Main Article Content

Abstract

Purpose of the study: Fuzzy logic is a mathematical concept that allows for the handling of uncertain or imprecise data. In cyber security, fuzzy logic can be used to improve the accuracy and efficiency of security systems. Cyber threat intelligence plays a crucial role in modern cybersecurity by enabling organizations to proactively identify, analyse, and respond to potential cyber threats. With the increasing complexity and sophistication of cyber threats, effective cyber threat intelligence has become a critical component of modern cybersecurity. Traditional approaches often struggle to handle the inherent uncertainties and complexities in threat intelligence data.


Methodology: Through a comprehensive literature review, examines the current state of cyber threat intelligence and the principles of fuzzy logic. The paper presents a detailed analysis of how fuzzy logic can be applied to various aspects of cyber threat intelligence, including threat modelling, detection and classification, risk assessment, and decision support systems.


Main Findings: The findings highlight the benefits of using fuzzy logic in cyber threat intelligence and pave the way for further research and development in this promising field. The future prospects and challenges of integrating fuzzy logic with other advanced technologies such as machine learning and artificial intelligence.


Applications of this study: The proposed approach has the potential to significantly improve the analysis and decision-making processes in agriculture, helping farmers to make more informed decisions about crop treatments and ultimately increasing crop yields.


Novelty/Originality of this study: The outcomes of this research contribute to advancing the field of cyber threat intelligence and provide valuable insights into the practical implementation of fuzzy logic for better threat analysis and mitigation strategies.

Keywords

CTI FL APTs FL-DSS

Article Details

How to Cite
Sharma, R. K., Singh, D. K., kumar, A., & Burnwal, A. P. (2023). Use of Fuzzy Logic in Cyber Security System: Cyber Threat Intelligence. International Journal of Students’ Research in Technology & Management, 11(3), 10–19. https://doi.org/10.18510/ijsrtm.2023.1133

References

  1. Asrafuzzaman, M., Islam, M. S. and Khan, M. K. H. (2021). A fuzzy logic-based approach to cyber threat intelligence analysis, J. Inf. Secur. Res., 7(2), 107-122.
  2. Brown, R. M., & Davis, L. K. (2019). An Integrated Fuzzy Logic-Based Decision Support System for Cyber Threat Intelligence. IEEE Transactions on Cybersecurity, 8(2), 89-104.
  3. Chen, S., & Ramakrishnan, S. (2014). Fuzzy Logic-Based Risk Assessment in Cyber Threat Intelligence. Computers & Security, 45, 58-69.
  4. Garcia, E., & Lopez, M. (2018). Fuzzy Logic and Machine Learning for Intrusion Detection. In Proceedings of the International Conference on Cybersecurity (ICCS) (pp. 234-245).
  5. Jahromi, A. H., Sharifi, M. and Hamidi, A.(2019). Fuzzy logic-based cyber threat intelligence assessment framework for critical infrastructure protection. IEEE Trans. Intell. Syst. Technol., 30(12), 4267-4279.
  6. Jahromi, A. H., Sharifi, M. and Hamidi, A.(2020). Using fuzzy logic to improve the accuracy of cyber threat detection. IEEE Trans. Fuzzy Syst., 28(11), 2732-2743.
  7. Kim, J., & Lee, S. (2013). Fuzzy Logic-Based Intrusion Detection System for Cloud Computing. Future Generation Computer Systems, 29(3), 669-678.
  8. Lee, H., & Kim, S. (2016). Fuzzy Logic-Based Anomaly Detection in Network Traffic. In Proceedings of the ACM Conference on Computer and Network Security (CCNS) (pp. 112-125). https://doi.org/10.1016/S1353-4858(16)30055-1
  9. Liu, Y., & Wang, L. (2015). A Fuzzy Logic-Based Cyber-Attack Detection System. International Journal of Information and Computer Security, 7(3), 233-248.
  10. Sharifi, M., Jahromi, A. H. and Hamidi, A.(2017). Fuzzy logic-based cyber threat intelligence sharing. IEEE Trans. Inf. Forensics Secur., 12(10), 2296-2309.
  11. Sharifi, M., Jahromi, A. H. and Hamidi, A.(2018). Fuzzy logic-based cyber threat intelligence fusion framework. IEEE Trans. Ind. Inform., 14(12), 5409-5419.
  12. Smith, J. A., & Johnson, B. C. (2021). Fuzzy Logic Applications in Cyber Threat Detection. Cybersecurity Journal, 12(3), 45-62.
  13. Wang, Q., & Chen, S. (2017). Risk Assessment in Cyber Threat Intelligence: A Fuzzy Logic Approach. Journal of Information Security, 25(4), 567-580.

Most read articles by the same author(s)