<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Attack detection system based on network traffic analysis by means of fuzzy inference ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Petliak</surname></persName>
							<email>npetlyak@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Klots</surname></persName>
							<email>klots@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vira</forename><surname>Titova</surname></persName>
							<email>titovav@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Abdel-Badeeh</forename><forename type="middle">M</forename><surname>Salem</surname></persName>
							<email>abmsalem@yahoo.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Ain Shams University</orgName>
								<address>
									<addrLine>El-Khalyfa El-Mamoun Street Abbasya</addrLine>
									<settlement>Cairo</settlement>
									<country key="EG">Egypt</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Attack detection system based on network traffic analysis by means of fuzzy inference ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">505FA2E22DE9352C776876E0D0277F9A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>network traffic, fuzzy logic, signature analysis, traffic classification, network anomalies 1 Badeeh M. Salem) 0000-0001-5971-4428 (N. Petliak)</term>
					<term>0000-0002-3914-0989 (Y. Klots)</term>
					<term>0000-0001-8668-4834 (V. Titova)</term>
					<term>0000-0003-0268-6539 (Abdel-Badeeh M. Salem)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This article presents an approach to analyzing network traffic using packet headers that provide information about the connection between network nodes. The bulk of the traffic is data, so the analysis is focused on headers that occupy a small part of the packet but contain important information about the connection structure. A method for selecting the most informative parameters is proposed, which allows an increase in the efficiency of the analysis and ensures the stable operation of the network. To implement the method, fuzzy inference tools are used, which allow uncertainty and blurred boundaries to be taken into account when classifying traffic. Based on expert opinions, trapezoidal membership functions were formed for each of the parameters, which allows the phasing of the input data and determining the degree of their belonging to specific terms. The proposed system is implemented on the basis of a hardware and software complex.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With the development of digital technologies and the growth of the global network infrastructure, cybersecurity threats have become one of the most serious problems in modern society. Every day, Internet users face numerous attacks on information systems that can lead to significant financial losses, data loss, and privacy violations. According to statistics, losses from cyber threats are growing every year, reaching billions of dollars <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref>. Among the most common threats are network attacks such as DDoS, phishing attacks, malware, and brute force attacks <ref type="bibr">[3]</ref><ref type="bibr" target="#b2">[4]</ref>. In this regard, there is a need to develop new methods and technologies to detect and prevent network attacks. Traditional intrusion detection systems have a number of disadvantages, including limited ability to work under uncertainty and difficulty adapting to new types of threats. Modern approaches based on machine learning, fuzzy logic, and deep traffic analysis are becoming increasingly popular due to their ability to classify network traffic more efficiently and accurately.</p><p>The rapid development of network technologies contributes to the emergence of new types of attacks on computer networks. A variety of intrusion methods and their use in attacks threaten the effectiveness of existing security technologies in protecting data in corporate networks. This creates a constant need to improve technologies and tools to ensure reliable protection. The use of advanced information technologies is key to the effective management of various systems, and corporate computer networks remain indispensable tools for their successful operation. However, as networks grow, the number of users and the amount of information transmitted increases, which can lead to a deterioration in the quality of network services. This underscores the importance of improving network traffic monitoring and analysis tools to ensure the stability and quality of service.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works</head><p>Paper <ref type="bibr" target="#b3">[5]</ref> describes a NIDS based on multidomain machine learning that analyzes the characteristics of traffic flows and payload data using two ML classifiers. One of them works with traffic flows, and the other with payload data. Both classifiers are based on a random forest algorithm, and their results are combined using a voting scheme. However, the described system works to detect attacks on network components.</p><p>Paper <ref type="bibr" target="#b4">[6]</ref> presents a network intrusion detection system called SPAFIS, which uses fuzzy IF-THEN rules and software prototypes to analyze network traffic in real-time. The system is able to adapt to new data through self-development of its structure and parameters.</p><p>The authors of <ref type="bibr" target="#b5">[7]</ref> propose a real-time network intrusion detection system. The main goal of the work is to test the effectiveness of the proposed model, which analyzes real packets with different types of attacks and safe traffic. An important part of the study is to improve signature generation methods for better detection of anomalies and malware.</p><p>In <ref type="bibr" target="#b6">[8]</ref>, the authors work on the development of an online system for detecting distributed denial of service (DDoS) attacks in a client-server environment. Their system consists of five modules that provide effective detection and response to suspicious activity using a dynamic thresholding algorithm based on Shannon's entropy and Chebyshev's theorem. The system is adaptive to changes in legitimate traffic.</p><p>The article <ref type="bibr" target="#b7">[9]</ref> explores methods of detecting DDoS attacks in cloud computing. The authors proposed a combination of Mutual Information and Random Forest Feature Importance to select relevant features, which improves the accuracy of machine learning models, including Random Forest and Gradient Boosting. Using this approach on CICIDS 2017 and CICDDoS 2019 datasets showed a high level of accuracy in DDoS attack detection.</p><p>The paper <ref type="bibr" target="#b8">[10]</ref> focuses on the development of an online system for detecting DDoS attacks using the entropy method with a dynamic threshold. Using network traffic analytics, the proposed approach allows you to automatically adapt to changes in the intensity of attacks, which increases accuracy and reduces the number of false positives.</p><p>The article <ref type="bibr" target="#b9">[11]</ref> introduces a approach to defending against DDoS attacks. The RAD mechanism uses behavioral analysis and statistical modeling to detect anomalies and mitigate these attacks more effectively. The novelty of this research lies in its focus on leveraging dynamic traffic patterns and user behavior to distinguish between legitimate and malicious traffic, a significant improvement over traditional signature-based methods. This method offers a more adaptive and robust solution for real-time DDoS mitigation in cloud environments and large-scale networks.</p><p>The author of <ref type="bibr" target="#b10">[12]</ref> describes the creation of a system based on fuzzy logic for classifying network traffic as malicious or harmless using weighting factors. The author explores the use of fuzzy systems to categorize network data into "good" and "bad" content. The system automates the process of analyzing and classifying traffic using a set of rules and can be integrated with other systems to improve the effectiveness of protection against cyber threats. However, the presented development offers a fuzzy inference system for classifying network packet types and detecting only TCP-SYN attacks.</p><p>S. R. Zahra and others <ref type="bibr" target="#b11">[13]</ref> propose an intelligent system based on fuzzy logic and data mining, which is based on three layers, six segments, and 30 components that work synchronously with each other. This system is able to identify only phishing/malicious URL attacks with high accuracy.</p><p>In <ref type="bibr" target="#b12">[14]</ref>, a machine learning approach is proposed to detect DDoS attacks in software-defined networks. When detecting attacks, some flow characteristics are used to determine normal network traffic. The proposed approach is tested in four different machine learning algorithms.</p><p>The authors of <ref type="bibr" target="#b13">[15]</ref> propose a model for detecting SSH-Brute Force attacks based on deep learning. The study showed that the CNN model outperforms traditional machine learning algorithms, such as naive Bayes, logistic regression, and others, in the ability to detect Brute Force attacks.</p><p>The authors of the article <ref type="bibr" target="#b14">[16]</ref> propose the use of deep neural networks to detect network anomalies in IT infrastructures of the oil and gas industry. The proposed approach automates the process of feature selection from raw traffic, which improves the accuracy of models and reduces time spent on manual processing. This provides a cyber security solution in a specific industrial environment.</p><p>Article <ref type="bibr" target="#b15">[17]</ref> is devoted to methods of detecting network attacks on cyber-physical systems (CPS) using neural networks based on logical rules. The main focus is on analyzing different approaches to data representation in CPS and evaluating their advantages and disadvantages. The authors propose a method for detecting attacks based on multivariate time series analyzed with the help of a logical neural network. This method allows for the prediction of the state of the system and the comparison of predicted and actual values to detect anomalies. An important step is the segmentation of the network to protect its various parts, which allows for more efficient detection of potential threats. Among the advantages of the proposed approach are high accuracy and the ability to detect short-term anomalies in the operation of the CPS. The authors point out a disadvantage -poor efficiency in detecting long-term anomalies that develop slowly. It should be noted that the method requires powerful computing resources, and the model needs to be re-trained when the system topology changes.</p><p>Paper <ref type="bibr" target="#b16">[18]</ref> investigates machine learning methods for detecting network intrusions based on traffic flows. The focus is on methods based on decision trees, such as PART, J48, and random forest. Processing time is also taken into account. This is important for real-time, as fast processing of traffic flows allows for real-time detection and response to threats.</p><p>The article <ref type="bibr" target="#b17">[19]</ref> examines multi-criteria methods of assessing the correctness of decision-making in the field of cyber security and information security. The authors pay attention to the analysis of the correctness of the decisions made in the context of the protection of specific objects from information weapons and vulnerabilities of computer technologies, which is an important factor in the development of new methods or the implementation of systems for detecting unauthorized actions or attacks.</p><p>The reviewed works explore different approaches to detecting network intrusions using machine learning, fuzzy logic, and deep learning methods. The main tools are the analysis of traffic flows, payloads, signatures, and attributes of network traffic using various classifiers. Attention is also focused on the importance of processing time to ensure effective real-time threat detection. However, the proposed solutions analyze incoming network traffic and are focused on certain types of attacks, such as phishing or DDoS attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The system of fuzzy logical inference</head><p>From the analysis, we can conclude that network traffic analysis allows us to detect attacks on the network with high reliability. For such analysis, machine learning and fuzzy logic methods are usually used. However, significant volumes of traffic to be analyzed require a significant increase in the capacity of the traffic analysis system or analysis of only a part of the parameters characterizing the packets. The use of informative traffic characteristics can significantly reduce the load on the analysis system and perform it in real time without significantly reducing network performance.</p><p>The bulk of the packet when two nodes communicate is data, so only headers are used to analyze traffic, which occupies a small part of the packet size and contains information about the connection. However, some headers are not used for traffic analysis. This is because these elements contain only service information, and their analysis can create an additional load on the system without providing important data about possible attacks. Using all the parameters would lead to an increased load on the network equipment, which, in turn, would reduce the efficiency of network traffic analysis and slow down the data transfer rate. Therefore, the most informative parameters were selected to ensure the stable operation of the computer network during data exchange. Therefore, the packet signature is presented as follows <ref type="bibr" target="#b18">[20]</ref>:</p><formula xml:id="formula_0">𝑠𝑠 = {𝐼𝐼𝐼𝐼𝑠𝑠, 𝐼𝐼𝐼𝐼𝐼𝐼, 𝐼𝐼𝑠𝑠, 𝐼𝐼𝐼𝐼, 𝐼𝐼𝑃𝑃, 𝐼𝐼𝐼𝐼𝑃𝑃, 𝐼𝐼, 𝑀𝑀𝑀𝑀𝑀𝑀, 𝑆𝑆},<label>(1)</label></formula><p>where 𝐼𝐼𝐼𝐼𝑠𝑠 is the source IP address that sends a request for connection and information exchange; 𝐼𝐼𝐼𝐼𝐼𝐼 is the destination IP address, i.e., to which IP address requests are sent; 𝐼𝐼𝑠𝑠 is the source port used to establish the connection; 𝐼𝐼𝐼𝐼 is the destination port; 𝐼𝐼𝑃𝑃 is the protocol used for data transmission; 𝐼𝐼𝐼𝐼𝑃𝑃 is the traffic intensity determined by bits/s; 𝐼𝐼 is the time the packet arrives for verification in the 24-hour format hh-mm-ss; 𝑀𝑀𝑀𝑀𝑀𝑀 is the MAC address of the device that sends data from the network; 𝑆𝑆 is the packet size.</p><p>The 𝐼𝐼𝐼𝐼𝑠𝑠, 𝐼𝐼𝑠𝑠, 𝑀𝑀𝑀𝑀𝑀𝑀 parameters are used to block the device that generates malicious traffic. The 𝐼𝐼 parameter is used to store signatures in the dictionaries for a certain period of time after malicious data is received from the device, after the specified time period expires, the device data will be removed from the database of prohibited device signatures, thus the time to check prohibited connections will not increase over time. Since a linear search is used to check an item with all the items in the database, the time changes in proportion to the number of items in the database:</p><formula xml:id="formula_1">𝑡𝑡 = 𝑘𝑘 * 𝑛𝑛, (<label>2</label></formula><formula xml:id="formula_2">)</formula><p>where 𝑡𝑡 is the total check time; 𝑘𝑘 is a constant that depends on the speed of one check operation; 𝑛𝑛 is the number of items in the database.</p><p>The proposed solution was implemented through a hardware and software complex, where a program code was created using fuzzy logic methods to check the signature for compliance with the type of network traffic. This approach allows for the taking into account of fuzzy criteria and blurred boundaries when classifying traffic.</p><p>The structure of the system for implementing fuzzy inference for classifying the features of signature elements using Matlab is shown in Fig. <ref type="figure" target="#fig_0">1</ref>. It consists of the following blocks: phasing, membership functions, fuzzy inference algorithm, and defuzzification. In general, the sequence of system steps (Fig. <ref type="figure" target="#fig_0">1</ref>) is as follows: input data 𝑋𝑋 is fed to the fuzzification unit; the fuzzification stage converts the input data into fuzzy values 𝑋𝑋 ′ using membership functions; the fuzzy inference algorithm performs implication, aggregation, activation and accumulation based on the fuzzy knowledge base to obtain fuzzy output values 𝑌𝑌 ′ ; defuzzification converts the fuzzy output values 𝑌𝑌 ′ into a clear output value 𝑌𝑌; the output value 𝑌𝑌 is the result of the system, which is used for decision-making. During fuzzification, the crisp input data 𝑋𝑋 is transformed into fuzzy values 𝑋𝑋 ′ using membership functions. This allows us to take into account the uncertainty and fuzziness in the input data. For example, 𝐼𝐼𝐼𝐼𝑃𝑃 is equal to 10,000 bits per second, and the membership function converts this intensity to the fuzzy value "above average" at the phasing stage.</p><p>Membership functions determine the degree to which each input value belongs to certain terms. The linguistic variables required for network traffic analysis are 𝐼𝐼𝐼𝐼𝐼𝐼, 𝐼𝐼𝐼𝐼, 𝐼𝐼𝑃𝑃, 𝐼𝐼𝐼𝐼𝑃𝑃, 𝑆𝑆. Each input linguistic variable is defined by a term set of a certain number of values.</p><p>𝐼𝐼𝐼𝐼𝐼𝐼 is represented by the following set:</p><formula xml:id="formula_3">𝐼𝐼𝐼𝐼𝐼𝐼 = �𝐼𝐼𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 , 𝐼𝐼𝐼𝐼𝐼𝐼 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 , 𝐼𝐼𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 �,<label>(3)</label></formula><p>where 𝐼𝐼𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 is the set of allowed IP addresses, which includes IP addresses of social networks, search engines and other frequently used sites when connecting to public networks; 𝐼𝐼𝐼𝐼𝐼𝐼 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 -a set of IP addresses whose affiliation is not defined as allowed or prohibited; 𝐼𝐼𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 -a set of prohibited IP addresses, which includes IP addresses from the blacklist of blocked addresses <ref type="bibr" target="#b19">[21]</ref><ref type="bibr">[22]</ref>.</p><p>𝐼𝐼𝐼𝐼 is defined by the following set:</p><formula xml:id="formula_4">𝐼𝐼𝐼𝐼 = �𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 , 𝐼𝐼𝐼𝐼 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 , 𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 �,<label>(4)</label></formula><p>where 𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 -is the set of allowed ports; this set includes the frequently used 80 and 443 ports, ports used for popular social networks when using a browser or applications; 𝐼𝐼𝐼𝐼 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 -the set of ports whose affiliation is not defined as allowed or prohibited; 𝐼𝐼𝐼𝐼 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 -the set of prohibited ports, which includes ports intended for remote access such as 21, 22 and 3389.</p><p>𝐼𝐼𝑃𝑃 is defined by the following set:</p><formula xml:id="formula_5">𝐼𝐼𝑃𝑃 = �𝐼𝐼𝑃𝑃 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 , 𝐼𝐼𝑃𝑃 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 , 𝐼𝐼𝑃𝑃 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 �,<label>(5)</label></formula><p>where 𝐼𝐼𝑃𝑃 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 -is the set of initially allowed protocols, including TCP and UDP; 𝐼𝐼𝑃𝑃 𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢𝑢 -is the set of protocols whose affiliation is not initially determined as allowed or prohibited; 𝐼𝐼𝑃𝑃 𝑝𝑝𝑝𝑝𝑢𝑢ℎ𝑝𝑝𝑖𝑖𝑝𝑝𝑝𝑝𝑝𝑝𝑖𝑖 -is the set of prohibited protocols, including RDP.</p><p>𝐼𝐼𝐼𝐼𝑃𝑃 is defined by the following set:</p><formula xml:id="formula_6">𝐼𝐼𝐼𝐼𝑃𝑃 = �𝐼𝐼𝐼𝐼𝑃𝑃 𝑙𝑙𝑢𝑢𝑢𝑢 , 𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝐼𝐼𝐼𝐼𝑃𝑃 ℎ𝑝𝑝𝑎𝑎ℎ �,<label>(6)</label></formula><p>where 𝐼𝐼𝐼𝐼𝑃𝑃 𝑙𝑙𝑢𝑢𝑢𝑢 -is a set of traffic intensity values defined as low intensity; 𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -s a set of traffic intensity values defined as below average; 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -a set of traffic intensity values that are defined as an average intensity value; 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -a set of traffic intensity values that are defined as above average; 𝐼𝐼𝐼𝐼𝑃𝑃 ℎ𝑝𝑝𝑎𝑎ℎ -a set of traffic intensity values that are defined as high intensity.</p><p>𝑆𝑆 is defined by the following set:</p><formula xml:id="formula_7">𝑆𝑆 = �𝑆𝑆 𝑙𝑙𝑢𝑢𝑢𝑢 , 𝑆𝑆 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝑆𝑆 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝑆𝑆 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 , 𝑆𝑆 ℎ𝑝𝑝𝑎𝑎ℎ �,<label>(7)</label></formula><p>where 𝑆𝑆 𝑙𝑙𝑢𝑢𝑢𝑢 -is the set of data packet size values that are defined as small; 𝑆𝑆 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -is the set of data packet size values that are defined as below average; 𝑆𝑆 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -is the set of data packet size values that are defined as average packet size; 𝑆𝑆 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 -is the set of data packet size values that are defined as above average; 𝑆𝑆 ℎ𝑝𝑝𝑎𝑎ℎ is the set of data packet size values that are defined as large data packet size.</p><p>The membership function was chosen as a trapezoidal function because it can be used to model different states of network traffic, which allows for more detailed analysis and classification of traffic behavior, which is important for detecting anomalies and ensuring network security. The trapezoidal membership function is used to describe the membership of linguistic variables to certain terms. It has the shape of a trapezoid and is defined by four parameters: 𝑎𝑎, 𝑏𝑏, 𝑐𝑐 𝑎𝑎𝑛𝑛𝐼𝐼 𝐼𝐼, where 𝑎𝑎 𝑎𝑎𝑛𝑛𝐼𝐼 𝐼𝐼 are the lower bases of the trapezoid, 𝑏𝑏 𝑎𝑎𝑛𝑛𝐼𝐼 𝑐𝑐 are the upper bases. Formally, the trapezoidal membership function 𝜇𝜇(𝑥𝑥) is defined as <ref type="bibr" target="#b20">[23]</ref><ref type="bibr" target="#b21">[24]</ref><ref type="bibr" target="#b22">[25]</ref>:</p><formula xml:id="formula_8">𝜇𝜇(𝑥𝑥) = ⎩ ⎪ ⎨ ⎪ ⎧ 0, if 𝑥𝑥 ≤ 𝑎𝑎 or 𝑥𝑥 ≥ 𝐼𝐼 𝑥𝑥 − 𝑎𝑎 𝑏𝑏 − 𝑎𝑎 , if 𝑎𝑎 ≤ 𝑥𝑥 ≤ 𝑏𝑏 1, if 𝑏𝑏 ≤ 𝑥𝑥 ≤ 𝑐𝑐 𝐼𝐼 − 𝑥𝑥 𝐼𝐼 − 𝑐𝑐 , if 𝑐𝑐 ≤ 𝑥𝑥 ≤ 𝐼𝐼 (8)</formula><p>where 𝑎𝑎 ≤ 𝑏𝑏 ≤ 𝑐𝑐 ≤ 𝐼𝐼; 𝑥𝑥 is an input value compared with the defined limits for each term set. For each value of x, the trapezoidal membership function calculates the degree of membership of this value in a particular fuzzy set. This degree of membership ranges from 0 to 1, where 0 means no membership and 1 means full membership. The membership function calculates how much the value x belongs to a particular term. This allows you to phase the value of x, that is, determine the degree of its membership in each fuzzy set.</p><p>The parameters for each set of values are set based on static data. The data for all terms of linguistic variables are presented in Table <ref type="table" target="#tab_0">1</ref>. Phased median estimation is an important tool for analyzing and processing data in situations with a high level of uncertainty, providing a more accurate estimate of the mean. Since network traffic analysis belongs to this category of tasks, the phased median estimate is calculated in Table <ref type="table" target="#tab_1">2</ref>. Here is an example of a trapezoidal membership function for five terms of a linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃.</p><p>The trapezoidal membership function for a term from the set 𝐼𝐼𝐼𝐼𝑃𝑃 𝑙𝑙𝑢𝑢𝑢𝑢 of the linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃 will be as follows:</p><formula xml:id="formula_9">𝜇𝜇 low (𝑥𝑥) = ⎩ ⎪ ⎨ ⎪ ⎧ 0, if 𝑥𝑥 ≤ 0 or 𝑥𝑥 ≥ 0.24 𝑥𝑥 0.01 , if 0 ≤ 𝑥𝑥 ≤ 0.01 1, if 0.01 ≤ 𝑥𝑥 ≤ 0.1 0.24 − 𝑥𝑥 0.14 , if 0.1 ≤ 𝑥𝑥 ≤ 0.24<label>(9)</label></formula><p>The trapezoidal membership function for a term from the set 𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 of the linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃 will be as follows:</p><formula xml:id="formula_10">𝜇𝜇 𝑖𝑖𝑝𝑝𝑙𝑙𝑢𝑢𝑢𝑢 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 (𝑥𝑥) = ⎩ ⎪ ⎨ ⎪ ⎧ 0, if 𝑥𝑥 ≤ 0.</formula><p>12 or 𝑥𝑥 ≥ 0.42 𝑥𝑥 − 0.12 0.05 , if 0.12 ≤ 𝑥𝑥 ≤ 0.17 </p><p>The trapezoidal membership function for a term from the set 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 of the linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃 will be as follows: </p><formula xml:id="formula_12">𝜇𝜇 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 (𝑥𝑥) = ⎩ ⎪ ⎨ ⎪ ⎧ 0, if 𝑥𝑥 ≤ 0.</formula><p>The trapezoidal membership function for a term from the set 𝐼𝐼𝐼𝐼𝑃𝑃 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 of the linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃 will be as follows: </p><formula xml:id="formula_14">𝜇𝜇 𝑎𝑎𝑖𝑖𝑢𝑢𝑎𝑎𝑝𝑝 𝑎𝑎𝑎𝑎𝑝𝑝𝑝𝑝𝑎𝑎𝑎𝑎𝑝𝑝 (𝑥𝑥) = ⎩ ⎪ ⎨ ⎪ ⎧ 0, if 𝑥𝑥 ≤ 0.</formula><p>The trapezoidal membership function for a term from the set 𝐼𝐼𝐼𝐼𝑃𝑃 ℎ𝑝𝑝𝑎𝑎ℎ of the linguistic variable 𝐼𝐼𝐼𝐼𝑃𝑃 will be as follows: </p><p>Graphically, these functions are shown in Fig. <ref type="figure">3</ref>. A fuzzy knowledge base contains a set of fuzzy rules that define the relationships between input and output variables. Each rule has the form "If X, then Y".</p><p>The next step is to determine the set of rules for fuzzy classification. A total of 1125 rules were developed. Here are some examples.</p><p>If the destination IP address is prohibited, the connection will be blocked regardless of other parameters. This means that as soon as the system determines that the destination IP address is prohibited, no other parameter (protocol, traffic intensity, packet size) will be taken into account. A decision is automatically made based on the IP address being banned, and access to that address is blocked:</p><formula xml:id="formula_17">𝑖𝑖𝑖𝑖 (𝐼𝐼𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑝𝑝𝑃𝑃𝑝𝑝ℎ𝑖𝑖𝑏𝑏𝑖𝑖𝑡𝑡𝑖𝑖𝐼𝐼) ⟹ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑏𝑏𝑟𝑟𝑝𝑝𝑐𝑐𝑘𝑘𝑖𝑖𝐼𝐼)<label>(15)</label></formula><p>If the traffic volume is "high" and the packet size is "small", the connection will be blocked. This is because high traffic intensity may indicate a potential threat (for example, a DDoS attack or excessive data flow), and a "small" packet size may indicate anomalous or malicious requests. In such cases, the system blocks the connection, regardless of protocol or IP address permissions: 𝑖𝑖𝑖𝑖 �(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 ℎ𝑖𝑖𝑖𝑖ℎ)⋀(𝑆𝑆 𝑖𝑖𝑠𝑠 𝑟𝑟𝑝𝑝𝑙𝑙)� ⟹ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑏𝑏𝑟𝑟𝑝𝑝𝑐𝑐𝑘𝑘𝑖𝑖𝐼𝐼) (16) If the IPd allows the connection, the protocol being used is also allowed, and the traffic volume is average, the system assumes that it is a secure connection and allows it. In this case, there are no serious threats, and all parameters indicate a secure connection: 𝑖𝑖𝑖𝑖 ((𝐼𝐼𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖)) ⟹ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑎𝑎𝑟𝑟𝑟𝑟𝑝𝑝𝑙𝑙𝑖𝑖𝐼𝐼) (17) If the protocol is allowed, the traffic volume is high, and the packet size is small, the connection will be blocked. Even if the protocol is allowed, a high traffic volume combined with a small packet size may indicate a potential threat or anomalous behavior. Therefore, the connection will be blocked to protect the system: 𝑖𝑖𝑖𝑖 ((𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 ℎ𝑖𝑖𝑖𝑖ℎ)⋀(𝑆𝑆 𝑖𝑖𝑠𝑠 𝑟𝑟𝑝𝑝𝑙𝑙)) ⇒ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑏𝑏𝑟𝑟𝑝𝑝𝑐𝑐𝑘𝑘𝑖𝑖𝐼𝐼) (18) If the port and protocol are allowed and the traffic volume is below average, the connection is allowed. In this case, both the final decision and the protocol request are allowed, and the threat level (traffic intensity) is low. This means that there is no reason to block the connection, and it can be allowed:</p><formula xml:id="formula_18">𝑖𝑖𝑖𝑖 ((𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(Pr 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑏𝑏𝑖𝑖𝑟𝑟𝑝𝑝𝑙𝑙 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖)) ⇒ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑎𝑎𝑟𝑟𝑟𝑟𝑝𝑝𝑙𝑙𝑖𝑖𝐼𝐼)<label>(19)</label></formula><p>If the destination IP address and port are not defined, the protocol is allowed, and the traffic intensity and packet size values are average, the connection will be allowed: 𝑖𝑖𝑖𝑖 (𝐼𝐼𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑟𝑟𝑛𝑛𝑘𝑘𝑛𝑛𝑝𝑝𝑙𝑙𝑛𝑛)⋀(𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑟𝑟𝑛𝑛𝑘𝑘𝑛𝑛𝑝𝑝𝑙𝑙𝑛𝑛)⋀(Pr 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀ ⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖)⋀(𝑆𝑆 𝑖𝑖𝑠𝑠 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖) ⇒ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑎𝑎𝑟𝑟𝑟𝑟𝑝𝑝𝑙𝑙𝑖𝑖𝐼𝐼) <ref type="bibr" target="#b18">(20)</ref> If the IP address is allowed, the protocol is allowed, the traffic intensity is above average, and the packet size is small, then the connection will be allowed: 𝑖𝑖𝑖𝑖 (𝐼𝐼𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑎𝑎𝑏𝑏𝑝𝑝𝑎𝑎𝑖𝑖 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖)⋀ ⋀(𝑆𝑆 𝑖𝑖𝑠𝑠 𝑏𝑏𝑖𝑖𝑟𝑟𝑝𝑝𝑙𝑙 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖) ⇒ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑎𝑎𝑟𝑟𝑟𝑟𝑝𝑝𝑙𝑙𝑖𝑖𝐼𝐼)</p><p>If the port is forbidden, the protocol is allowed, the traffic intensity is above average, and the packet size is small, then the connection will be blocked: 𝑖𝑖𝑖𝑖 (𝐼𝐼𝐼𝐼 𝑖𝑖𝑠𝑠 𝑝𝑝𝑃𝑃𝑝𝑝ℎ𝑖𝑖𝑏𝑏𝑖𝑖𝑡𝑡𝑖𝑖𝐼𝐼)⋀(Pr 𝑖𝑖𝑠𝑠 𝑝𝑝𝑖𝑖𝑃𝑃𝑚𝑚𝑖𝑖𝑡𝑡)⋀(𝐼𝐼𝐼𝐼𝑃𝑃 𝑖𝑖𝑠𝑠 𝑎𝑎𝑏𝑏𝑝𝑝𝑎𝑎𝑖𝑖 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖)⋀ ⋀(𝑆𝑆 𝑖𝑖𝑠𝑠 𝑏𝑏𝑖𝑖𝑟𝑟𝑝𝑝𝑙𝑙 𝑎𝑎𝑎𝑎𝑖𝑖𝑃𝑃𝑎𝑎𝑖𝑖𝑖𝑖) ⇒ (𝑃𝑃𝑖𝑖𝑠𝑠𝑟𝑟𝑟𝑟𝑡𝑡 𝑖𝑖𝑠𝑠 𝑏𝑏𝑟𝑟𝑝𝑝𝑐𝑐𝑘𝑘𝑖𝑖𝐼𝐼)</p><p>The fuzzy logic inference algorithm performs the process of obtaining a fuzzy logical inference based on fuzzy rules. It consists of four stages: implication, aggregation, activation and accumulation. Implication transforms input fuzzy values 𝑋𝑋 ′ into output fuzzy sets. Aggregation combines the implication results from different rules for each output term. Activation applies the matching degree of each rule to the original fuzzy set using minimization methods to determine the degree of rule activation. Accumulation combines the original fuzzy sets into one fuzzy set 𝑌𝑌 ′ for each original term.</p><p>Defuzzification transforms the original fuzzy values of 𝑌𝑌 ′ into crisp original values of 𝑌𝑌. This is done to obtain a specific decision based on the fuzzy inference. The result of the system's operation will be one result value, which takes one of two parameters: "allowed" [0, 0.5] or "forbidden" [0.5,1]. Therefore, if the signature received the result "allowed" upon completion of the system check, then data transfer is permitted, and the signature is recorded in the database of permitted connections. If the signature is defined as "forbidden", then the connection is blocked by the IP and MAC address of the sender, and the signature is added to the database of prohibited.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Structure of the system for realizing fuzzy inference.</figDesc><graphic coords="4,155.57,554.26,289.14,138.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :10•10 9 -</head><label>39</label><figDesc>Figure 3: Membership functions for the linguistic variable ITr.For all fuzzy sets used, the membership function is defined as the intersection of all sets:</figDesc><graphic coords="8,135.68,166.33,343.05,288.47" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Data of the terms of linguistic variables</figDesc><table><row><cell></cell><cell>permit</cell><cell>[0 0.01 0.04 0.15]</cell></row><row><cell>IPd</cell><cell>unknown</cell><cell>[0.05 0.13 0.77 0.94]</cell></row><row><cell></cell><cell>prohibited</cell><cell>[0.71 0.93 0.99 1]</cell></row><row><cell></cell><cell>permit</cell><cell>[0 0.01 0.1 0.36]</cell></row><row><cell>Pd</cell><cell>unknown</cell><cell>[0.09 0.24 0.78 0.89]</cell></row><row><cell></cell><cell>prohibited</cell><cell>[0.66 0.93 0.98 1]</cell></row><row><cell></cell><cell>permit</cell><cell>[0 0.02 0.15 0.37]</cell></row><row><cell>Pr</cell><cell>unknown</cell><cell>[0.17 0.31 0.73 0.84]</cell></row><row><cell></cell><cell>prohibited</cell><cell>[0.63 0.86 0.99 1]</cell></row><row><cell>Linguistic</cell><cell>low</cell><cell>[0 0.01 0.1 0.24]</cell></row><row><cell>variables</cell><cell>below average</cell><cell>[0.12 0.17 0.36 0.42]</cell></row><row><cell>ITr</cell><cell>average</cell><cell>[0.34 0.44 0.57 0.65]</cell></row><row><cell></cell><cell>above average</cell><cell>[0.57 0.66 0.83 0.91]</cell></row><row><cell></cell><cell>high</cell><cell>[0.8 0.91 0.99 1]</cell></row><row><cell></cell><cell>low</cell><cell>[0 0.02 0.1 0.23]</cell></row><row><cell></cell><cell>below average</cell><cell>[0.1 0.21 0.31 0.4]</cell></row><row><cell>S</cell><cell>average</cell><cell>[0.29 0.41 0.58 0.7]</cell></row><row><cell></cell><cell>above average</cell><cell>[0.6 0.66 0.77 0.91]</cell></row><row><cell></cell><cell>high</cell><cell>[0.8 0.88 0.98 1]</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc></figDesc><table><row><cell cols="2">Formed linguistic variables</cell><cell></cell></row><row><cell>Linguistic</cell><cell>Set of possible values</cell><cell>Phased median</cell></row><row><cell>variables</cell><cell></cell><cell>estimate</cell></row><row><cell>IPd</cell><cell>IPd={p=allowed IP addresses, unk=unspecified,</cell><cell>IPd={p=0.05,</cell></row><row><cell></cell><cell>pr=banned IP addresses}</cell><cell>unk=0.473, pr=0.91}</cell></row><row><cell>Pd</cell><cell>Pd={p=allowed ports, unk=unspecified, pr=prohibited ports}</cell><cell>Pd={p=0.118, unk=0.5, pr=0.893}</cell></row><row><cell>Pr</cell><cell>Pr={p=allowed protocols, unk=unspecified, pr=prohibited protocols}</cell><cell>Pr={p=0.135, unk=0.513, pr=0.87}</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Testing</head><p>In this work, specialized data sets such as KDDCup99, NSL-KDD, UNSW-NB15, WSN-DS, and CICIoT2023 were used to test the system. They serve as a benchmark against which different models can be compared, allowing performance to be assessed based on real and simulated threat scenarios. These sets provide both legitimate and malicious traffic, which allows you to simulate real situations in networks and evaluate the accuracy, detection speed and resistance to false alarms of threat detection systems. With a variety of attack types and normal sessions, these datasets help adapt systems to today's threats and increase their reliability in a real network environment <ref type="bibr" target="#b23">[26,</ref><ref type="bibr" target="#b24">27]</ref>.</p><p>The KDD99 dataset is one of the oldest and most well-known for intrusion detection analysis. It was created as part of the KDD Cup 1999 and includes data on various attacks such as DoS, R2L, and U2R.</p><p>The NSL-KDD dataset is an improved version of KDD'99 and was designed to eliminate problems such as excessive duplicate records. NSL-KDD contains data on various network intrusions and normal sessions, which can be used for training and testing attack detection systems. Its feature is a reduced volume of data without loss of quality, which facilitates processing and analysis. It covers attacks such as DoS, R2L, U2R and network scanning attempts.</p><p>The UNSW-NB15 dataset was collected in 2015 as part of a research project by the Australian Center for Cyber Security (ACCS). It combines normal traffic with today's sophisticated attacks, including DoS, intrusions, privilege abuse, backdoor attacks, and botnets. In total, the set contains 49 attributes for each session, which allows for detailed traffic analysis at various levels.</p><p>CICIDS-2017 is one of the most comprehensive datasets used for network intrusion detection analysis. It contains traffic collected under real-world conditions over five days and covers a wide range of attacks, including DoS, brute force and SQL injection.</p><p>The ISCXVPN2016 dataset was created to study traffic passing through VPNs and regular connections. It is useful for analyzing anomaly detection systems, as VPNs are often used to mask malicious activity. This set includes traffic from both legitimate activities (browsing web pages, videos) and potentially malicious activities performed over a VPN connection.</p><p>The SDN-Dataset focuses on software-defined networks, which are becoming increasingly popular due to their flexibility and centralized management. However, this structure also makes SDN vulnerable to specific attacks, such as traffic manipulation or attacks on the controller. The SDN-Dataset contains both normal and malicious traffic, which allows analyzing threats in such networks and developing methods for their protection.</p><p>A confusion matrix was used to assess the reliability of the developed system. A confusion matrix is a powerful tool used to evaluate the performance of intrusion detection systems and other classification systems, such as spam filters or anomaly detection systems. It allows you to quantify the classification accuracy, that is, how well the system can distinguish one class of objects from another. In the context of intrusion detection systems, a correspondence matrix is used to evaluate the system's ability to correctly identify malicious and normal network traffic flows. It consists of four main indicators:</p><p>• True Positive (TP) is the number of correctly identified malicious streams. In other words, the system detected an attack, and this attack did take place; • True Negative (TN) is the number of correctly identified normal flows when the system did not detect an attack and the attack was really absent; • False Positive (FP) is the number of false positives when the system classifies normal traffic as malicious, which can block legitimate activity and create unnecessary noise for analysts; • False Negative (FN) is the number of misses when the system classifies malicious traffic as normal, allowing attacks to go undetected.</p><p>The results of testing with different data sets are shown in Table <ref type="table">3</ref>. It should be noted that to ensure the reliability of the results, the data from the sets were not used in full. The most common metrics include accuracy, precision, recall, specificity, and F-measure. Accuracy shows the total proportion of correctly classified samples and is calculated as the ratio of the sum of true positive and true negative predictions to the total number of samples:</p><p>Precision, in turn, determines what proportion of samples classified as positive by the model are actually positive and is calculated as the ratio of true positive predictions to the sum of true positive and false positive predictions:</p><p>Recall reflects what proportion of all positive samples were correctly identified by the model and is calculated as the ratio of true positive predictions to the sum of true positive and false negative predictions:</p><p>Specificity, on the other hand, shows what proportion of all negative samples were correctly classified and is calculated as the ratio of true negative predictions to the sum of true negative and false positive predictions:</p><p>The F-measure is a harmonic mean of accuracy and completeness and is often used as a single measure of model quality because it takes into account both aspects: the ability of the model to correctly classify positive samples and the ability to avoid false positive classifications. The choice of a specific metric depends on the task at hand and the relative importance of different types of errors:</p><p>𝐹𝐹 − 𝑠𝑠𝑐𝑐𝑝𝑝𝑃𝑃𝑖𝑖 = (2 × 𝑅𝑅𝑖𝑖𝑐𝑐𝑎𝑎𝑟𝑟𝑟𝑟 × 𝐼𝐼𝑃𝑃𝑖𝑖𝑐𝑐𝑖𝑖𝑠𝑠𝑖𝑖𝑝𝑝𝑛𝑛)/(𝑅𝑅𝑖𝑖𝑐𝑐𝑎𝑎𝑟𝑟𝑟𝑟 + 𝐼𝐼𝑃𝑃𝑖𝑖𝑐𝑐𝑖𝑖𝑠𝑠𝑖𝑖𝑝𝑝𝑛𝑛) (27) Performance indicators of testing using KDDCup99, NSL-KDD, UNSW-NB15, WSN-DS, and CICIoT2023 data sets are given in Table <ref type="table">4</ref>. The analysis of the proposed system on different data sets shows the following regularities. Accuracy reached 0.95 on the KDDCup99, NSL-KDD, CICIDS-2017 and SDN-Dataset datasets. On the ISCXVPN2016 set, the system showed the highest accuracy of 0.96, while on the UNSW-NB15 set, the system showed the lowest accuracy of 0.94. Precision remains high on all sets, varying between 0.95 and 0.98. The system shows the highest precision on KDDCup99 (0.98), while on UNSW-NB15 and SDN-Dataset, it shows slightly lower values -0.96 and 0.95, respectively. Completeness on all sets is also high, ranging from 0.96 to 0.98, with the highest on ISCXVPN2016 (0.98), while other sets, including KDDCup99, NSL-KDD, CICIDS-2017, show identical completeness at 0.97. The F-measure varies between 0.95 and 0.98. The highest F-measure is shown by ISCXVPN2016 (0.98), while the lowest F-measure is recorded by SDN-Dataset (0.95). In general, the system shows consistently high quality indicators that do not fluctuate significantly depending on the data sets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The article is focused on the development and implementation of a system for network traffic analysis using fuzzy logic. The basic idea is to apply fuzzification and fuzzy inference techniques to classify network packets based on their signatures. Using only the most informative parameters allows you to reduce the load on the system and increase the speed of data processing, which is important for the stable operation of the The developed system effectively determines whether to allow or deny data transmission based on fuzzy criteria.</p><p>One of the disadvantages of the proposed system is the lack of ability to detect attacks stretched over time. The method of cumulative analysis of anomalies can improve the method of detecting network attacks, which will allow more effective detection of long-lasting attacks that may remain unnoticed if each anomaly is considered separately. However, this is not relevant in the context of this work because the duration of connection to public or campus networks is short-term, and it is not advisable to implement attacks of this type.</p><p>Further research involves expanding the knowledge base by adding new rules to the fuzzy knowledge base to cover a wider range of possible network traffic scenarios. The possibility of integrating this system with other solutions in the field of cyber security is being considered, which will allow the creation of a more comprehensive and reliable approach to protecting networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling check; DeepL Translate in order to: some phrases translation into English. After using these tools/services, the authors reviewed and edited the content as needed and take full responsibility for the publication's content.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.ibm.com/reports/data-breach" />
		<title level="m">Cost of a Data Breach Report</title>
				<imprint>
			<date type="published" when="2024">2024. 2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://cybersecurityventures.com/cybercrime-to-cost-the-world-9-trillion-annually-in-2024/" />
		<title level="m">Cybercrime To Cost World $9.5 trillion USD annually in 2024</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://www.blazeinfosec.com/post/cyber-threats-for-finance-2023/" />
		<title level="m">Biggest cyber threats for financial institutions in 2023</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Network intrusion detection leveraging multimodal features</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kiflay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tsokanos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fazlali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kirner</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.array.2024.100349</idno>
	</analytic>
	<monogr>
		<title level="j">Array</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A soft prototype-based autonomous fuzzy inference system for network intrusion detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Howells</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yuan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">677</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Self-healing hybrid intrusion detection system: an ensemble machine learning approach</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kushal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shanmugam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sundaram</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discov Artif Intell</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Tsobdjou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pierre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Quintero</surname></persName>
		</author>
		<idno type="DOI">10.1109/TNSM.2022.3142254</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Network and Service Management</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1679" to="1689" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alduailij</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold</title>
		<author>
			<persName><forename type="first">D</forename><surname>Loïc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Samuel</forename><surname>Tsobdjou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alejandro</forename><surname>Pierre</surname></persName>
		</author>
		<author>
			<persName><surname>Quintero</surname></persName>
		</author>
		<idno type="DOI">10.1109/TNSM.2022.3142254</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Netw. and Serv. Manag</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1679" to="1689" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hajimaghsoodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Jalili</surname></persName>
		</author>
		<idno type="DOI">10.1109/TIFS.2022.3172598</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Forensics and Security</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="2732" to="2745" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Network attack recognition using fuzzy logic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Borisova</surname></persName>
		</author>
		<idno type="DOI">10.17770/etr2024vol2.8054</idno>
	</analytic>
	<monogr>
		<title level="j">ETR</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="55" to="60" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Detecting Covid-19 chaos-driven phishing/malicious URL attacks by a fuzzy logic and data mining-based intelligence system</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Zahra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Chishti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Baba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Wu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eij.2021.12.003</idno>
	</analytic>
	<monogr>
		<title level="j">Egyptian Informatics Journal</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="197" to="214" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Machine Learning Approach Equipped with Neighbourhood Component Analysis for DDoS Attack Detection in Software-Defined Networking</title>
		<author>
			<persName><forename type="first">Ö</forename><surname>Tonkal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Polat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Başaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cömert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kocaoğlu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">SSH-Brute Force Attack Detection Model based on Deep Learning</title>
		<author>
			<persName><forename type="middle">K</forename><surname>St</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Wanjau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Wambugu</surname></persName>
		</author>
		<author>
			<persName><surname>Nd</surname></persName>
		</author>
		<author>
			<persName><surname>Kamau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Applications Technology and Research</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">01</biblScope>
			<biblScope unit="page" from="42" to="50" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Learning Representations of Network Traffic Using Deep Neural Networks for Network Anomaly Detection: A Perspective towards Oil and Gas IT Infrastructures</title>
		<author>
			<persName><forename type="first">S</forename><surname>Naseer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ali</forename><forename type="middle">R</forename><surname>Faizan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">D</forename><surname>Dominic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Saleem</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym12111882</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Detection of network attacks in cyberphysical systems using a rule-based logical neural network</title>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Cheshun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">-B</forename><forename type="middle">M</forename><surname>Salem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3736</biblScope>
			<biblScope unit="page" from="255" to="268" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rodríguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Á</forename><surname>Alesanco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mehavilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>García</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22239326</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Multi-criteria assessment of the correctness of decision-making in information security tasks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Khoroshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Brailovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kapustian</surname></persName>
		</author>
		<idno type="DOI">.org/10.31891/csit-2023-4-11</idno>
	</analytic>
	<monogr>
		<title level="m">Computer systems and information technologies</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="81" to="86" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Signature-based Approach to Detecting Malicious Outgoing Traffic</title>
		<author>
			<persName><forename type="first">N</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Cheshun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boyarchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3373</biblScope>
			<biblScope unit="page" from="486" to="506" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://www.blocklist.de/en/export.html" />
		<title level="m">Blacklist IP Addresses Live Database</title>
				<imprint>
			<date type="published" when="2023">2024. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Voskoglou</surname></persName>
		</author>
		<idno type="DOI">10.3390/books978-3-0365-7375-5</idno>
		<title level="m">Fuzzy Sets, Fuzzy Logic and Their Applications</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page">282</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Zadeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Aliev</surname></persName>
		</author>
		<ptr target="https://www.perlego.com/book/858249/fuzzy-logic-theory-and-applications-part-i-and-part-ii-pdf" />
		<title level="m">Fuzzy Logic Theory and Applications</title>
				<imprint>
			<publisher>World Scientific Publishing Company</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<title level="m">Proceedings of the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Berlin; Berlin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">September 12-14, 2013. 2013</date>
			<biblScope unit="page" from="363" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">A Technique for detection of bots which are using polymorphic code</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">431</biblScope>
			<biblScope unit="page" from="265" to="276" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Notions of Fuzzy Logic</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">C</forename><surname>De Barros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Bassanezi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Lodwick</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-50492-1_4</idno>
	</analytic>
	<monogr>
		<title level="m">A First Course in Fuzzy Logic, Fuzzy Dynamical Systems, and Biomathematics, Studies in Fuzziness and Soft Computing</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">432</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
