<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (N. Vyshnevska);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A Probabilistic Model with the Markov Property for Cyberattack Detection Based on the Analysis of Dynamic Traffic Variations⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Vyshnevska</string-name>
          <email>nataliia.vyshnevska@npp.kai.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Kozlovskyi</string-name>
          <email>valerii.kozlovskyi@npp.kai.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Lysetskyi</string-name>
          <email>yurii.lysetskyi@snt.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>hor Makieiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State University "Kyiv Aviation Institute"</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>In this paper, a probabilistic model for cyberattack detection with a Markov property is proposed. The model integrates a posteriori state estimation with the analysis of a multivariate anomaly indicator derived from network traffic dynamics. It consists of three primary components: the conditional probability of observing the current factor ensuring mathematical consistency and scalable probability estimation. The proposed approach significantly reduces computational complexity by limiting historical dependency to a single previous time step (Markov assumption), while maintaining adaptability to evolving network behaviour. The incorporation of multiscale analysis, Zthe detection of both instantaneous and gradually unfolding cyberattacks. The feasibility of real-time implementation is demonstrated, making the model suitable for integration into contemporary cyber threat monitoring systems. Experimental validation indicates that the approach achieves a balance between sensitivity to anomalies and computational efficiency, with potential applications in intrusion detection systems (IDS) and security information and event management (SIEM) platforms. cyberattack detection; probabilistic model; Markov process; anomaly indicator; a posteriori probability; network traffic; adaptive threshold; cyber threat; inertia; real-time detection.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In the context of the rapidly increasing complexity and scale of cyberattacks, the challenge of timely
threat detection in information systems becomes critically important. This is particularly relevant for
attacks that evolve gradually or exhibit inertia such as DDoS attacks, low-level slow-rate intrusions,
or multi-stage threats that covertly unfold within network traffic. Traditional detection methods
based on fixed thresholds or instantaneous signatures often lack sufficient sensitivity to such
scenarios or generate an excessive number of false positives. Consequently, there is a growing need
for detection models that go beyond analysing the current system state, incorporating prior
behaviour, statistical patterns of traffic variation, and temporal probabilistic dependencies among
observed events. The use of integrated indicators that aggregate multidimensional information from
the network environment allows for the reduction of complex data structures to a unified metric,
which can be adaptively estimated over time.</p>
      <p>In this paper, we propose a probabilistic model for cyberattack detection based on the analysis of
dynamic traffic changes, which incorporates a Markov property between system states and utilizes a
posteriori estimation via multiscale traffic analysis. The model consists of three essential components:</p>
    </sec>
    <sec id="sec-2">
      <title>1. Research</title>
    </sec>
    <sec id="sec-3">
      <title>2. Main part</title>
      <p>Unlike conventional approaches, the proposed model captures the historical context of threats,
performs smoothing of the estimation by leveraging the inertia of attacks, and adaptively responds
structure reduces computational
overhead by limiting the analysis to the current and immediately preceding states, thereby
eliminating the need to retain the entire observation history.</p>
      <p>The goal of this research is the formalization and implementation of a probabilistic method for
cyberattack detection that integrates the precision of a posteriori state estimation with high
sensitivity to dynamic changes in network traffic.</p>
      <sec id="sec-3-1">
        <title>Mathematical formalization of the model.</title>
        <p>To improve the mechanism for detecting cyberattacks, a discrete probabilistic model with a
firstorder Markov property was used. The model takes into account the current parameters of network
traffic and the previous state of the system. This approach describes the inertia of processes inherent
in cyberattacks and allows to formalize the temporal dependence between events.</p>
        <p>Let's introduce the main notations and dependencies.</p>
        <p>The state of the system at a point in time t is determined by the variable Yt 0,1 , its value can
take two states: the active phase of the attack Yt = 1, indicating the need for prompt/immediate
response, and the normal state of the network without signs of anomalies Yt = 0 .</p>
        <p>
          The integral indicator of the anomaly is determined by a variable It indicating the level of traffic
deviation from normal behavior [
          <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
          ].
        </p>
        <p>Formally, the binary state of the system can be written as follows:

 = {
1 ∶  ℎ 
: 




 
 


(1)
by:</p>
        <p>
          The assessment of the current state of the system takes into account its previous state and makes
it possible to analyze the context of events, as well as track the dynamics of traffic changes. The
combination of network parameter states provides a comprehensive description of network behavior
and reduces the risk of false positives [
          <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4-7</xref>
          ].
        </p>
        <p>The model for detecting dynamic traffic changes is based on the Bayesian approach using the
Markov property. It assumes that the current state of the system is a function of the integral indicator
of the anomaly It and the state of the system at the previous point in time Yt−1 . This approach allows
to use the Markov property and take into account the nearest previous state of the system [2, 3, 5, 7,</p>
        <p>The probability of the system being in the state of attack at a point in time, t taking into account
the current value of the integral index of anomalies and the previous state of the system, is determined
P(Yt = 1 It,Yt−1) =</p>
        <p>P(It Yt = 1,Yt−1)  P(Yt = 1 Yt−1)</p>
        <p>P(It Yt−1)
(2)
the integral indicator It corresponds to the standard behavior of the network. Under the normal state,
the integral indicator fluctuates near the mean level, and under the condition of the attack, it observes
a stable or increasing deviation from the norms.</p>
        <p>P(Yt = 1 It,Yt−1) = f (It ;Yt ) (3)
where Y is the threshold parameter that determines the boundary between states; f (It ;Y ) - a
t t
continuous or partial function, the specific form of which depends on the nature of network traffic,
namely, small values of the integral indicator correspond to a low probability of an attack, in turn,
exceeding the threshold gives a surge in probability growth.</p>
        <p>In fact, (2) acts as a mechanism for converting multidimensional traffic characteristics into a single
scale of confidence in observation and reduces it to a numerical estimate [0; 1].</p>
        <p>
          P(Yt = 1 Yt−1) - a priori probability of the system going into an attack state, acts as a filter that
allows to be sensitive to successive signs of threats and ignore random fluctuations that are not related
to attacks [
          <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref8 ref9">2-5, 8, 9</xref>
          ]. P(It Yt−1) - normalization coefficient, which guarantees the correct scaling of the
probability within [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ]. and provides correct interpretation. It reflects the probability of occurrence
of the current value of the integral indicator It under conditions, if only known, the previous state of
the system Yt−1 , regardless of the state of the system (norm-attack) at the present moment of time [
          <xref ref-type="bibr" rid="ref2 ref3 ref5 ref6">2,
3, 5,6</xref>
          ].
        </p>
        <p>This approach combines information about past and current observations while maintaining
adaptability to changes in traffic.</p>
        <p>Due to the previous state of the system, the model displays the inertia of attacks, recognizes
continuous or recurring threats, and minimizes false positive responses to single deviations.</p>
        <p>
          Generalization of the three components P(It Yt = 1,Yt−1) in P(Yt = 1 Yt−1) P(It Yt−1) the structure
of the Bayesian model with the Markov property allows to reasonably determine the presence of
cyberattacks, taking into account both the current signs of the anomaly and the temporal dynamics of
events [
          <xref ref-type="bibr" rid="ref2 ref3 ref5 ref9">2, 3, 5, 9</xref>
          ].
        </p>
        <p>
          The proposed model is based on the assumption that the current state of the system Yt is determined
only by the previous state Yt−1 and the integral anomaly indicator It calculated on the basis of a
multiscale analysis of traffic parameters [
          <xref ref-type="bibr" rid="ref5 ref6 ref8">5, 6, 8</xref>
          ]. This reduces computational complexity, because the
model analyzes only the last state and the current indicator without the need to store the entire history
[
          <xref ref-type="bibr" rid="ref4 ref5 ref6">4,5,6</xref>
          ]. At the same time, the integral indicator It aggregates information from all key parameters of
network traffic, thereby maintaining high accuracy in detecting attacks [
          <xref ref-type="bibr" rid="ref6 ref8">6, 8</xref>
          ].
        </p>
        <p>
          Due to the use of the Markov property, time dependencies are reduced to one step, which
corresponds to the inertial nature of many attacks (e.g., in the case of an ongoing cyberattack) [
          <xref ref-type="bibr" rid="ref4 ref5 ref8">4, 5, 8</xref>
          ].
The integral anomaly indicator It is calculated based on the deviations of normalized parameters of
network traffic from multiscale trends, allowing the level of deviation from the norm to be estimated
by a single metric [
          <xref ref-type="bibr" rid="ref6 ref8">6,8</xref>
          ]. The model also takes into account the previous state of the system Yt−1 , and
determines if there has already been an attack, then even a moderate deviation of the indicator may
indicate its continuation [
          <xref ref-type="bibr" rid="ref3 ref8 ref9">3, 8, 9</xref>
          ].
        </p>
        <p>The use of the Markov property allows to significantly simplify the calculation of the total
distribution in the detection model, limiting it only to the current and previous state of the system,
without taking into account the full sequence of observations and formalized in the form of:</p>
        <p>
          P(Yt, It Yt−1, It−1) = P(Yt Yt−1)  P(It Yt, It−1)  P(Yt−1 It−1) , (5)
where is P(Yt Yt−1) the transient probability between the states of the system. It simulates the inertia
of attacks and allows the model to distinguish short-term bursts from sequential threats [
          <xref ref-type="bibr" rid="ref4 ref5 ref9">4, 5, 9</xref>
          ].
P(It Yt, It−1) - conditional probability of observing the current value of the integral indicator, taking
of the system state and anomaly level in the previous step [
          <xref ref-type="bibr" rid="ref3 ref6">3,6</xref>
          ].
        </p>
        <p>
          The use of this approach allows: to reduce the amount of processed data on each cycle, thus ensuring
high reactivity to real changes in traffic, to recognize sequential or renewed threats due to dynamic
updating of dependencies between the current and previous state of the system [
          <xref ref-type="bibr" rid="ref5 ref8 ref9">5, 8, 9</xref>
          ].
        </p>
        <p>
          This is an important step, because many attacks are periodic or protracted, and an accurate
assessment of the probability of an attack at the moment t is possible only if the previous state of the
system is taken into account Yt−1 and the indicator changes It relative to the background of previous
observations [
          <xref ref-type="bibr" rid="ref10 ref3 ref8">3, 8, 10</xref>
          ].
        </p>
        <p>
          In the proposed model, the probability that the system is in a state of attack at a point in time t is
determined by a posteriori distribution, which is built on the basis of the total probability of features
and the Markov property between the states of the system [
          <xref ref-type="bibr" rid="ref2 ref3 ref5">2, 3, 5</xref>
          ]. The a posteriori probability of
detecting an attack is determined by the expression:
        </p>
        <p>P(Yt = 1 It, It−1) =</p>
        <p>P(It It−1,Yt = 1)  P(Yt = 1 Yt−1) , (6)</p>
        <p>
          P(It It−1)
where is P(It It−1,Yt = 1) the conditional probability of observing the anomaly indicator in the event
of an attack, taking into account its previous value, which makes it possible to display the dynamics of
traffic changes. P(Yt = 1 Yt−1) - transient probability reflects the tendency of the system to remain in
the state of attack or switch to it from normal mode, P(It It−1) - normalization factor, which acts as a
guarantee that the a posteriori probability will be scaled within [0; 1] [
          <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref6 ref8 ref9">2, 3, 4, 5, 6, 8, 9</xref>
          ].
        </p>
        <p>The value obtained after the calculation P(Yt = 1 It, It−1) allows a decision to be made about the
presence of an attack at a point in time t . If this probability exceeds a given adaptive or dynamically
calculated threshold, then the system classifies the state of the system as an "attack".</p>
        <p>The normalization factor in the model is defined as:</p>
        <p>P(It It−1) =  P(It It−1,Yt = yt )  P(Yt = yt Yt−1) ,(7)</p>
        <p>y{0,1}
where: Yt = 0 - the system is not under attack, Yt = 1 - the system is under attack.</p>
        <p>
          This expression provides a posteriori probability normalization and ensures that its value will be in
the range 0;1 [
          <xref ref-type="bibr" rid="ref2 ref3 ref5 ref9">2, 3, 5, 9</xref>
          ]
        </p>
        <p>
          This approach allows to focus on the current anomaly indicator and the previous state of the system,
which greatly simplifies the computational load and the volume of previous observations. At the same
time, the model remains sensitive to the key features of attacks, due to the combination of an integral
indicator, preliminary observations, and probabilistic estimation of transitions between states. Thus, it
strikes a balance between efficiency and accuracy, providing speed to respond to threats in real time
and integrating the model into modern cybersecurity systems [
          <xref ref-type="bibr" rid="ref4 ref5 ref6 ref8 ref9">4, 5, 6, 8, 9</xref>
          ].
        </p>
        <p>
          In the proposed model, transient probabilities form the structural basis of the Markov property and
estimates the probability of the system being in the state of attack at the moment of time t , if its state
is known at the previous moment of time t −1 [
          <xref ref-type="bibr" rid="ref4 ref9">4, 9</xref>
          ].
        </p>
        <p>These probabilities are described using the matrix of transitions between the states of the system,
where the system can be in one of two states: - the Yt = 1 system is attacked, Yt = 0 - the system is in
a normal state.</p>
        <p>Formally, the transition matrix has the form:</p>
        <p>P(Yt = 0 Yt−1= 0)
P = 
 P(Yt = 0 Yt−1= 1)</p>
        <p>P(Yt = 1 Yt−1= 0)</p>
        <p> , (8)
P(Yt = 1 Yt−1= 1) 
occurred at the previous moment, P(Yt = 0 Yt−1= 0) is the probability that the system remains in a
normal state.</p>
        <p>
          Each element of this matrix reflects a scenario of transition between the "attack" and "normal" states.
For example, P(Yt = 0 Yt−1= 1) - the probability of the start of an attack, or P(Yt = 1 Yt−1= 0) - the
probability of ending the attack and returning to a normal state [
          <xref ref-type="bibr" rid="ref5 ref8 ref9">5, 8, 9</xref>
          ].
        </p>
        <p>
          The values of the transition matrix are taken into account in the a posteriori probability formula
P(Yt = 1 It , It−1) , where the component P(Yt Yt−1) is directly taken from the corresponding row and
allows the model to take into account attack trends. For example, if the attacks are of a long-term
nature, then the value P(1 1) will be high. Also, the values of the matrix are used to form a normalizing
factor in the Bayesian calculation [
          <xref ref-type="bibr" rid="ref2 ref3 ref5">2, 3, 5</xref>
          ].
        </p>
        <p>
          Transient probabilities can be estimated empirically by analyzing the frequency of transitions
between "attack" and "normal" states in real or simulated sequences of network events. This approach
allows the model to reflect the actual trends in the change in the state of the system, which were
observed at previous moments of time [
          <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
          ].
        </p>
        <p>In particular, the frequency of transitions from the normal state to the attack state P(Yt = 1 Yt−1= 0)
, or vice versa - the completion of the attack P(Yt = 0 Yt−1= 1) can be statistically calculated and used
to construct a matrix of transient probabilities, which plays the role of a probability filter between the
current decision and the context.</p>
        <p>
          The use of information from previous observations allows not only to adapt the model to the real
profile of attacks in a particular environment, but also to mitigate the impact of single anomalies,
namely to avoid false positives, increase resistance to short-term traffic fluctuations, and ensure logical
consistency of decisions over time [
          <xref ref-type="bibr" rid="ref10 ref12 ref8">8, 10, 12</xref>
          ].
        </p>
        <p>
          The next component of the cyberattack detection model is the probability of observations,
P(It Yt = 1, It−1) it allows to simulate the dynamics of changes in network activity over time, taking
into account the influence of the previous integral indicator and the current state of the system [
          <xref ref-type="bibr" rid="ref5 ref6 ref8">5, 6,
8</xref>
          ]. Determines how likely the observed value of the integral indicator is It at a point in time t , provided
that the value of the previous level of the anomaly is known It−1 and the system is in an attack state
Yt 0,1 [
          <xref ref-type="bibr" rid="ref5 ref6 ref8">5, 6, 8</xref>
          ].
        </p>
        <p>
          Thanks to this component, the model is able to take into account not only the current deviation, but
also the dynamics of anomalies of its increase or fade, which is important for detecting gradually
deployed or masked attacks. And also increase the resistance of the model to short-term noise bursts
[
          <xref ref-type="bibr" rid="ref10 ref6 ref8">6, 8, 10,</xref>
          ].
        </p>
        <p>
          The model can implement the probability of observations P(It Yt , It−1) as parametric or empirical
modeling, which allows adapting to different network conditions and attack scenarios [
          <xref ref-type="bibr" rid="ref12 ref5 ref6">5, 6, 12</xref>
          ].
        </p>
        <p>
          In the structure of the model, the component of conditional probability estimation is of special
importance P(It Yt = 1, It−1) , which performs the function of analyzing the correspondence of the
current situation in the network to the characteristic state of the attack [
          <xref ref-type="bibr" rid="ref5 ref6 ref8">5, 6, 8</xref>
          ].
        </p>
        <p>Unlike well-known approaches, where conditional probabilities are modeled through distribution
densities, this method implements a functional estimation approach that is flexible, easy to implement,
and adaptive to the variable behavior of the network environment.</p>
        <p>
          The integral indicator It summarizes the multi-scale deviations of traffic parameters from the
average values, takes into account the number of threshold exceedances and the strength of the
anomaly (for example, according to the Z-assessment) [
          <xref ref-type="bibr" rid="ref6 ref8">6, 8</xref>
          ]. It also briefly reflects the current state of
the network and allows to assess how typical this value is for attacks, taking into account the previous
dynamics [
          <xref ref-type="bibr" rid="ref5 ref8">5, 8</xref>
          ].
        </p>
        <p>
          Since in (3) the function of conditional plausibility of the observation of the anomaly indicator was
introduced, then we will consider its generalization for the case of dynamic modeling, taking into
account also the previous level of anomalies It−1 . To do this, use the P(It Yt) = f (It ; )
where 0 0, 5; 0, 7 is a fixed sensitivity threshold that defines the boundary between a slight
deviation and a pronounced anomaly [
          <xref ref-type="bibr" rid="ref6 ref8">6, 8</xref>
          ].
        </p>
        <p>The function f ( It ) has the following properties: the value f ( It ) = 0 is interpreted as the absence
of signs of attack by the current indicator; the value f ( It ) → 0 indicates a high degree of
correspondence of observations to the pattern of the attacked state; the interval It  ( 0;1 is a linearly
scaled "alarm zone" zone.</p>
        <p>After converting the integral index It to probability using f (It ; ) , the model performs inertial
smoothing with the estimate obtained on the previous cycle:</p>
        <p>
          Pˆ (Yt = 1) = a  (It ) + (1− a)  Pˆ(Yt−1 = 1) (10)
where  (0,1) is the coefficient of inertia, which determines the weight of new information in
comparison with historical information; Pˆ (Yt−1 = 1) - estimation of the probability of an attack,
calculated in the previous step [
          <xref ref-type="bibr" rid="ref5 ref6 ref9">5, 6, 9</xref>
          ].
        </p>
        <p>
          This mechanism allows: to stabilize the behavior of the model in response to short-term bursts, to
store an informative memory of recent anomalous states, to take into account the inertia of attacks,
which in many cases are not instantaneous [
          <xref ref-type="bibr" rid="ref10 ref14 ref15 ref16 ref8">8, 10, 14,15,16</xref>
          ].
        </p>
        <p>The effectiveness of the proposed model depends on the dynamics of the network environment. In
case of frequent changes in attack types (for example, alternating flood-, low-rate- and
applicationlevel attacks), or a high noise level, the model may temporarily lose accuracy, since it does not always
have time to adapt to new traffic patterns. This can lead to a delayed reaction or an increase in the
number of false positives and false negatives. To increase stability, it is necessary to implement
dynamic parameter updates, threshold adaptation and additional mechanisms for classifying anomalies
in real time.</p>
        <p>Similarly, a high level of noise in network traffic (e.g., short-term spikes, broadcast storms,
P(It Yt = 1, It−1) in such cases does not reflect a real threat but merely captures statistical deviation.
To improve robustness under such scenarios, it is advisable to implement dynamic parameter updates
for f ( It ) , adaptive thresholding for 0 , and additional classification or anomaly-type evaluation
mechanisms operating in real time.</p>
        <p>To assess the effectiveness of the proposed probabilistic, cyberattack detection model, a series of
simulation experiments were conducted. These experiments analysed both typical normal traffic and
attack models with inertial structure (e.g., DDoS, Low-rate DoS, APT). For each scenario, a traffic
parameter set, an integral anomaly indicator, the system state, and the posterior probability of attack
presence at a given time step were computed.</p>
        <p>A demonstration version of the proposed model under conditions of mixed network load was
implemented using a simulated scenario comprising 100 time steps of network traffic (Table 1). The
test set included both phases of normal operation and three attack intervals (time steps 20 25, 45 55,
and 75 78), along with two noise events (spikes at time steps 10 and 65), aimed at evaluating the
ves.</p>
        <p>The integral anomaly indicator It varied within the range 0.1; 0.9 , values within the range:
0.1; 0.9 were not registered as anomalies - even if they represented short-term spikes or background
noise.</p>
        <p>Values in the range 0, 6; 0, 75 were not sufficient for triggering detection on their own, but when
accumulated could lead to attack identification.</p>
        <p>Values exceeding 0, 75 even isolated occurrences - often triggered threat detection.
A return of values below 0.6 was interpreted as the dissipation of the threat. However, if an attack</p>
        <p>Step</p>
        <p>I t
f (It )
Yt
State
Step</p>
        <p>I t
f (It )
Yt
State
Step</p>
        <p>I t
f (It )
Yt
State
Step</p>
        <p>I t
f (It )
Yt
State
Step</p>
        <p>I t
f (It )
Yt</p>
        <p>State
had previously been observed, the posterior probability Yt could remain elevated due to the inertia
mechanism, which retains memory of recent anomalous activity.</p>
        <p>Values of It were transformed into the probability function f (It ) , which linearly scales deviations
when It  0, 6 , when (9)
Subsequently, the values are smoothed to Yt using the formula:
a posteriori probability of attack Yt under simulated mixed network load conditions
According to the modelling results, all three attack phases were successfully detected
the
indicator Yt exceeded the threshold during phases 20 25, 45 55, 75 78.</p>
        <p>Short-term noise spikes (e.g. It = 0, 68 at 10th step) did not trigger false positives
inertia-based
smoothing kept Yt below the detection threshold. A single false positive was recorded at 65th step,
resulting from the combined impact of a short-term noise fluctuation and a low inertia coefficient.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Conclusions</title>
      <p>A probabilistic model with a Markov property has been developed and substantiated. It consists of
multiscale traffic analysis, an integrated anomaly indicator, and Markovian logic for state transitions.
The a posteriori probability, as the main diagnostic indicator, allows the model to respond not only to
current deviations but also to account for the temporal development of events.</p>
      <p>One of the key advantages of this model is its ability to operate in real-time environments with
limited data volume, due to the use of local memory and inertia-based estimation.</p>
      <p>The proposed model demonstrates high accuracy in threat detection, flexibility to changes in
network conditions, and robustness against false positives. Results of the demonstration simulation
confirm its capability to identify both explicit attacks and gradual or stealthy attack phases.</p>
      <p>A promising direction for model enhancement involves the integration of mechanisms for dynamic
parameter updating in real time, including the adaptation of threshold values, inertia coefficients, and
state transition probabilities based on changing input traffic statistics.</p>
      <p>In future research, the model can be adapted to real-time incident response systems, integrated into
cybersecurity architectures for critical infrastructure, and expanded toward multiclass classification of
attack types</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Shannon</surname>
            <given-names>C. E.</given-names>
          </string-name>
          <article-title>A mathematical theory of communication // Bell System Technical Journal</article-title>
          .
          <year>1948</year>
          . Vol.
          <volume>27</volume>
          (
          <issue>3</issue>
          ). P.
          <volume>379</volume>
          <fpage>423</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Jensen</surname>
            <given-names>F. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nielsen</surname>
            <given-names>T. D.</given-names>
          </string-name>
          <article-title>Bayesian networks and decision graphs</article-title>
          . New York: Springer,
          <year>2007</year>
          . 447 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Pearl</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Probabilistic reasoning in intelligent systems: networks of plausible inference</article-title>
          . San Francisco : Morgan Kaufmann,
          <year>1988</year>
          . 552 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Rabiner</surname>
            <given-names>L. R.</given-names>
          </string-name>
          <article-title>A tutorial on hidden Markov models and selected applications in speech recognition //</article-title>
          <source>Proceedings of the IEEE</source>
          .
          <year>1989</year>
          . Vol.
          <volume>77</volume>
          (
          <issue>2</issue>
          ). P.
          <volume>257</volume>
          286. https://doi.org/10.1109/5.18626.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Ghahramani Z.</surname>
          </string-name>
          <article-title>An introduction to hidden Markov models</article-title>
          and
          <source>Bayesian networks // Int. J. of Pattern Recognition and Artificial Intelligence</source>
          .
          <year>2001</year>
          . Vol.
          <volume>15</volume>
          (
          <issue>1</issue>
          ). P.
          <volume>9</volume>
          <fpage>42</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bishop C. M.</surname>
          </string-name>
          <article-title>Pattern recognition and machine learning</article-title>
          . New York: Springer,
          <year>2006</year>
          . 738 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Xiong</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Theory of Markov Chain Monte Carlo</article-title>
          and its several applications // Science and Technology of Engineering, Chemistry and
          <string-name>
            <given-names>Environmental</given-names>
            <surname>Protection</surname>
          </string-name>
          .
          <year>2024</year>
          . Vol.
          <volume>1</volume>
          . DOI:
          <volume>10</volume>
          .61173/5snnx446.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Enli</surname>
            <given-names>M. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Genovese</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agostinello</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piuri</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Robust DDoS attack detection with adaptive transfer learning</article-title>
          // Computers &amp; Security.
          <year>2024</year>
          . Vol.
          <volume>144</volume>
          . 103962. https://doi.org/10.1016/j.cose.
          <year>2024</year>
          .
          <volume>103962</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Lux</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>Bayesian estimation of agent-based models using adaptive Markov Chain Monte Carlo /</article-title>
          / Computational Economics.
          <year>2022</year>
          . Vol.
          <volume>59</volume>
          . P.
          <volume>453</volume>
          476. https://doi.org/10.1007/s10614-021- 10155-0.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Chandola</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banerjee</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Anomaly detection: a survey // ACM Computing Surveys</article-title>
          .
          <year>2009</year>
          . Vol.
          <volume>41</volume>
          (
          <issue>3</issue>
          ). Article 15. https://doi.org/10.1145/1541880.1541882.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kozhukhovskyi</surname>
            <given-names>A. D.</given-names>
          </string-name>
          <article-title>Bayesian network-based methodology for predicting insider</article-title>
          threats // Information Security.
          <year>2023</year>
          . DOI:
          <volume>10</volume>
          .31673/
          <fpage>2409</fpage>
          -
          <lpage>7292</lpage>
          .
          <year>2023</year>
          .
          <volume>030404</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Khraisat</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gondal</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vamplew</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamruzzaman</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Survey of intrusion detection systems: techniques, datasets</article-title>
          and challenges // Cybersecurity.
          <year>2019</year>
          . Vol.
          <volume>2</volume>
          . https://doi.org/10.1186/s42400-019-0038-7.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Lakhno</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mishchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlovskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pupchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Development of the intelligent decision-making support system to manage cyber protection at the object of informatization</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>9</volume>
          (
          <issue>86</issue>
          ),
          <fpage>53</fpage>
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Tolubko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozelkov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zybin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlovskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Criteria for evaluating the effectiveness of the decision support system</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>754</volume>
          ,
          <fpage>320</fpage>
          330.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Yudin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frolov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Organization of decision support systems for crisis management</article-title>
          .
          <source>In: Proc. of the 2nd International Scientific-Practical Conference "Problems of Infocommunications Science and Technology" (PIC S&amp;T)</source>
          ,
          <year>October 2015</year>
          ,
          <volume>115</volume>
          117.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Barannik</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yudin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ziubina</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vyshnevska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Video Data Compression Methods in the Decision Support Systems</article-title>
          .
          <source>In: Communications in Computer and Information Science</source>
          , vol.
          <volume>1007</volume>
          , Springer,
          <fpage>531</fpage>
          <lpage>548</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -91008-6_
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>