ASPG Menu
search

American Scientific Publishing Group

verified Journal

Neutrosophic and Information Fusion

ISSN
Online: 2836-7863
Frequency

Continuous publication

Publication Model

Open access journal. All articles are freely available online with no APC.

Neutrosophic and Information Fusion
Full Length Article

Volume 5Issue 2PP: 13–21 • 2025

From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution

Rozina Ali 1*
1Cairo University, Egypt
* Corresponding Author.
Received: March 07, 2025 Accepted: July 10, 2025

Abstract

Real-time Internet of Things intrusion attribution is often formulated as direct multi-class classification, although packet traces contain incomplete, conflicting, and imbalanced evidence. This paper develops a mathematical neutrosophic signature calculus in which each flow is represented by truth, indeterminacy, and falsity memberships over class-specific attack signatures. The proposed model constructs entropy-contrast behavioral channels, maps each flow to class prototypes through a contradiction-aware single-valued neutrosophic transformation, and derives a closed-form attribution rule by coupling prototype truth, opposite-region falsity pressure, and explicit indeterminacy penalization. The study uses RT-IoT2022, a public UCI benchmark donated in 2024 with 123,117 flows, 83 features, and 12 normal/attack labels. The results show that the proposed calculus provides interpretable class attribution and stable macro-level behavior under severe class imbalance. The work supports neutrosophic signature modeling as a transparent route for IoT security decision support under inconsistent network evidence.

Keywords

Single-valued neutrosophic set Intrusion attribution IoT security Contradiction score Uncertainty-aware classification Information fusion

References

 

[1] Almohaimeed, M. (2024). Enhancing IoT network security using feature selection for intrusion detection systems. Applied Sciences, 14(24), 11966. https://doi.org/10.3390/app142411966

 

[2] Alsharari, F., Alohali, H., Saber, Y., & Smarandache, F. (2024). An introduction to single-valued neutrosophic primal theory. Symmetry, 16(4), 402. https://doi.org/10.3390/sym16040402

 

[3] Farid, H. M. A. (2023). Single-valued neutrosophic dynamic aggregation information with time sequence preference for IoT technology in supply chain management. Engineering Applications of Artificial Intelli-gence, 126, 106940. https://doi.org/10.1016/j.engappai.2023.106940

 

[4] Kamaci, H. (2021). Linguistic single-valued neutrosophic soft sets with applications in game theory. Interna-tional Journal of Intelligent Systems, 36, 3917–3960. https://doi.org/10.1002/int.22445

 

[5] Kamran, M., Ashraf, S., Salamat, N., Naeem, M., & Botmart, T. (2023). Cyber security control selection based decision support algorithm under single valued neutrosophic hesitant fuzzy Einstein aggregation information. AIMS Mathematics, 8(3), 5551–5573. https://doi.org/10.3934/math.2023280

 

[6] Nguyen, P. H. (2024). Assessing cybersecurity risks and prioritizing top strategies in Vietnam’s finance and banking system using strategic decision-making models-based neutrosophic sets and Z number. Heliyon. https://doi.org/10.1016/j.heliyon.2024.e39842

 

[7] Sharmila, B. S., & Nagapadma, R. (2023). Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecurity, 6(1), 41. https://doi.org/10.1186/s42400-023-00178-5

 

[8] Sharmila, B. S., & Nagapadma, R. (2024). RT-IoT2022 [Data set]. UCI Machine Learning Repository. https://doi.org/10.24432/C5P338

 

[9] Tan, R. P., & Zhang, W. D. (2021). Decision-making method based on new entropy and refined singlevalued neutrosophic sets and its application in typhoon disaster assessment. Applied Intelligence, 51, 283– 307. https://doi.org/10.1007/s10489-020-01706-3

 

Cite This Article

Choose your preferred format

format_quote
Ali, Rozina. "From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution." Neutrosophic and Information Fusion, vol. Volume 5, no. Issue 2, 2025, pp. 13–21. DOI: https://doi.org/10.54216/NIF.050202
Ali, R. (2025). From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion, Volume 5(Issue 2), 13–21. DOI: https://doi.org/10.54216/NIF.050202
Ali, Rozina. "From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution." Neutrosophic and Information Fusion Volume 5, no. Issue 2 (2025): 13–21. DOI: https://doi.org/10.54216/NIF.050202
Ali, R. (2025) 'From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution', Neutrosophic and Information Fusion, Volume 5(Issue 2), pp. 13–21. DOI: https://doi.org/10.54216/NIF.050202
Ali R. From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution. Neutrosophic and Information Fusion. 2025;Volume 5(Issue 2):13–21. DOI: https://doi.org/10.54216/NIF.050202
R. Ali, "From Packet Traces to Contradiction Scores: A Neutrosophic Signature Calculus for Real-Time IoT Intrusion Attribution," Neutrosophic and Information Fusion, vol. Volume 5, no. Issue 2, pp. 13–21, 2025. DOI: https://doi.org/10.54216/NIF.050202
Digital Archive Ready