Method for calculating the possibility of attacks in a MANET under uncertainty conditions
DOI:
https://doi.org/10.20535/2411-1031.2025.13.2.344718Keywords:
MANET, information security, fuzzy sets, attack probability, modeling, membership functions, tuple, risk, adaptive protectionAbstract
One of the most significant challenges for modern information technologies is the ability of systems to make rational and adaptive decisions under uncertainty. Humans intuitively cope with incomplete, contradictory, or vague information – a capability that has inspired the development of intelligent models. Today, science is tasked with creating algorithms and models capable of mimicking such cognitive flexibility and implementing it in cyberspace, particularly in decision support systems and information security frameworks. In the context of mobile ad hoc networks (MANETs), which operate under conditions of high dynamism, unstable communication links, and limited resources, the timely detection of potential attacks and assessment of the system’s security level is a critical concern. One of the distinctive features of MANETs is the lack of fixed infrastructure, which significantly complicates the application of traditional security methods. Under such conditions, effective information protection requires new methodologies capable of functioning amid uncertainty. This paper proposes a method for assessing the probability of attacks in MANETs based on fuzzy logic. The method includes the construction of a tuple of fuzzy sets describing key network parameters (node vulnerabilities, trust levels, behavioral anomalies, etc.), risk modeling based on expert evaluations, determination of membership functions, and aggregation of results to derive an integral security indicator. Triangular and trapezoidal membership functions are used to represent fuzzy parameters. The calculation results are presented in the form of graphical dependencies, allowing a visual interpretation of risk levels and confidence in the assessment. The proposed approach enables the assessment of a mobile network’s vulnerability even in the presence of incomplete or fuzzy information about its state and threats. The methodology can be applied to build adaptive intrusion detection systems and support decision-making in data-limited environments.
References
V. Akhramovich, and V. Akhramovich, “Method for calculating the computer information protection index under conditions of uncertainty”, Information Technology and Security, vol. 13, iss. 1 (24), pp. 55-68, 2025. doi: https://doi.org/10.20535/2411-1031.2025.13.1.328898.
А. Korchenko et al., “Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency”, Eastern European Journal of Enterprise Technologies, vol. 111, iss. 3 (9), pp. 63-83, 2021, doi: https://doi.org/10.15587/1729-4061.2021.225346.
S.P. Yevseiev, O.V. Shmatko, and N.V. Romashchenko, “Algorithm for assessing the degree of information security risk based on the fuzzy set approach”, Modern Information Systems, vol. 3, no. 2, pp. 73-79, 2019.
O.V. Kochetkov, T.O. Gaur, V.M. Mashin, “Enterprise information security risk assessment system based on fuzzy logic”, Scientific works of ОNAT named after O.S. Popov, no. 1, pp. 97-104, 2019, doi: https://doi.org/10.33243/2518-7139-2019-1-1-97-104.
A.O. Korchenko, Methods for identifying anomalous states for intrusion detection systems, Monograph. Kyiv, Ukraine: CP “Komprint”, 2019.
Y.N. Imamverdiyev, and S.A. Derakshande, “Fuzzy Owa Model for Information Security Risk Management”, Automatic Control and Computer Sciences, vol. 45, no. 1, pp. 20-28. 2021. [Online]. Available: https://www.researchgate.net/publication/265520240_Fuzzy_Owa_Model_for_Information_Security_Risk_Management_YN_Imamverdiyev_SA_Derakshande_Automatic_Control_and_Computer_Sciences_45_1_20-28. Accessed on: Jan. 04, 2025.
A.F. Shapiro, Risk Assessment Applications of Fuzzy Logic. Manitoba, Canada: Society of Actuaries, 2015. [Online]. Available: https://www.soa.org/Files/Research/Projects/2015-risk-assess-apps-fuzzy-logic.pdf. Accessed on: Sep. 19, 2025.
M. Bagheri, A. Ebrahimnejad, S. Razavyan, F. Hosseinzadeh, and N. Malekmohammadi, “Solving fuzzy multi-objective shortest path problem based on data envelopment analysis approach”, Complex & Intelligent Systems, vol. 7, рр. 725-740, 2021, doi: https://doi.org/10.1007/s40747-020-00234-4.
V.N Sastry, T.N Janakiraman, and S.I. Mohideen, “New algorithms for multi objective shortest path problem”, Opsearch, vol. 40 (4), pp. 278-298, 2003. [Online]. Available: https://link.springer.com/article/10.1007/bf03398701. Accessed on: Sep. 04, 2025.
M. Mynuddin, M.I. Hossain, S.U. Khan, M.A. Islam, D.M.A. Ahad, and M.S. Tanvir, “Cyber Security System Using Fuzzy Logic”, Int. Conf. on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME 2023), Tenerife, Spain, 2023, pp. 1-6 doi: https://doi.org/10.1109/ICECCME57830.2023.10252778.
E. Pricop, and S.F. Mihalache, “Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems”, in Proc. 7th Int. Conf. Elect., Comp. and AI (ECAI 2019), Bucharest, România, 2015, рр. 1-6. [Online]. Available: https://arxiv.org/pdf/1912.00234. Accessed on: Jan. 09, 2025.
S.D. Milić, “Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems. Chapter 7”, in Cyber Security of Industrial Control Systems in the Future Internet Environment, M.D. Stojanović and S.V. Boštjančič Rakas, Eds. IGI Global Scientific Publishing Platform. doi: https://doi.org/10.4018/978-1-7998-2910-2.ch007.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Collection "Information Technology and Security"

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).