This programing code presents a fuzzy logic-based model, to determine recommendation priorities for information security based on various data inputs. The model uses principles of fuzzy logic, including implication, MIN aggregation, MAX defuzzification, and other data analysis methods.
The model is based on three important criteria:
- Attack severity (low, medium, high)
- System importance (low, medium, high)
- Access level (low, medium, high)
Additionally, the model considers the type of attack:
- DDoS
- Malware
- Phishing
- Social Engineering
The number of system inputs and fuzzy sets is 4 × 3.
The model's output is the recommendation priority, which can be low, medium, or high. The model allows determining the recommendation priority according to rules defined for attack outputs.
- Miglotoji logika paskaita Doc. dr. Agnė Paulauskaitė-Tarasevičienė
- KNYGA mašinio mokymosi algoritmai 2021_01_26.pdf,
- The Tipping Problem - The Hard Way, scikit-fuzzy development team [https://pythonhosted.org/scikit- fuzzy/auto_examples/plot_tipping_problem.html fbclid=IwAR0L_gZ1h6Kb_9SAxrXZ _PPv4 n80uLdZgbSsKCd8RfLW3lZzyrUdiMHiC0s]
- Scatterplot Matrix in Python [https://plotly.com/python/splom/]