Neutrosophic and Information Fusion

Submit Your Paper

2836-7863ISSN (Online)

Volume 5 , Issue 2 , PP: 13–21, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution

Rozina Ali 1 *

  • 1 Cairo University, Egypt - (rozyyy123n@gmail.com)
  • Doi: https://doi.org/10.54216/NIF.050202

    Received: March 07, 2025 Accepted: July 10, 2025
    Abstract

    Real-time Internet of Things intrusion attribution is often formulated as direct multi-class classification, although packet traces contain incomplete, conflicting, and imbalanced evidence. This paper develops a mathematical neutrosophic signature calculus in which each flow is represented by truth, indeterminacy, and falsity memberships over class-specific attack signatures. The proposed model constructs entropy-contrast behavioral channels, maps each flow to class prototypes through a contradiction-aware single-valued neutrosophic transformation, and derives a closed-form attribution rule by coupling prototype truth, opposite-region falsity pressure, and explicit indeterminacy penalization. The study uses RT-IoT2022, a public UCI benchmark donated in 2024 with 123,117 flows, 83 features, and 12 normal/attack labels. The results show that the proposed calculus provides interpretable class attribution and stable macro-level behavior under severe class imbalance. The work supports neutrosophic signature modeling as a transparent route for IoT security decision support under inconsistent network evidence.

    Keywords :

    Single-valued neutrosophic set , Intrusion attribution , IoT security , Contradiction score , Uncertainty-aware classification , Information fusion

    References

     

    [1] Almohaimeed, M. (2024). Enhancing IoT network security using feature selection for intrusion detection systems. Applied Sciences, 14(24), 11966. https://doi.org/10.3390/app142411966

     

    [2] Alsharari, F., Alohali, H., Saber, Y., & Smarandache, F. (2024). An introduction to single-valued neutrosophic primal theory. Symmetry, 16(4), 402. https://doi.org/10.3390/sym16040402

     

    [3] Farid, H. M. A. (2023). Single-valued neutrosophic dynamic aggregation information with time sequence preference for IoT technology in supply chain management. Engineering Applications of Artificial Intelli-gence, 126, 106940. https://doi.org/10.1016/j.engappai.2023.106940

     

    [4] Kamaci, H. (2021). Linguistic single-valued neutrosophic soft sets with applications in game theory. Interna-tional Journal of Intelligent Systems, 36, 3917–3960. https://doi.org/10.1002/int.22445

     

    [5] Kamran, M., Ashraf, S., Salamat, N., Naeem, M., & Botmart, T. (2023). Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information. AIMS Mathematics, 8(3), 5551–5573. https://doi.org/10.3934/math.2023280

     

    [6] Nguyen, P. H. (2024). Assessing cybersecurity risks and prioritizing top strategies in Vietnam’s finance and banking system using strategic decision-making models-based neutrosophic sets and Z number. Heliyon. https://doi.org/10.1016/j.heliyon.2024.e39842

     

    [7] Sharmila, B. S., & Nagapadma, R. (2023). Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecurity, 6(1), 41. https://doi.org/10.1186/s42400-023-00178-5

     

    [8] Sharmila, B. S., & Nagapadma, R. (2024). RT-IoT2022 [Data set]. UCI Machine Learning Repository. https://doi.org/10.24432/C5P338

     

    [9] Tan, R. P., & Zhang, W. D. (2021). Decision-making method based on new entropy and refined singlevalued neutrosophic sets and its application in typhoon disaster assessment. Applied Intelligence, 51, 283– 307. https://doi.org/10.1007/s10489-020-01706-3

     

    Cite This Article As :
    Ali, Rozina. From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion, vol. , no. , 2025, pp. 13–21. DOI: https://doi.org/10.54216/NIF.050202
    Ali, R. (2025). From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion, (), 13–21. DOI: https://doi.org/10.54216/NIF.050202
    Ali, Rozina. From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion , no. (2025): 13–21. DOI: https://doi.org/10.54216/NIF.050202
    Ali, R. (2025) . From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion , () , 13–21 . DOI: https://doi.org/10.54216/NIF.050202
    Ali R. [2025]. From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion. (): 13–21. DOI: https://doi.org/10.54216/NIF.050202
    Ali, R. "From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution," Neutrosophic and Information Fusion, vol. , no. , pp. 13–21, 2025. DOI: https://doi.org/10.54216/NIF.050202