<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Lotka-Volterra Dynamics Neural Model for Cyber Risk Assessment⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andrey Sharapata</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Yevseiev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kushnerov</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Melenti</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stanislav Milevskyi</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National Automobile and Highway University</institution>
          ,
          <addr-line>Yaroslava Mudroho 25 61002 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Academy of Security Service of Ukraine</institution>
          ,
          <addr-line>Maksymovycha 22 03022 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University “Kharkiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyrpychova 2 61002 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Sumy State University</institution>
          ,
          <addr-line>Kharkivska 116 40007 Sumy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>9</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>A hybrid model for dynamic cyber risk assessment is proposed that integrates a deep neural network and the Lotka-Volterra model. The model simultaneously classifies network traffic (normal/anomaly) and predicts coefficients (α, β, γ, ϕ) that determine the dynamics of the attack-defence interaction. Trained and tested on NSL-KDD data, the model achieved a classification accuracy of 0.8006, AUC of 0.9016, and MSE of 0.0027 for coefficient prediction. Statistically significant differences in the predicted coefficients for normal and anomalous sessions were found, indicating that the model successfully captures underlying characteristics that differentiate these two classes beyond simple pattern matching. Simulation of the Lotka-Volterra dynamics with predicted parameters demonstrates different patterns for different traffic classes, indicating the approach's potential for deeper risk assessment compared to traditional intrusion detection methods. This ability to forecast interaction dynamics provides a forward-looking view of potential threats, a significant step beyond simple, reactive threat identification.</p>
      </abstract>
      <kwd-group>
        <kwd>cyber risk assessment</kwd>
        <kwd>neural networks</kwd>
        <kwd>Lotka-Volterra dynamics</kwd>
        <kwd>intrusion detection</kwd>
        <kwd>NSL-KDD1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. Introduction</p>
      <p>This research presents an innovative hybrid neural model to integrate two key tasks into a
cohesive framework. First, it performs robust network traffic classification for intrusion detection,
leveraging the power of modern deep learning approaches that have proven effective in traffic
analysis [1; 2; 3]. Second, and what constitutes its key feature, the model simultaneously predicts the
parameters for the dynamic Lotka–Volterra model. This dual-purpose approach allows the system
to identify an anomaly and quantitatively assess the dynamic potential of the associated risk. This
synthesis of a predictive mathematical model with a powerful deep learning engine for parameter
estimation is the central contribution of our work.</p>
      <p>The primary goal of this work is to develop and thoroughly validate such a model, demonstrating
its ability to generate qualitatively different dynamic patterns for normal and anomalous network
activity. Thus, we aim to show that the predicted parameters carry essential, actionable information
for a deeper, more predictive assessment of cyber risks, moving significantly beyond the capabilities
of traditional detection methods. This paper details the model's architecture and training
methodology and thoroughly evaluates its performance, demonstrating its prognostic capabilities
through simulation.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods</title>
      <p>
        The empirical foundation of this study is the NSL-KDD dataset [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which is widely recognised as a
standard benchmark for evaluating the performance of intrusion detection systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. A
comprehensive series of preprocessing steps was meticulously applied to prepare the data for
effective processing by the neural network model.
      </p>
      <p>The byte_ratio feature was created from existing byte counts to provide more relational context.
Furthermore, categorical features, specifically protocol_type and flag, which are non-numeric, were
converted into a numerical format suitable for the neural network using one-hot encoding. As a final
preprocessing step, all numerical features were standardised using Z-score normalisation. This
ensured that all features had a mean of 0 and a standard deviation of 1, which is critical for allowing
all features to contribute equally to the model's learning and helping to accelerate the convergence
of the training process.</p>
      <p>
        The theoretical core of our approach is an adapted Lotka–Volterra model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which
mathematically describes the dynamic interaction between the level of attack, A(t), and the level of
protection, Z(t) . The system is formally defined by the following pair of differential equations:


dA
dt
 = αA - βA Z
= γ
      </p>
      <p>− ϕ</p>
      <p>Where A(t) represents the aggregate level of attack activity, and Z(t) represents the deployed level
of defensive measures at a given time t. The terms in these equations capture the essential feedback
loops of the adversarial relationship:
•
•</p>
      <p>Attack Dynamics (ddAt). Two main forces govern the change in the attack level. The term αA
represents the intrinsic growth of the attack, such as the natural rate of malware propagation
or scanning for new victims, assuming no defensive opposition. The term - βA Z means the
reduction of the attack level due to successful neutralisation by the defence system; it is
proportional to the frequency of interactions between attacks and defences.</p>
      <p>Defence Dynamics ( ). Opposing factors similarly drive the change in the defence level. The
term γ</p>
      <p>models the reactive growth and adaptation of the defence system in response to
detected attacks, such as deploying new firewall rules or patching vulnerabilities. The term
−ϕ represents the "cost" or natural decay of the defence effort over time, which can be
interpreted as maintenance costs, resource depreciation, or the obsolescence of security
measures that are no longer effective.</p>
      <p>Within this framework, the coefficients are interpreted as follows: α represents the intrinsic
growth rate of the attack; β signifies the effectiveness of the defense in neutralising the attack; γ
corresponds to the rate at which the defense adapts or grows in response to an attack; and ϕ denotes
the cost or natural decay rate of the defense system over time.</p>
      <p>A critical step in our methodology was operationalising these abstract coefficients to create
trainable targets for the neural network. These coefficients were empirically calculated based on
specific, measurable features from the NSL-KDD dataset to generate ground-truth values for training.
For instance, metrics such as serror_rate, rerror_rate, and anomaly frequencies across different
services were used to derive proxy values for the Lotka-Volterra coefficients. This process allowed
us to obtain concrete target values for the neural network's regression task.</p>
      <p>We designed a hybrid, multi-task neural network to simultaneously perform two distinct but
related tasks: binary classification of network traffic (normal/anomaly) and regression to predict the
four coefficients (α, β, γ, ϕ) of the Lotka–Volterra model. The architecture's input layer accepts the
preprocessed feature vectors and adds a layer of Gaussian noise, which acts as regularisation to
enhance model robustness and prevent overfitting. These inputs pass through two shared, fully
connected (dense) layers with 256 and 128 neurons, respectively. These layers utilise the Rectified
Linear Unit (ReLU) activation function to introduce non-linearity. Batch Normalisation follows each
step to stabilise the training process, and a Dropout layer is used for further regularisation.</p>
      <p>
        Following these shared layers, the architecture splits into two separate output heads, one for each
task. The classification head consists of a dense layer with a Sigmoid activation function, which
produces a probability score indicating whether the input is an anomaly. The loss for this head is
calculated using a binary cross-entropy function, which is standard for binary classification tasks.
The regression head employs a dense layer with a linear activation function to output four
continuous values corresponding to the Lotka-Volterra coefficients. The loss for this head is
measured by the mean squared error (MSE) function, which quantifies the average squared difference
between the predicted and actual coefficients. The overall loss for the model is a weighted sum of
these two individual losses, with weights of 1.0 for classification and 0.2 for regression, balancing
the two tasks during training. Before being used in simulations, the predicted coefficients are clipped
to the range [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] to ensure stability. The model was trained using the AdamW optimiser, a robust
choice that follows standard deep learning practices [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The training process was carefully managed using several control mechanisms to ensure optimal
performance and prevent overfitting. To retain the best-performing version of the model, its weights
were saved only when the Area Under the Curve (AUC) metric on a separate validation set showed
improvement. Additionally, the training employed an adaptive learning rate scheduler, which
automatically reduced the learning rate whenever the validation performance plateaued, allowing
for finer adjustments and more stable convergence. Finally, an early stopping mechanism was
implemented to halt the training process automatically if the validation AUC did not improve for a
set number of consecutive epochs, thereby preventing the model from overfitting to the training data
and enhancing its generalisation capabilities.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Assessment of hybrid model results</title>
      <p>The model's training process was monitored to ensure stability and prevent overfitting. The learning
curves, depicted in Figure 1, provide a detailed visualisation of the model's performance on both the
training and validation sets across epochs for three key metrics: accuracy, Area Under the Curve
(AUC), and the Mean Squared Error (MSE) of the Lotka-Volterra coefficients. As shown in the figure,
the performance metrics on the validation set consistently and closely track those on the training
set. For instance, both sets' accuracy and AUC curves rise in tandem and stabilise, while the MSE
curves decrease sharply and remain low. This parallel progression is strong evidence of stable
convergence and indicates that the model did not suffer from significant overfitting.</p>
      <p>The learning curves in Figure 1 show that the model's classification metrics (Accuracy, AUC)
steadily improved. At the same time, the regression error (LV MSE) rapidly decreased to near-zero
for both training and validation sets. Crucially, the validation curves closely track the training curves
across all plots. This demonstrates stable convergence and indicates that the model generalises well
without suffering from significant overfitting.</p>
      <p>Upon completion of training, the model's final performance was evaluated on the unseen
NSLKDD test dataset (Table 1).</p>
      <p>The model achieved a classification accuracy of 0.8006, demonstrating a strong capability to
identify traffic instances correctly. The Area Under the Curve (AUC) metric reached 0.9016. This
high AUC value is significant as it indicates excellent discrimination between the standard and
anomalous classes across all classification thresholds, confirming the model's robustness as a
classifier. The model demonstrated high fidelity in predicting the dynamic parameters for the
regression task, which is central to our hybrid approach. This was evidenced by a very low Mean
Squared Error (MSE) of 0.0027, validating the model's ability to learn and predict the Lotka-Volterra
coefficients accurately.</p>
      <p>A core objective of this study was to determine if the predicted Lotka-Volterra coefficients (α, β,
γ, ϕ) capture meaningful, underlying differences between regular and malicious network activity
beyond simple classification. To investigate this, an analysis was conducted on the model's
predictions for 13,592 normal and 8,952 abnormal sessions from the test set. The descriptive statistics,
presented in Table 2, revealed statistically significant differences in the coefficient distributions
between the two classes.</p>
      <p>Anomalous traffic is characterised by a higher median value for coefficient α (0.0764 vs. 0.0603
for normal), representing the intrinsic potential for attack growth. It also shows a higher median
value for β (0.2514 vs. 0.2243), signifying a more intense interaction with the defence system. These
statistical differences are visualised in the box plots shown in Figure 2. In the figure, the distributions
for the anomaly class are visibly shifted towards higher values for coefficients α and β compared to
the regular class, providing strong graphical evidence for the statistical findings. Furthermore,
histograms of the coefficients confirm that the very shapes of the distributions differ between the
two classes. For instance, the distribution of the α coefficient for the anomalous class is skewed to
the right, indicating a prevalence of higher values that correspond to greater attack potential.</p>
      <p>Conversely, the coefficients γ (defence adaptation rate) and ϕ (defence cost/decay) show less
pronounced, though still informative, differences. The median γ values are nearly identical for both
classes, suggesting that the rate of defensive adaptation captured by the model is not a primary
distinguishing feature in this dataset. However, the slightly higher median ϕ for anomalous traffic
(0.8563 vs. 0.8434) is noteworthy. This could imply that interactions classified as anomalous are
associated with a higher 'cost of defence' or a faster rate of obsolescence for the responding security
measures.</p>
      <p>Taken together, these results demonstrate that the model has successfully learned to assign a
distinct 'dynamic signature'—a unique vector of (α, β, γ, ϕ) coefficients—to different classes of
network traffic. The systematic variations in these signatures, particularly in the attack-related
parameters, provide strong evidence that the model captures the underlying behavioural
characteristics of network sessions, moving beyond superficial pattern matching to a more profound,
dynamic risk assessment.</p>
      <p>To validate the practical utility of these predicted coefficients, we simulated the Lotka-Volterra
dynamics using parameter sets generated by the model for both regular and anomalous sessions. The
simulations revealed distinctly different behavioural patterns. As shown in Figure 3, parameters
predicted for regular traffic tend to generate stable, controlled trajectories where the "attack" and
"defence" levels remain in a bounded, cyclical balance. In stark contrast, the simulations for
parameters typical of anomalous traffic, shown in Figure 4, more often lead to unstable scenarios
characterised by a rapidly increasing "attacks," indicating a system state escalating out of control.</p>
      <p>This crucial result confirms that the predicted coefficients carry meaningful information about
network activity’s potential risk and dynamic behaviour. By translating raw network data into
dynamic parameters, the model offers a much deeper insight than traditional intrusion detection
methods can provide, enabling a forward-looking assessment of threat evolution.</p>
      <p>
        It is essential to acknowledge the study's limitations, which also highlight clear directions for
future research. The age of the NSL-KDD dataset is a primary constraint, as it may not fully represent
the complexity and signature of modern, sophisticated cyber threats [4; 5]. The Lotka-Volterra model
itself, while a powerful analogy, is a simplification of the highly complex, multi-faceted nature of
real-world attack-defence interactions, and the specific method for operationalising its coefficients
could be further refined [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Additionally, while the neural network performs well, the
interpretability of its internal decision-making process requires further investigation, which is a
common challenge in the field of deep learning [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. These limitations are not seen as detriments but
valuable starting points for improving and extending the proposed approach in future work.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>This paper successfully developed and validated a novel hybrid neural model that integrates deep
learning for network traffic classification with predicting parameters for the Lotka-Volterra dynamic
model. We demonstrated that the model accurately distinguishes between normal and anomalous
traffic and, more importantly, quantifies the underlying dynamics of the "attack-defence" interaction
through the predicted coefficients.</p>
      <p>The core contribution of this work lies in its departure from traditional, static intrusion detection.
The analysis of the predicted coefficients and the subsequent system dynamics simulation confirmed
that the model effectively captures the distinct nature of normal and anomalous activity. By
predicting dynamic parameters, our approach allows for an assessment that is not limited to
identifying a threat's presence but extends to forecasting its potential development. This provides a
richer, more nuanced understanding of cyber risks than conventional intrusion detection methods,
moving the paradigm from simple detection to prognostic risk assessment.</p>
      <p>The practical significance of this research lies in its potential to form the basis for more advanced
and informative decision support systems in cybersecurity. However, further development is
essential for its practical application. Future work should focus on several key areas: validating the
model on larger, more contemporary datasets to ensure its relevance against modern threats;
researching alternative or more complex dynamic models beyond the classical Lotka-Volterra
framework; enhancing the interpretability of the neural network's predictions; and working towards
the integration of this approach into real-time monitoring systems. In conclusion, this study
represents a significant step towards creating more intelligent and forward-looking cybersecurity
systems that can not only react to threats but also anticipate their evolution.
The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] [1]
          <string-name>
            <surname>Abbasi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shahraki</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Taherkordi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Deep learning for network traffic monitoring and analysis (NTMA): A survey</article-title>
          .
          <source>Computer Communications</source>
          ,
          <volume>170</volume>
          ,
          <fpage>19</fpage>
          -
          <lpage>41</lpage>
          . https://doi.org/10.1016/j.comcom.
          <year>2021</year>
          .
          <volume>01</volume>
          .021
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] [2]
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp; http://www.deeplearningbook.org
          <string-name>
            <surname>Courville</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Deep learning</article-title>
          . MIT Press.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] [3]
          <string-name>
            <surname>Kushnerov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murr</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milevskyi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melnyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Golovashych</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Application of neural networks for network traffic monitoring and analysis</article-title>
          .
          <source>In</source>
          <year>2024</year>
          ,
          <source>8th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ). IEEE. https://doi.org/10.1109/ISMSIT63511.
          <year>2024</year>
          .10757251
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4] [4]
          <string-name>
            <surname>McHugh</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations performed by Lincoln Laboratory</article-title>
          .
          <source>ACM Transactions on Information and System Security</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ),
          <fpage>262</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] [5]
          <string-name>
            <surname>Tavallaee</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bagheri</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ghorbani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>A detailed analysis of the KDD CUP 99 data set</article-title>
          .
          <source>Second IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA).</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] [6]
          <string-name>
            <surname>Yevseiev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>Development of a method for assessing the security of cyberphysical systems based on the Lotka-Volterra model</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>5</volume>
          (
          <issue>113</issue>
          ),
          <fpage>30</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>