FUZZY SET THEORY IN THE DEVELOPMENT OF METHODS, TECHNOLOGIES, MODELS FOR INFORMATION SECURITY OF INFORMATION AND COMMUNICATION SYSTEMS

Authors

  • Valerii Domariev
  • Volodymyr Bohush

Abstract

The increasing complexity and interconnectedness of modern information and communication systems (ICS) pose significant challenges to their security. Traditional security measures, often based on binary logic and deterministic models, are insufficient to counter the dynamic nature of modern cyber threats. This article explores the use of the mathematical apparatus of fuzzy sets to develop modern methods, technologies and models for improving ICS security. Fuzzy logic principles have been used to propose innovative security solutions that adapt to the changing threat landscape. Key applications include the development of fuzzy inference systems for real-time threat detection and response, adaptive access control mechanisms, and robust risk analysis models.

A new fuzzy safety model that has been empirically validated with simulations and real-world examples is presented. The results demonstrate significant improvements in threat detection accuracy, response time, and system adaptability compared to traditional security models.

The implementation of fuzzy logic in ICS security and the potential of this approach, which can revolutionize existing practices and set new standards for cyber defense, as well as the challenges of implementation and potential limitations of fuzzy approaches to security are considered and practical recommendations for overcoming these barriers are provided. Consequences are also considered.

It is proved that taking into account the uncertainty and increasing adaptability, fuzzy methods, technologies and models can significantly increase the reliability and efficiency of ICS security systems, and the integration of the theory of fuzzy sets into the security mechanisms of information and communication systems is a promising direction for solving multifaceted problems of modern cybersecurity. Research on this topic contributes to the theoretical development and practical application of fuzzy sets in cybersecurity, paving the way for more sustainable and intelligent security solutions.

Key words: adaptive security models, security of information and communication systems, threat detection, cybersecurity, cyber defense, risk assessment, fuzzy inference systems, fuzzy set theory.

Published

2025-05-14

How to Cite

Domariev, V., & Bohush, V. (2025). FUZZY SET THEORY IN THE DEVELOPMENT OF METHODS, TECHNOLOGIES, MODELS FOR INFORMATION SECURITY OF INFORMATION AND COMMUNICATION SYSTEMS. Information Security of the Person, Society and State, (1 (37), 137–160. Retrieved from https://journals.uran.ua/ispss/article/view/312869

Issue

Section

FORMS, METHODS AND MEANS OF DETECTING, ASSESSING AND ANTICIPATING INFORMATION SECURITY THREATS TO UKRAINE