Design and Evaluation of a Fuzzy Logic Based Intrusion Detection System for Network Security
Abstract
With the proliferation of networked systems, intrusion detection systems (IDS) have become vital in identifying and mitigating cyber threats and unauthorized access. Traditional IDS approaches, such as signature-based and anomaly-based methods, often struggle to detect novel attacks and tend to generate high false alarm rates. This study presents a robust, fuzzy logic-based IDS designed to detect network intrusions and assess their risk levels while minimizing false positives. The IDS classifies network intrusions by analyzing parameters such as source bytes, destination bytes, and packet rates, categorizing them into risk levels through defined fuzzy rules. Implemented in Python using libraries like scikit-fuzzy and pandas, the system utilizes the KDD Cup 99 dataset, a widely recognized IDS benchmark. Fuzzy membership functions and inference rules were defined for the primary input variables, enabling the system to infer intrusion likelihood. The IDS was tested using both two-variable and multi-variable input setups. It achieved a precision of 0.89, a recall of 0.85, and an F1-score of 0.87 in the multi-variable scenario. Results indicate that the fuzzy logic-based IDS achieves a balanced trade-off between detection accuracy and interpretability. It offers a transparent decision-making framework suitable for real-time applications due to its adaptability and potential for integration with live data streams. This research proposes future improvements by creating a foundation for hybrid intrusion detection systems (IDS) that integrate fuzzy logic and machine learning to enhance accuracy and interpretability. It recommends future research on adaptive fuzzy rules, real-time data processing, and explainable AI (XAI) to improve system flexibility, responsiveness, and transparency in cybersecurity applications.
Downloads
References
D. Javaheri, S. Gorgin, J. Lee, and M. Masdari, “Fuzzy Logic-Based DDoS Attacks and Network Traffic Anomaly Detection Methods: Classification, Overview, and Future Perspectives”, Information Sciences, vol. 626, no. 1, 2023.
F. Jemili, “Intelligent intrusion detection based on fuzzy Big Data classification”, Cluster Computing, vol. 26, no. 7, pp. 1-18, 2022.
M. Reji, C. Joseph, K. Thaiyalnayaki, and R. Lathamanju, “Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection”, Computer Systems Science and Engineering, vol. 45, no. 2, pp. 1265-1278, 2022.
S. Subramani and S. Munuswamy, “Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network”, Neural Computing and Applications, vol. 35, no. 20, pp. 1-20, 2023.
A. Binthiya and S. Ravindran, “Intelligent fuzzy logic-based intrusion detection system for effective detection of black hole attack in WSN”, Peer-to-Peer Networking and Applications, vol. 17, no. 4, pp. 1-17, 2024.
A. Pinto, L. Herrera, Y. Donoso, and J.A. Gutierrez, “Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure”, Sensors, vol. 23, no. 5, 2415, 2023.
N. Gupta, V. Jindal, and P. Bedi, “A Survey on Intrusion Detection and Prevention Systems”, SN Computer Science, vol. 4, no. 5, 2023.
C. Kim, C. So-In, Y. Kongsorot, and P. Aimtongkham, “FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks”, Cybersecurity, vol. 7, no. 7, 2024.
V. Hnamte and J. Hussain, “Network Intrusion Detection using Deep Convolution Neural Network”, 4th International Conference for Emerging Technology (INCET), 2023.
M. Alohali, M. Elsadig, F. Al-Wesabi, M. Al Duhayyim, A.M. Hilal, and A. Motwakel, “Swarm intelligence for IoT attack detection in the fog-enabled cyber-physical system”, Computers & Electrical Engineering, vol. 108, 108676, 2023.
J. Diaz-Verdejo, J. Munoz-Calle, A. Estapa Alonso, R. Estapa Alonso, and G. Madinabeitia, “On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks”, Applied Sciences, vol. 12, no. 2, 852, 2022.
A. Belenguer, J.A. Pascual, and J. Navaridas, “GowFed – A novel Federated Network Intrusion Detection System”, Journal of Network and Computer Applications, vol. 217, 103653, 2023.
A. Kamboj, V.K. Ravindran, and S. Ojha, “A Comparative Analysis of Signature-Based and Anomaly-Based Intrusion Detection Systems”, International Journal of Latest Technology in Engineering, Management & Applied Science, vol. 14, no. 5, pp. 209-214, 2025.
S. Kushal, B. Shanmugam, J. Sundaram, and S. Thennadil, “Self-healing hybrid intrusion detection system: an ensemble machine learning approach”, Discover Artificial Intelligence, vol. 4, no. 28, 2024.
H. Asad, S. Adhikari, and I. Gashi, “A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems”, International Journal of Information Security, vol. 23, pp. 1331-1346, 2024.
M. Shenify, F.A. Mazarbhuiya, and A.S. Wungreiphi, “Detecting IoT Anomalies Using Fuzzy Subspace Clustering Algorithms”, Applied Sciences, vol. 14, no. 3, 1264, 2024.
A.K. Ramamoorthy and K. Karuppasamy, “Unified Intrusion Detection Framework: Predictive Analysis of Intrusions in Sensor Networks”, Wireless Personal Communications, vol. 137, no. 3, 2024.
E. Muniyandy, I.G.A. Cruz, M. Farooq, Y. Jaipalreddy, R. Kumar, and V.K. Pandey, “Fuzzy Intrusion Detection Method and Zero-Knowledge Authentication for Internet of Things Networks”, International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 21s, pp. 584-591, 2024.
A. Bengag, A. Bengag, O. Moussaoui, and M. Blej, “A Fuzzy Logic-Based Intrusion Detection System for WBAN Against Jamming Attacks”, Lecture Notes in Electrical Engineering, vol. 954, 2023.
A. Bengag, A. Bengag, and O. Moussaoui, “Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 26, no. 2, 1091, 2022.
D.K. Jain, W. Ding, and K. Kotecha, “Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment”, International Journal of Machine Learning and Cybernetics, vol. 14, no. 6, pp. 1-17, 2023.
M.G. Raj and S.K. Pani, “Intrusion detection system using combination of deep residual fuzzy network and white shark-dwarf mongoose optimization”, Soft Computing, 2023
S. Sekar, P.R. Parvathy, G.K. Gupta, T. Rajagopalan, C.C.S. Basavaraddi, K. Padmanaban, and S. Murugan, “Intrusion detection and prevention using Bayesian decision with fuzzy logic system”, International Journal of Electrical and Computer Engineering, vol. 15, no. 1, 1200, 2025.
A.J. Bamidele, F. Ayo, R. Panigrahi, A. Garg, A.K. Bhoi, and P. Barsocchi, “A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks”, International Journal of Computational Intelligence Systems, vol. 16, no. 1, 31, 2023.
Z. Ling, G. Qi, and H. Min, “Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm”, Journal of High Speed Networks, vol. 30, no. 1, 2023.
T.M. Ghazal, S.Y. Siddiqui, M.U. Ullah, A. Ali, H.M. Usama, and A. Younas, “Cloud Security Issues Detection Using Fuzzy Logic”, The 8th International Conference on Next Generation Computing, 2022.
F.S. Alrayes, N. Alshuqayran, M.K. Nour, M.A. Duhayyim, A. Mohamed, A.A.A. Mohammed, G.P. Mohammed, and I. Yaseen, “Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment”, Computers, Materials & Continua, vol. 74, no. 3, pp. 6737-6753, 2023.
P. Khordadpour and S. Ahmadi, “FIDS: Fuzzy Intrusion Detection System for simultaneous detection of DoS/DDoS attacks in Cloud computing”, Artificial Intelligence, 2023.
V. Hnamte and J. Hussain, “Network Intrusion Detection using Deep Convolution Neural Network”, 4th International Conference for Emerging Technology (INCET), 2023.
M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, “Anomaly-based Intrusion Detection System Using Fuzzy Logic”, International Conference on Information Technology (ICIT), 2021.




















