SECURITY OF COMPUTER NETWORKS IN CONDITIONS OF UNCERTAINTY
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1078Keywords:
Keywords: network security, mathematical models, fuzzy models, uncertainty and risk formalization, risk modeling, threat level, research methodology, multilayer protection models, attack scenarios.Abstract
In the modern era of digitalization, the issue of information protection in various types of computer networks is becoming increasingly relevant. The constant emergence of new threats, the dynamic nature of information flows, and the unpredictable behavior of attackers create an environment with a high level of uncertainty. This complicates the application of traditional methods of risk assessment and security system design. This article examines theoretical and practical approaches to ensuring network security under uncertainty. Methods of risk modeling using probabilistic and fuzzy models are analyzed, and the role of adaptive algorithms and machine learning in threat detection is outlined. A conceptual framework is proposed for building comprehensive protection systems capable of self-learning and adapting to a changing environment. Special emphasis is placed on the use of mathematical models capable of accounting for incomplete data and fuzziness in defining security parameters. The combination of probabilistic analysis, fuzzy logic methods, and machine learning algorithms enables the development of adaptive systems that can respond promptly to emerging threats. Risk modeling under uncertainty allows for a quantitative assessment of the effectiveness of network protection measures. The fuzzy approach and fuzzy variables make it possible to consider incomplete or imprecise information about potential threats. Adaptive models prove to be more effective compared to static ones, reducing the maximum risk of attacks. The use of scenario modeling (DoS, MITM) helps identify critical network points and plan optimal protection measures. The work contributes to the formation of theoretical and practical foundations for ensuring network security under uncertainty and substantiates methods that enhance the resilience of information systems to unpredictable attacks and reduce the risks of data loss.
Downloads
References
Akhramovych, V., & Akhramovych, V. (2025). Method for calculating the information protection indicator of a computer under uncertainty. Information Technology and Security, 13(1), 55–68. https://doi.org/10.20535/2411-1031.2025.13.1.328898
Akhramovych, V., Laptiev, O., Ilienko, A., & Akhramovych, V. (2024). Method for calculating information protection in social networks using fuzzy sets. Bezpeka Informatsii, 30(3), 358–364.
Akhramovych, V., Akhramovych, V., Brailovskyi, M., Pepa, Y., & Laptieva, T. (2025). Quantitative risk assessment using fuzzy set methods. Information Systems and Technologies Security, 1(9), 18–25.
Akhramovych, V., & Akhramovych, V. (2025). Method for calculating the probability of attacks in MANET networks under uncertainty. Information Technology and Security, 13(2), 334–345. https://doi.org/10.20535/2411-1031.2025.13.1.328898
Ilienko, A., & Akhramovych, V. (2025). Method for calculating corporate network protection under uncertainty. Cybersecurity: Education, Science, Technique, 1(29), 480–492.
Korchenko, A., Breslavskyi, V., Yevseiev, S., Zhumangalieva, N., Zvarych, A., Kazmirchuk, S., Kurchenko, O., Laptiev, O., Sievierinov, O., & Tkachuk, S. (2021). Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency. Eastern-European Journal of Enterprise Technologies, 111(3/9), 63–83. https://doi.org/10.15587/1729-4061.2021.225346
Yevseiev, S. P., Shmatko, O. V., & Romashchenko, N. V. (2019). Algorithm for assessing information security risk based on a fuzzy set approach. Modern Information Systems, 3(2), 73–79. https://doi.org/10.18372/2225-5036.29.18068
Kochetkov, O. V., Haur, T. O., & Mashin, V. M. (2019). Information security risk assessment system based on fuzzy logic. Scientific Works of O.S. Popov Odesa National Academy of Telecommunications, 1, 97–104. https://doi.org/10.33243/2518-7139-2019-1-1-97-104
Korchenko, A. O. (2019). Methods for identifying anomalous states in intrusion detection systems. Komprint. https://nubip.edu.ua/sites/default/files/u34/monografiya_korchenko_anna_1.pdf
Imamverdiyev, Y. N., & Derakshande, S. A. (2021). Fuzzy OWA model for information security risk management. Automatic Control and Computer Sciences, 45(1), 20–28.
Shapiro, A. F. (n.d.). Risk assessment applications of fuzzy logic. Casualty Actuarial Society; Canadian Institute of Actuaries; Society of Actuaries.
Bagheri, M., Ebrahimnejad, A., Razavyan, S., Hosseinzadeh, F., & Malekmohammadi, N. (2021). Solving fuzzy multi-objective shortest path problem based on data envelopment analysis approach. Complex & Intelligent Systems, 7, 725–740. https://doi.org/10.1007/s40747-020-00234-4
Sastry, V. N., Janakiraman, T. N., & Mohideen, S. I. (2003). New algorithms for multi-objective shortest path problem. Opsearch, 40(4), 278–298.
Pricop, E., & Mihalache, S. F. (2019). Fuzzy approach to modelling cyber attack patterns in industrial control systems. In Proceedings of the International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2019) (pp. 1–6).
Milić, S. D. (2019). Fuzzy-decision algorithms for cyber security analysis of advanced SCADA and remote monitoring systems. In Advances in information security and privacy (Chapter 7). https://doi.org/10.4018/978-1-7998-2910-2.ch007
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Володимир Ахрамович, Вадим Ахрамович, Володимир Cанченко, Мирослав Арєшков

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.