A FUZZY-LOGICAL MODEL FOR ASSESSING THE STATUS OF AN INFORMATION SYSTEM DURING DDOS ATTACKS
Keywords:
DDos Attack, Fuzzy Logic, Risk Model, Information System, Mamdani Fuzzy Inference, State Assessment, Security MonitoringAbstract
A fuzzy-logical model for assessing the state of an information system (IS) during DDoS attacks is proposed. The model is based on the use of a system of linguistic variables that describe critical parameters of network traffic and the operational characteristics of the IS. To form an assessment of the current risk, Mamdani-type fuzzy inference was applied, followed by defuzzification using the centre-of-gravity method. A simulation experiment was conducted, implemented in the Python environment using the scikit-fuzzy library. The results obtained confirmed that the proposed model adequately reflects the dependence of the integral risk on changes in load parameters, ensures continuity of assessment and sensitivity to critical combinations of traffic factors. The results obtained provide grounds for considering the developed model as a basis for the synthesis of an IS status monitoring module.
References
1. Savchenko, V., Ponochovnyi, P., & Averichev, I. (2024). Vyiavlennia DDoS-ataky na vysoko-shvydkisnu merezhu: Opytuvannia [Detection of a DDoS attack on a high-speed network: A survey]. Prykladni Problemy Kompiuternykh Nauk, Bezpeky ta Matematyky [Applied Problems of Computer Science, Security and Mathematics], 3, 71–81.
2. Shevchenko, S., Zhdanova, Yu., Skladannyi, P., & Petrenko, T. (2024). Nechitki kohnityvni karty yak instrument vizualizatsii stsenariiv reahuvannia na intsydenty v systemakh bezpeky [Fuzzy cognitive maps as a tool for visualizing incident response scenarios in security systems]. Kiberbezpeka: Osvita, Nauka, Tekhnika [Cybersecurity: Education, Science, Technique], 2(26), 417–429. https://doi.org/10.28925/2663-4023.2024.26.707.
3. Shiaeles, S. N., Katos, V., Karakos, A. S., & Papadopoulos, B. K. (2012). Real time DDoS detection using fuzzy estimators. Computers & Security, 31(6), 782–790. https://doi.org/10.1016/j.cose.2012.06.002.
4. Pajila, P. B., Julie, E. G., & Robinson, Y. H. (2022). FBDR-fuzzy based DDoS attack detection and recovery mechanism for wireless sensor networks. Wireless Personal Communications, 122(4), 3053–3083. https://doi.org/10.21203/rs.3.rs-217674/v1.
5. Javaheri, D., Gorgin, S., Lee, J. A., & Masdari, M. (2023). Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Information Sciences, 626, 315–338. https://doi.org/10.1016/j.ins.2023.01.067.
6. Almseidin, M., Al-Sawwa, J., Alkasassbeh, M., & Alweshah, M. (2023). On detecting distributed denial of service attacks using fuzzy inference system. Cluster Computing, 26(2), 1337–1351. https://doi.org/10.1007/s10586-022-03657-5.
7. Petković, M., Bašičević, I., Kukolj, D., & Popović, M. (2018). Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks. Computer Science and Information Systems, 15(1), 139–162. https://doi.org/10.2298/CSIS160905039P.
8. Lin, H., Wu, C., & Masdari, M. (2022). A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques. Computers and Electrical Engineering, 104, 108466. https://doi.org/10.1016/j.compeleceng.2022.108466.
9. Almotiri, S. H. (2024). Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach. Heliyon, 10(22), Article e40018. https://doi.org/10.1016/j.heliyon.2024.e40413.
10. Alsirhani, A., Sampalli, S., & Bodorik, P. (2019). DDoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in Apache Spark. IEEE Transactions on Network and Service Management, 16(3), 936–949. https://doi.org/10.1109/TNSM.2019.2929425.
11. Imamguluyev, R. (2025). Detection and prevention of cyber attacks based on fuzzy logic and deep learning. In International Conference on Intelligent and Fuzzy Systems (pp. 402–409). Springer. https://doi.org/10.1007/978-3-031-97992-7_45.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Information technologies in economics and environmental sciences

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.