<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fuzzy logic-based methodology for building access control systems based on fuzzy logic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Lytvyn</string-name>
          <email>vasyl17.lytvyn@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Bakurova</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Zaritskyi</string-name>
          <email>olegzaritskyi@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatoliy Gritskevich</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hrynchenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elina Tereschenko</string-name>
          <email>elina_vt@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Shyrokorad</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Bandera Street, 79013 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Liubomyra Huzara Ave, Kyiv, 0358</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University "Zaporizhzhia Polytechnic"</institution>
          ,
          <addr-line>64, Zhukovsky str., Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article considers topical issues of analyzing the level of risks of access control systems using the fuzzy set apparatus. This work aims to improve the efficiency of managing the access control system of the system components of IoT networks by developing a methodology that combines modern tools and methods for analyzing data and states of information systems to determine the risk level of the access control system. In the paper, the information system is considered from the point of view of system analysis as the interaction of subjects and objects of the system, the relationships between which are described by access control policies. This paper, for the first time, proposes using object vulnerability indicators and monitoring anomalies in the system to assess the risk level of the existing access control system. This approach allows to consider the real state of objects based on the system architecture and its vulnerability, changes in the system state over time, and to adjust access policies based on the level of risks assessed using the specified data. The methodology involves the use of modern tools and software, such as intrusion detection systems (IDS), fuzzy testing, User and Entity Behavior Analytics (UEBA), User Activity Monitoring (UAM), SBOM, and machine learning approaches. Relevant libraries and databases: CIS Benchmark, Common Vulnerabilities and Exposures (CVEs), Common Platform Enumeration (CPE) Dictionary, and Common Vulnerability Scoring System (CVSS) are an integral part of the methodology, ensuring standardization and integration of the methodology with other approaches and methods of controlling and monitoring information systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Access control system</kwd>
        <kwd>fuzzy logic</kwd>
        <kwd>vulnerability scoring system 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>As organizations expand their use of computing servers and software, malicious insiders and
attackers' technical skills increase. This has led to an increase in the number and variety of
cyberattacks and advanced persistent threats, resulting in a very labor-intensive process of
analyzing access control policies to ensure that overly restrictive permissions are identified and
removed.</p>
      <p>The implementation of access control policies is aimed at managing the activities of entities or
subjects (users or processes performed for users) to passive entities or objects (devices, files,
data, records, etc.). Several access control models are used in information systems and provide
different implementations in terms of administration and enforcement of access policies:
Mandatory Access Control (MAC), Discretionary access control policies (DAC), and Role-based
access control (RBAC) [1].</p>
      <p>0000-0002-9676-0180 (V. V. Lytvyn); 0000-0001-6986-3769 (A. V. Bakurova); 0000-0002-6116-4426 (O. V.
Zaritskyi); 0000-0002-7676-2808 (A. A. Gritskevich); 0000-0002-0347-0265 (P. V. Hrynchenko);
0000-0001-62078071 (E. V. Tereschenko); 0000-0002-2784-4081 (D. V. Shyrokorad)</p>
      <p>© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>Mandatory Access Control (MAC) is a policy suitable for information systems that are highly
critical in terms of security, in which its administration and control are implemented by the
central administrator of the system. MAC is a type of non-discretionary access control. MAC policy
restricts the actions of entities concerning information received from objects to which they
already have access.</p>
      <p>Discretionary access control policies (DAC) are characterized by certain rules in terms of the
rights and possible actions of the subject with the object. DAC can be used in combination with
MAC.</p>
      <p>Role-based access control (RBAC) is a policy for controlling access to objects and system
functions based on roles (functions that correspond to the work performed) defined for each
subject (user). The role-based model simplifies administration because there is no need to grant
rights to each user separately; all rights are already described in the roles.</p>
      <p>The paper aims to improve the efficiency of managing the access control system to the system
components of IoT networks by developing a methodology that combines modern tools and
methods for analyzing data and states of information systems to determine the risk level of the
access control system. The influence of factors in the subject-object system caused by various
aspects, including incorrect user actions, is considered. The methodology is based on fuzzy logic
with the subsequent implementation in the MATLAB package [2, No. 41196424].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>Analysis of recent research results has shown the active use of fuzzy mathematics methods to
address security issues in various systems. This is because security factors, such as trust,
sensitivity, etc., are poorly formalized. Below are some examples of developments in this area.</p>
      <p>The authors of [3] note that an organization's access control policy does not have a standard
definition of what constitutes permission with excessive rights. This situation, in their opinion,
complicates the development of automated rule-based approaches. They also note that there is
no universal approach to determining permissions if an employee receives more permissions
than necessary, so the authors propose to determine their individual risk. The authors of the
paper developed an approach using fuzzy logic to determine an overall risk rating, which can then
be used to make a more informed decision about whether a user has excessive rights and poses a
risk to the organization.</p>
      <p>Article [4] addresses the issue of service providers providing users with trust-based access to
protect cloud resources from intruders. The authors propose trust models based on user and
service provider behavior. Fuzzy logic is used to calculate the trust values of cloud users and
service providers in the cloud environment. The authors use the fuzzy Mamdani method with a
Gaussian membership function for fuzzification and a triangular membership function for
defuzzification. Parameters such as performance and elasticity are used to evaluate the trust of a
resource.</p>
      <p>To improve network security and obtain real-time information, [5] proposes a method for
controlling access to network security authentication information based on a fuzzy reasoning
algorithm. The authors use the concept of multi-level security and role inheritance to control
access.</p>
      <p>Article [6] discusses the issue of information security risk assessment in the industrial Internet
of Things (IoT) environment. The authors emphasize that the assessment process is complicated
by several factors: the complexity and heterogeneity of the system, the dynamic nature of the
system, the distributed network infrastructure, the lack of standards and recommendations, and
the increasing consequences of security breaches. Three fuzzy inference systems are used to
assess information security risks in IoT: to assess the probability of a threat, to assess the
probable damage, and to assess the information security risk of the IoT system.</p>
      <p>Security management in the IoT is also addressed in [7]. It presents a fuzzy approach to
trustbased access control (FTBAC) for identity management. A fuzzy approach is also used to calculate
trust, which guarantees scalability and is energy efficient.</p>
      <p>The problems of threats when using cloud services are discussed in [8]. These include
insufficient identity and access management, insecure interfaces and application interfaces
(APIs), theft, advanced persistent threats, data threats, etc. Traditional access control
mechanisms cannot track user actions on the cloud platform and are susceptible to attacks that
affect data integrity. The authors of the paper proposed a trust-based access control mechanism
that analyzes user, network, demand, and security behavior data to calculate a trust value before
granting access to users. The method that calculates the final trust value uses a fuzzy logic
algorithm. Policies based on the trust value are defined for the access control mechanism, and
based on the result of the trust value, access control is granted or denied.</p>
      <p>In this paper, we present a generalized methodology for testing an access control system for
system components of IoT networks based on fuzzy logic and the use of standardized
vulnerability libraries: CIS Benchmark, Common Vulnerabilities and Exposures (CVEs), Common
Platform Enumeration (CPE) Dictionary, Common Vulnerability Scoring System (CVSS).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Our Approach</title>
      <p>The main concept of testing an access control system using fuzzy logic methods is outlined in the
following steps.</p>
      <p>1. Primary selection of criteria is the stage of determining the main indicators that
characterize the system and, by which the risk assessment will be carried out, and subsequent
grouping of these indicators. At the initial stage, the key indicators are identified through a
survey of experts.
2. The table of indicators is scalable depending on the specifics of the system under test.
3. For each of the selected indicators, the current state within the system under test is
assessed according to a predefined scale that determines its risk level. The number of
assessment levels for each indicator depends on the system's specifics and heterogeneity.
4. Calculations based on the fuzzy inference system for assessing the risk of granting access
to a user.</p>
      <sec id="sec-3-1">
        <title>3.1. Subject-object model of the information system</title>
        <p>The subject-object model of an information system is considered from the perspective of
system analysis and can be represented by the components described below.</p>
        <p>A subject is an entity that interacts with the system and is endowed with certain rights to
perform actions with system objects, for example, a system user or a process. A subject is
characterized by the degree of trust in its qualifications and actions in the system.</p>
        <p>An object is an entity (often a resource) represented by elements of an information system
that are also characterized by their attributes. Objects include software, file systems, services,
hardware, such as IoT sensors, etc. All objects are characterized by the ability to interact with
them (change, add, update, etc.).</p>
        <p>Access control policy determines the level of communication between the object and the
subject, which is described by the Access Control List (ACL) indicator.</p>
        <p>The "Subject" element of the model is described by the following groups of indicators.
1. Password management level (PML).
2. Strong customer authentication (SCA). SCA is a technical standard for an authentication
system [9,10].
3. Availability and level of access to the object (services, equipment) (Access control list,
ACL). It is determined by the access rights matrix. The access control list describes the levels
of permissions (access rights) that subjects (users) have to system objects. The following
levels of access rights are defined. Read (R) - the subject has the right only to view objects
determined by the nature of his work. Add (A) - the subject has the right to add or create
objects in the system, for example, new files in the database, data in the enterprise resource
planning system, etc. Delete (D) - the subject has the right to delete objects from the system or
move them. Edit (E) - the subject has the right to change both the objects themselves and their
attributes and to create versions of objects. Privilege (P) - the subject has full rights and can
perform any actions with the object in the system, including updating firmware and software,
managing the rights of other subjects, etc. The permission (PRM) indicator is considered to
model access rights.
4. Abnormal user behavior in the system. The indicator is determined by systems that
monitor user activity and detect abnormal states in the system, such as IDS, UEBA systems,
and systems using ML.</p>
        <p>The Object element of the model is considered at several levels, the first is the network level,
and the second is the hardware and software level, which involves auditing systems and building
SBOM.</p>
        <p>1. Object vulnerability level (OVL). The indicator is determined based on the results of
penetration tests, Fuzz testing systems, and analysis of relevant databases, such as the
Common Vulnerability Scoring System (CVSS) [11].
2. The frequency of access to the object (Object access frequency, OAF) by system entities.
The indicator is calculated using data from the UAM and UEBA logging systems as the ratio of
the number of accesses to an object to the total number of accesses to all objects in the system.
3. Level of object dependency/influence (LOD/I) on other system objects. The indicator is
assessed by the CVSS metrics and affects the overall vulnerability assessment in the Common
Vulnerability Scoring System (CVSS).
4. Data sensitive levels (DSL). In the Critical Sensitivity Level, we group the frequency of
requests, the sensitivity of the object, and the impact on other objects, which is the basis for
assessing vulnerability by the degree of sensitivity of information or service and taking this
into account when determining the OVL. For example, The European Union General Data
Protection Regulation (GDPR) came into effect in 2018, affecting privacy and data protection
practices globally. Data classification with the GDPR uses the four data classification levels:
public data, internal data, confidential data, and restricted data. In addition to using these
levels, the GDPR requires companies to delete any data that is unnecessary or not being used,
so it is important to understand what types of unstructured data your business possesses.
5. Characterization of a network (system) in terms of its type (Network type, NT): Personal
Area Network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Wide Area
Network (WAN), Global Area Network (GAN). From the point of view of its security: public
unprotected (Open); protected, for example, with a VPN (Virtual Private Network); closed,
physically limited, without access to the world wide web (Closed). The Network
Characteristics indicator is used to refine the “Attack Vector” Base Matric Group indicator by
considering the actual architecture of the enterprise network in the “Attack Vector” Modified
Base Matric Environmental Matric Group indicator.
6. Network Anomaly (NA). Determined using intrusion detection and anomaly monitoring
systems, such as Snort, Wazuh, and Federated learning methodologies (BACON network
anomaly detection), etc.</p>
        <p>All these indicators affect the two main ones that determine the degree of risk of the access
granted.</p>
        <p>1. Attack Likelihood (AL) is an assessment of the possibility that an entity will attempt to
exploit an object's vulnerabilities, taking into account the impact of the entity's reliability
indicators, the depth and privileges of its access, as well as the degree of network closure, the
possible attack vector and the history and maturity of potential abuses in the network under
test.
2. Attack severity level (ASL). It is the main indicator for the object in the methodology. The
maximum value of the indicator indicates catastrophic consequences for the IT structure,
enterprise, or organization. We evaluate it using the Common Vulnerability Scoring System
(CVSS) scale as a fairly universal template for assessing security vulnerabilities and use the
Base Temporal Environmental methodology to refine the assessment.</p>
        <p>Fig. 1 shows the structure of the relationships between the described indicators of the access
control testing system, considering the dynamics, dependencies, and impact on the risk of
granting access. The outer contour of the scheme determines the possibility of risk assessment
without additional analysis of the behavior of the structure's Objects and Subjects
before/after/during the granting of access, which, together with the evaluation of the risk of the
granted access, will give a dynamic risk assessment.</p>
        <p>The main target indicator of the Object-Subject model is the risk level (in percentage terms)
(Access control system risk level). The risk level is calculated using intermediate and additional
indicators that characterize the impact on the main indicators of the Object-Subject system.
1. Access management level (AML) is a parameter that is calculated according to the
relevant rules of the knowledge base using the Password management level (PML) and Strong
Customer Authentication (SCA) parameters.
2. The combination of Privilege Requirement (PR) and Permissions (PRM) indicators
significantly affects the probability of an attack if an attacker gains access to the system with
the appropriate rights.
3. The Network type (NT) indicator modifies the Attack Vector (AV) metric, affecting the
probability of an attack.
4. When calculating the impact of the network architecture on the attack vector, the state of
network security must be taken into account, and the probability indicators must be adjusted.</p>
        <p>The general concept of the methodology for testing the system of access control to the system
components of the IT structures of the information system is shown in Fig. 2</p>
        <p>We've covered the first three steps of the main testing concept. Now, let's move on to the
fourth step, which involves building a product model.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Product model of the access control system testing methodology</title>
        <p>The input data of the fuzzy inference product system are the facts of certain system states
obtained at certain discrete points in time and dynamic indicators, taking into account the results
of continuous monitoring of anomalies in the system, which are provided by modern tools and
software, such as intrusion detection systems (IDS), fuzz testing, User and Entity Behavior
Analytics (UEBA), User Activity Monitoring (UAM), SBOM. Input data is fuzzified based on a
predefined Permission level access control list. The knowledge base is formed considering
standardized requirements for the security of information systems, such as CIS Benchmark,
Common Vulnerabilities and Exposures (CVEs), Common Platform Enumeration (CPE)
Dictionary, and Common Vulnerability Scoring System (CVSS). The use of appropriate libraries
and databases ensures standardization and integration of the methodology with other
approaches and methods of control and monitoring of information systems.</p>
        <p>The hierarchical structure of the developed fuzzy inference system is shown in Fig. 3.</p>
        <p>The product system's output linguistic variable is the Dynamic Access control system risk level
DACSRL, which consists of the static component ACSRL and takes into account the impact of
abnormal behavior of the subject (SAB) and object (OAB).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Experiments</title>
      <p>The purpose of our demonstration experiment is to obtain the Access control system risk level
ACSRL as a result of fuzzy inference according to the values of a certain subset of input
parameters shown in Fig. 3.</p>
      <p>Let's build a fuzzy product system for Access control system risk level ACSRL for the input
parameters OVL, PML, SCA, PRM, and PR, the block diagram of which is shown in Fig. 4. According
to this block diagram (Fig. 4), ACSRL is the result of products based on the input parameters AL
and ASL. From the input parameters selected for the demonstration experiment, we consider the
influence of AML (which is formed by PML and SCA), PRM, and PR on AL. The ASL parameter is
determined by OVL.</p>
      <p>To assess the Access control system risk, we introduce the corresponding linguistic variable
ACSRL of the product system, the terms and membership functions of which are defined in Table
1, according to [12].</p>
      <p>The corresponding membership functions are shown in Fig. 5.</p>
      <p>According to the block diagram (Fig. 4), ACSRL is the result of products based on the input
parameters ASL and Attack likelihood AL.</p>
      <p>For the demonstration experiment, we assume that the ASL parameter is determined by the
Object vulnerability level (OVL). Object vulnerability level, OVL, is determined by the results of
penetration tests, fuzz testing systems, and analysis of relevant databases, such as the Common
Vulnerability Scoring System (CVSS) [11]. The terms of the OVL are defined in Table 2. For the
demonstration experiment, we assume that the OVL parameter is set to High.</p>
      <p>To evaluate Attack likelihood, we introduce the corresponding linguistic variable Attack
likelihood (AL). The terms and membership functions of the Attack likelihood AL are defined in
Table 3. They correspond to the introduced levels of attack assessment [13].</p>
      <p>From the input parameters selected for the demonstration experiment, we will consider the
impact of AML, PRM, and PR on AL. Let's introduce the Access management level (AML) with the
terms and membership functions presented in Table 4.</p>
      <p>The access management level (AML) is calculated according to the knowledge base's product
rules using the Password management level and Strong Customer Authentication (SCA)
parameters of the Subject model element indicator group.</p>
      <p>To describe the linguistic variable Password management level (PML), we calculated the
weighting coefficients of the password management parameters using pairwise comparisons and
obtained the following characteristics (Table 5). The total number of points obtained by the
password management system is calculated as the sum of the weighting coefficients of the
activated parameters, which take values from 0 to 10.</p>
      <p>The linguistic variable characterizing the level of password management takes values
described by terms in a three-digit scale with corresponding membership functions, which are
presented in Table 6 and Figure 6.</p>
      <p>The construction of Strong customer authentication (SCA) is based on the requirements of the
recently updated NIST Digital Identity Guidelines4 (SP 800-63-3) standard [14], which
standardizes the definition and assigns levels of assurance (security) for various authentication
solutions Authenticator Assurance Level (AAL). Table 7 shows the correspondence between the
AAL assurance levels and the introduced terms of Strong customer authentication (SCA).</p>
      <p>Terms.</p>
      <p>SCA
AAL-1
AAL-2</p>
      <p>AAL-3</p>
      <p>The membership function of terms</p>
      <p>Comment type
s (6 8)
PI (2 5)
z (2 4)</p>
      <p>PW (provided by client, server)
SF
PW (provided by client, server) +
SF-OTP|OOB-SW|D or MF
MF - Crypto - Device</p>
      <p>In Table 7, the following abbreviations are used: PW - direct password, SF - Single factor
activation not required, MF - Multi-factor - PIN/password or Biometric Activation (MF), OTP
one-time password, OOB - Out-of-Band, SW - Software, D - Device.</p>
      <p>The introduced linguistic variables of the Password management level and Strong Customer
Authentication (SCA) indicators allow us to build a fuzzy productive inference to determine the
linguistic variable Access management level (AML) according to rules 1-9:</p>
      <p>If PML is Low and SCL is AAL1 then AML is H 1 rule1,
If PML is High and SCL is AAL3 then AML is L 1 rule2,
If PML is Low and SCL is AAL2 then AML is H 1 rule3,
If PML is Low and SCL is AAL3 then AML is A 1 rule4,
If PML is Avg and SCL is AAL1 then AML is H 1 rule5,
If PML is Avg and SCL is AAL2 then AML is A 1 rule6,
If PML is Avg and SCL is AAL3 then AML is A 1 rule7,
If PML is High and SCL is AAL1 then AML is A 1 rule8
If PML is High and SCL is AAL2 then AML is A 1 rule9.</p>
      <p>Fig. 8 shows the corresponding response surface for the output of the block defining the
linguistic variable Access management level (the first level of the hierarchical system).</p>
      <p>For the Privilege Requirement (PR) indicator, we select the terms according to the description
in [11], presented in Table 8.
The membership function
of terms
The attacker is unauthenticated prior to the attack z (2.5 4)
and, therefore, does not require any access to the
settings or files of the vulnerable system to carry out
an attack
The attacker requires privileges that provide basic PI (2 3 5 7)
capabilities that are typically limited to settings and
resources owned by a single low-privileged user.</p>
      <p>Alternatively, an attacker with low privileges has the
ability to access only non-sensitive resources
The attacker requires privileges that provide s (6 7)
significant (e.g., administrative) control over the
vulnerable system, allowing full access to the
vulnerable system's settings and files.</p>
      <p>The Permissions (PRM) has terms of type string (Read (R), Add (A), Delete (D), Edit (E),
Privilege (P)), for which membership functions are constants.</p>
      <p>Table 9 presents the impact of the combination of Access management level (AML) (Table 4)
and a pair of indicators, Privilege Requirement (PR) &amp; Permissions (PRM), on the level of an
Attack likelihood (AL) (Table 3) if an attacker gains access to the system with the appropriate
rights. This information is the basis for building fuzzy product rules.
Low | Unlikely (UL)
Average | Possible (P)
Average | Possible (P)
Average | Possible (P)
high | likely (L)
Very low | Impossible (IMP)
Very low | Impossible (IMP)
Low | Unlikely (UL)
Low | Unlikely (UL)
Low | Unlikely (UL)
Low | Unlikely (UL)
Low | Unlikely (UL)
Low | Unlikely (UL)
Average | Possible (P)
Low | Unlikely (UL)
Average | Possible (P)
Average | Possible (P)
Average | Possible (P)
high | likely (L)
Average | Possible (P)
Average | Possible (P)
high | likely (L)
high | likely (L)
high | likely (L)
high | likely (L)
high | likely (L)
Very high | Very likely (VL)
Very high | Very likely (VL)
Low | Unlikely (UL)
Low | Unlikely (UL)
Average | Possible (P)
Average | Possible (P)
Average | Possible (P)
Average | Possible (P)
high | likely (L)
high | likely (L)
high | likely (L)</p>
      <p>Fragment of fuzzy product rules for a certain level of the output variable of the second block
AL:</p>
      <p>If AML is L and PRM is R and PR is N then AL is UL 1rule1
If AML is L and PRM is A and PR is N then AL is P1rule2
If AML is L and PRM is D and PR is N then AL is P1rule3
If AML is L and PRM is E and PR is N then AL is P1rule4
If AML is L and PRM is P and PR is N then AL is L1rule5
...</p>
      <p>If AML is H and PRM is R and PR is N then AL is IMP
If AML is H and PRM is A and PR is N then AL is IMP 1rule42
If AML is H and PRM is D and PR is N then AL is UL1rule43
If AML is H and PRM is E and PR is N then AL is UL1rule44
If AML is H and PRM is P and PR is N then AL is UL1rule45</p>
      <p>The corresponding response surface for the output of the second block, which determines the
linguistic variable Attack likelihood (AL) in the PRM &amp; PR space, is shown in Fig. 9.
ACSRL
High
High
Substantial
Substantial
Possible
Very High
High
High
Substantial
Substantial
Substantial
Possible
Possible
Slight
Slight
High
Substantial
Substantial
Possible
Possible</p>
      <p>The introduction of AL and ASL defined by OVL allows us to build a fuzzy product inference of
the ACSRL output parameter according to the rules formed based on Table 10.</p>
      <p>Terms Attack likelihood (AL)</p>
      <p>Fragment of the rules of the third level knowledge base of the hierarchical fuzzy products of
the built ACSRL evaluation system:</p>
      <p>
        If (AL is VL) and (ASL is High) then (ACSRL is H) (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
If (AL is L) and (ASL is High) then (ACSRL is H) (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
If (AL is P) and (ASL is High) then (ACSRL is Sub) (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
If (AL is UL) and (ASL is High) then (ACSRL is Sub) (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
If (AL is IMP) and (ASL is High) then (ACSRL is P) (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>Figure 10 shows the fuzzy inference surface of ACSRL from the AML/PML and AL/PR
parameters.</p>
      <p>According to Fig. 10, we can see that the presented system allows for the assessment of the
access control system risk level exceeding 50%. This restriction is artificial, as it appeared in the
conditions of the demonstration experiment with restrictions on the OVL parameter, which was
set to high. This means that only the first five rules from Table 10 were entered.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussions</title>
      <p>By combining modern network control tools, up-to-date vulnerability libraries, and comprehensive
analysis of IT infrastructure data using fuzzy logic, a more objective and effective risk assessment is
achieved compared to other existing approaches and methodologies or to analysis in the absence of
any of these components.</p>
      <p>The test results of the proposed methodology can help improve the applied access policies and the
access control system itself, including the human-machine level.</p>
      <p>We see the research perspective in the necessity to increase the adaptability of the methodology
to different IT infrastructures by testing various systems operating in enterprises with relevant issues,
including expanding the analysis by types and range of indicators of subjects and objects of systems.</p>
      <p>In addition, to increase the practicality and adaptability of solving the tasks mentioned in the
article, we see the practicality of developing appropriate AI tools based on further research on the
methodology and test results that will allow monitoring and responding to dynamic changes in the
system components of IT structures.</p>
      <p>We also consider it promising to study the adaptation of the methodology to various IT structures
of operating enterprises with the possible use of a wider range of indicators to describe them, such as
the assessment of the entity's network, which is defined by ISO/IEC/IEEE 8802 ISO/IEC 27033
standards, Security of the working environment (RMM systems / Remote agents), Access to critical
services (Corporate standards (RBAC based)), Level of knowledge in cybersecurity (ISO 27002:2022 6.3
- Information Security Education), Level of importance/criticality (Corporate standards (ISO
22301:2019 based).</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions and Further Research</title>
      <p>The scientific novelty of the obtained results is the creation of a methodology for testing the
access control system to the system components of IT structures, which uses modern tools and
software, such as intrusion detection systems (IDS), fuzz testing, User and Entity Behavior
Analytics (UEBA), User Activity Monitoring (UAM), SBOM and machine learning approaches. An
integral part of the methodology is the relevant libraries and databases: CIS Benchmark, Common
Vulnerabilities and Exposures (CVEs), Common Platform Enumeration (CPE) Dictionary, and
Common Vulnerability Scoring System (CVSS), which ensure standardization and integration of
the methodology with other approaches and methods for controlling and monitoring system
components of IoT networks. The impact of factors in the subject-object system caused by various
aspects, including incorrect user actions, is considered. The methodology is based on fuzzy logic
with subsequent implementation in the MATLAB package.</p>
      <p>The proposed system allows you to identify vulnerabilities in access control, considering the
real architecture of the information system and the mutual influence of objects, regulate access
policies following the identified risks, and improve the quality of incident response at the
software level.</p>
      <p>The next stage of research is to introduce a dynamic component in assessing the Access control
system risk level, taking into account abnormal behavior in the subject-object system.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments References</title>
      <p>This work has been supported by the Horizon Europe project TELEMETRY.
[6] S. Kerimkhulle, Z. Dildebayeva, A. Tokhmetov, A. Amirova, et al, Fuzzy Logic and Its Application in
the Assessment of Information Security Risk of Industrial Internet of Things, Symmetry, 15(10),
(2023). doi:10.3390/sym15101958.
[7] P. N. Mahalle, P. A.Thakre, N. R. Prasad, R. Prasad, A fuzzy approach to trust based access control
in internet of things, in: 2013 3rd International Conference on Wireless Communications,
Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems (VITAE), Atlantic
City, NJ, United States, 2013, Article 6617083 IEEE. doi:10.1109/VITAE.2013.6617083.
[8] A. J. Khan, S. Mehfuz, Fuzzy User Access Trust Model for Cloud Access Control, Computer Systems</p>
      <p>
        Science and Engineering, 44(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (2023) 113-128. https://doi.org/10.32604/csse.2023.023378.
[9] CIS Password Policy Guide. Center for Internet Security, 2021. URL:
https://www.cisecurity.org/insights/white-papers/cis-password-policy-guide.
[10] Selecting Security Multi-factor Authentication Solutions. National Security Agency, cybersecurity
information, 2020. URL:
https://media.defense.gov/2020/Sep/22/2002502665/-1/1/0/Multifactor_Authentication_ Solutions_UOO17091520_V1.1%20-%20Copy.PDF.
[11] Common Vulnerability Scoring System version 4.0. User Guide. FIRST, 2023. URL:
https://www.first.org/cvss/.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Security and Privacy Controls for Information Systems and Organizations</article-title>
          .
          <source>NIST Special Publication</source>
          <volume>800</volume>
          -
          <issue>53 Revision 5</issue>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .6028/NIST.SP.
          <fpage>800</fpage>
          -
          <lpage>53r5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>MathWorks</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://www.mathworks.com/products/matlab.html.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Parkinson</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Khana, Identifying high-risk over-entitlement in access control policies using fuzzy logic</article-title>
          ,
          <source>Cybersecurity</source>
          <volume>5</volume>
          :
          <issue>6</issue>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1186/s42400-022-00112-1.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kesarwani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Khilar</surname>
          </string-name>
          ,
          <article-title>Development of trust based access control models using fuzzy logic in cloud computing</article-title>
          ,
          <source>Journal of King</source>
          Saud University - Computer and Information Sciences, Volume
          <volume>34</volume>
          ,
          <source>Issue</source>
          <volume>5</volume>
          (
          <year>2022</year>
          )
          <fpage>1958</fpage>
          -
          <lpage>1967</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jksuci.
          <year>2019</year>
          .
          <volume>11</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>Access control method of network security authentication information based on fuzzy reasoning algorithm</article-title>
          ,
          <source>Measurement</source>
          , Volume
          <volume>185</volume>
          (
          <year>2021</year>
          )
          <article-title>110103</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.measurement.
          <year>2021</year>
          .
          <volume>110103</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>