SECURITY OF COMPUTER NETWORKS IN CONDITIONS OF UNCERTAINTY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1078

Keywords:

Keywords: network security, mathematical models, fuzzy models, uncertainty and risk formalization, risk modeling, threat level, research methodology, multilayer protection models, attack scenarios.

Abstract

In the modern era of digitalization, the issue of information protection in various types of computer networks is becoming increasingly relevant. The constant emergence of new threats, the dynamic nature of information flows, and the unpredictable behavior of attackers create an environment with a high level of uncertainty. This complicates the application of traditional methods of risk assessment and security system design. This article examines theoretical and practical approaches to ensuring network security under uncertainty. Methods of risk modeling using probabilistic and fuzzy models are analyzed, and the role of adaptive algorithms and machine learning in threat detection is outlined. A conceptual framework is proposed for building comprehensive protection systems capable of self-learning and adapting to a changing environment. Special emphasis is placed on the use of mathematical models capable of accounting for incomplete data and fuzziness in defining security parameters. The combination of probabilistic analysis, fuzzy logic methods, and machine learning algorithms enables the development of adaptive systems that can respond promptly to emerging threats. Risk modeling under uncertainty allows for a quantitative assessment of the effectiveness of network protection measures. The fuzzy approach and fuzzy variables make it possible to consider incomplete or imprecise information about potential threats. Adaptive models prove to be more effective compared to static ones, reducing the maximum risk of attacks. The use of scenario modeling (DoS, MITM) helps identify critical network points and plan optimal protection measures. The work contributes to the formation of theoretical and practical foundations for ensuring network security under uncertainty and substantiates methods that enhance the resilience of information systems to unpredictable attacks and reduce the risks of data loss.

Downloads

Download data is not yet available.

References

Akhramovych, V., & Akhramovych, V. (2025). Method for calculating the information protection indicator of a computer under uncertainty. Information Technology and Security, 13(1), 55–68. https://doi.org/10.20535/2411-1031.2025.13.1.328898

Akhramovych, V., Laptiev, O., Ilienko, A., & Akhramovych, V. (2024). Method for calculating information protection in social networks using fuzzy sets. Bezpeka Informatsii, 30(3), 358–364.

Akhramovych, V., Akhramovych, V., Brailovskyi, M., Pepa, Y., & Laptieva, T. (2025). Quantitative risk assessment using fuzzy set methods. Information Systems and Technologies Security, 1(9), 18–25.

Akhramovych, V., & Akhramovych, V. (2025). Method for calculating the probability of attacks in MANET networks under uncertainty. Information Technology and Security, 13(2), 334–345. https://doi.org/10.20535/2411-1031.2025.13.1.328898

Ilienko, A., & Akhramovych, V. (2025). Method for calculating corporate network protection under uncertainty. Cybersecurity: Education, Science, Technique, 1(29), 480–492.

Korchenko, A., Breslavskyi, V., Yevseiev, S., Zhumangalieva, N., Zvarych, A., Kazmirchuk, S., Kurchenko, O., Laptiev, O., Sievierinov, O., & Tkachuk, S. (2021). Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency. Eastern-European Journal of Enterprise Technologies, 111(3/9), 63–83. https://doi.org/10.15587/1729-4061.2021.225346

Yevseiev, S. P., Shmatko, O. V., & Romashchenko, N. V. (2019). Algorithm for assessing information security risk based on a fuzzy set approach. Modern Information Systems, 3(2), 73–79. https://doi.org/10.18372/2225-5036.29.18068

Kochetkov, O. V., Haur, T. O., & Mashin, V. M. (2019). Information security risk assessment system based on fuzzy logic. Scientific Works of O.S. Popov Odesa National Academy of Telecommunications, 1, 97–104. https://doi.org/10.33243/2518-7139-2019-1-1-97-104

Korchenko, A. O. (2019). Methods for identifying anomalous states in intrusion detection systems. Komprint. https://nubip.edu.ua/sites/default/files/u34/monografiya_korchenko_anna_1.pdf

Imamverdiyev, Y. N., & Derakshande, S. A. (2021). Fuzzy OWA model for information security risk management. Automatic Control and Computer Sciences, 45(1), 20–28.

Shapiro, A. F. (n.d.). Risk assessment applications of fuzzy logic. Casualty Actuarial Society; Canadian Institute of Actuaries; Society of Actuaries.

Bagheri, M., Ebrahimnejad, A., Razavyan, S., Hosseinzadeh, F., & Malekmohammadi, N. (2021). Solving fuzzy multi-objective shortest path problem based on data envelopment analysis approach. Complex & Intelligent Systems, 7, 725–740. https://doi.org/10.1007/s40747-020-00234-4

Sastry, V. N., Janakiraman, T. N., & Mohideen, S. I. (2003). New algorithms for multi-objective shortest path problem. Opsearch, 40(4), 278–298.

Pricop, E., & Mihalache, S. F. (2019). Fuzzy approach to modelling cyber attack patterns in industrial control systems. In Proceedings of the International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2019) (pp. 1–6).

Milić, S. D. (2019). Fuzzy-decision algorithms for cyber security analysis of advanced SCADA and remote monitoring systems. In Advances in information security and privacy (Chapter 7). https://doi.org/10.4018/978-1-7998-2910-2.ch007

Downloads


Abstract views: 1

Published

2026-03-26

How to Cite

Akhromovych, V., Akhromovych, V., Sanchenko, V., & Areshkov, M. (2026). SECURITY OF COMPUTER NETWORKS IN CONDITIONS OF UNCERTAINTY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 500–515. https://doi.org/10.28925/2663-4023.2026.32.1078