali, M. Aslam, and R. Chinram, “Identification and Classification of Aggregation Operators Using Bi-polar Complex Fuzzy Settings and Their Application in Decision Sup-port Systems,” Mathematics 10, no. 10 (2022): 1726, https://doi.org/10.3390/math10101726.

[37]

A. Nasir, N. Jan, S. U. Khan,A. Gumaei, and A. Alothaim, “Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations,” Computational Intelligence and Neuroscience 2021, no. 1 (2021), https://doi.org/10.1155/2021/9427492.

[38]

N. Jan, J. Gwak, M. Deveci, V. Simic, and J. Antucheviciene, “Mathematical Analysis of Big Data Analytics Under Bipolar Complex Fuzzy Soft Information,” Applied Soft Computing 157 (2024): 111481, https://doi.org/10.1016/j.asoc.2024.111481.

[39]

A. Jaleel, “WASPAS Technique Utilized for Agricultural Robotics System Based on Dombi Aggregation Operators Under Bipolar Complex Fuzzy Soft Information,” Journal of Innovative Research in Mathematical and Computational Sciences 1, no. 2 (2022): 67-95.

[40]

J. Gwak, H. Garg, N. Jan, and B. Akram, “A New Approach to Investigate the Effects of Artificial Neural Networks Based on Bipolar Complex Spherical Fuzzy Information,” Complex & Intelligent Systems 9, no. 4 (2023): 4591-4614, https://doi.org/10.1007/s40747-022-00959-4.

Funding

Ongoing Research Funding Program(Grant ORF-2025-749)

King Saud University, Riyadh, Saudi Arabia

AI Summary AI Mindmap
PDF (833KB)

33

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/