Open Access

Research on Unusual Transmission Pattern Recognition in Telecommunication Infrastructure Using Fuzzy Equation Approach

4 Department of Information and Telecommunication Systems Faculty of Electrical Engineering University of Sofia, Bulgaria

Abstract

The rapid expansion of telecommunication infrastructure, including wireless networks, sensor-based systems, and software-defined communication platforms, has significantly increased the complexity of monitoring network behavior. With the growing volume of transmitted data, identifying unusual transmission patterns has become a critical requirement for maintaining network reliability, performance stability, and security. Traditional anomaly detection techniques based on statistical thresholds or rule-based systems often fail to accurately detect dynamic and uncertain transmission behaviors in modern heterogeneous networks. To address these limitations, this research proposes a fuzzy equation-based approach for recognizing abnormal transmission patterns in telecommunication infrastructure.

Fuzzy logic provides the ability to represent uncertainty, vagueness, and nonlinear relationships between traffic parameters, making it suitable for modeling complex network environments where precise boundaries between normal and abnormal behavior cannot be defined. In this study, fuzzy relational equations are used to construct a pattern recognition framework capable of identifying irregular transmission activities by analyzing traffic attributes such as packet rate, delay variation, bandwidth utilization, and node interaction behavior. The proposed framework integrates fuzzy inference rules, relational mapping, and anomaly evaluation functions to produce a flexible and adaptive detection mechanism.

The research analyzes existing anomaly detection methods including machine learning, clustering, neural networks, and rule-based intrusion detection, and identifies their limitations in handling uncertain network conditions. Based on these observations, a fuzzy equation-driven model is designed to improve detection accuracy while maintaining computational efficiency. Experimental evaluation is performed using simulated telecommunication traffic scenarios to demonstrate the effectiveness of the proposed approach. Results show that the fuzzy equation method achieves improved recognition capability, reduced false alarms, and better adaptability compared to conventional techniques.

The findings indicate that fuzzy relational modeling can serve as a reliable foundation for next-generation network monitoring systems, especially in environments where traffic patterns are highly variable. This research contributes to the development of intelligent anomaly recognition mechanisms for secure and stable telecommunication infrastructure.

Keywords

References

📄 Ali, W. A., Manasa, K. N., Bendechache, M., Fadhel Aljunaid, M., and Sandhya, P. ( 2020 ). A review of current machine learning approaches for anomaly detection in network traffic. Journal of Telecommunications and the Digital Economy, 8 ( 4 ), 64–95.
📄 Al-Obeidat, F., and El-Alfy, E. S. ( 2019 ). Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols. Personal and Ubiquitous Computing, 23 ( 5 ), 777–791.
📄 Almotiri, S. H. ( 2021 ). Integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. IEEE Access, 9, 10751–10764.
📄 Alzubi, O. A. ( 2022 ). A deep learning-based frechet and dirichlet model for intrusion detection in IWSN. Journal of Intelligent & Fuzzy Systems, 42 ( 2 ), 873–883.
📄 Arkan, A. S., and Ahmadi, M. ( 2021 ). Entropy-based anomaly detection using observation points relations in wireless sensor networks. Wireless Personal Communications, 119 ( 2 ), 1783–1798.
📄 Chen, L., Gao, S., Liu, B., Lu, Z., and Jiang, Z. ( 2020 ). FEW-NNN: A fuzzy entropy weighted natural nearest neighbor method for flow-based network traffic attack detection. China Communications, 17 ( 5 ), 151–167.
📄 Cisar, P., and Maravic-Cisar, S. ( 2019 ). EWMA statistics and fuzzy logic in function of network anomaly detection. Facta universitatis-series: Electronics and Energetics, 32 ( 2 ), 249–265.
📄 Fang, L., Li, Y., Liu, Z., Yin, C., Li, M., and Cao, Z. J. ( 2020 ). A practical model based on anomaly detection for protecting medical IoT control services against external attacks. IEEE Transactions on Industrial Informatics, 17 ( 6 ), 4260–4269.
📄 Fu, L., Zhang, W., Tan, X., and Zhu, H. ( 2021 ). An algorithm for detection of traffic attribute exceptions based on cluster algorithm in industrial internet of things. IEEE Access, 9, 53370–53378.
📄 Garg, S., and Batra, S. ( 2018 ). Fuzzified cuckoo based clustering technique for network anomaly detection. Computers & Electrical Engineering, 71, 798–817.
📄 Gu, K., Dong, X., and Jia, W. ( 2020 ). Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets. IEEE Transactions on Cloud Computing, 10 ( 2 ), 1215–1232.
📄 Han, M. L., Kwak, B. I., and Kim, H. K. ( 2021 ). Event-triggered interval-based anomaly detection and attack identification methods for an in-vehicle network. IEEE Transactions on Information Forensics and Security, 16, 2941–2956.
📄 Hussain, B., Du, Q., and Ren, P. ( 2018 ). Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks. China Communications, 15 ( 4 ), 41–57.
📄 Li, Q., Meng, S., Wang, S., Zhang, J., and Hou, J. ( 2019 ). CAD: command-level anomaly detection for vehicle-road collaborative charging network. IEEE Access, 7, 34910–34924.
📄 Novaes, M. P., Carvalho, L. F., Lloret, J., and Proença, M. L. ( 2020 ). Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment. IEEE Access, 8, 83765–83781.
📄 Peng, H., Liu, L., Liu, J., and Lewis, J. R. ( 2019 ). Network traffic anomaly detection algorithm using mahout classifier. Journal of Intelligent & Fuzzy Systems, 37 ( 1 ), 137–144.
📄 Peng, Y., Tan, A., Wu, J., and Bi, Y. ( 2019 ). Hierarchical edge computing: A novel multi-source multi-dimensional data anomaly detection scheme for industrial Internet of Things. IEEE Access, 7, 111257–111270.
📄 Revanesh, M., Gundal, S. S., Arunkumar, J. R., Josephson, P. J., Suhasini, S., and Devi, T. K. ( 2023 ). Artificial neural networks-based improved Levenberg-Marquardt neural network for energy efficiency and anomaly detection in WSN. Wireless Networks, 1–16.
📄 Safara, F., Souri, A., and Serrizadeh, M. ( 2020 ). Improved intrusion detection method for communication networks using association rule mining and artificial neural networks. IET Communications, 14 ( 7 ), 1192–1197.
📄 Salem, O., Alsubhi, K., Mehaoua, A., and Boutaba, R. ( 2020 ). Markov models for anomaly detection in wireless body area networks for secure health monitoring. IEEE Journal on Selected Areas in Communications, 39 ( 2 ), 526–540.
📄 Selvakumar, K., Karuppiah, M., Sai Ramesh, L., Islam, S. H., Hassan, M. M., Fortino, G., and Choo, K. K. R. ( 2019 ). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Information Sciences, 497, 77–90.
📄 Shang, F., Zhou, D., Li, C., Ye, H., and Zhao, Y. ( 2019 ). Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network. Photonic Network Communications, 37, 212–223.
📄 Toliupa, S., Parkhomenko, I., Ziubina, R., Veselska, O., Rajba, S., and Warwas, K. ( 2022 ). Detection of abnormal traffic and network intrusions based on multiple fuzzy rules. Procedia Computer Science, 207, 44–53.
📄 Tripathi, K. N., Yadav, A. M., and Sharma, S. C. ( 2022 ). Fuzzy and deep belief network based malicious vehicle identification and trust recommendation framework in VANETs. Wireless Personal Communications, 124 ( 3 ), 2475–2504.
📄 Wagan, S. A., Koo, J., Siddiqui, I. F., Qureshi, N. M. F., Attique, M., and Shin, D. R. ( 2023 ). A fuzzy-based duo-secure multi-modal framework for IoMT anomaly detection. Journal of King Saud University-Computer and Information Sciences, 35 ( 1 ), 131–144.
📄 Xu, H., Han, S., Li, X., and Han, Z. ( 2023 ). Anomaly traffic detection based on communication-efficient federated learning in space-air-ground integration network. IEEE Transactions on Wireless Communications, 22 ( 12 ), 9346–9360.
📄 Yang, L., Lu, Y., Yang, S. X., Zhong, Y., Guo, T., and Liang, Z. ( 2021 ). An evolutionary game-based secure clustering protocol with fuzzy trust evaluation and outlier detection for wireless sensor networks. IEEE Sensors Journal, 21 ( 12 ), 13935–13947.
📄 Yaqoob, S., Hussain, A., Subhan, F., Pappalardo, G., and Awais, M. ( 2023 ). Deep learning based anomaly detection for fog-assisted iovs network. IEEE Access, 11, 19024–19038.
📄 Yasir Abdullah, R., Mary Posonia, A., and Barakkath Nisha, U. ( 2022 ). An Enhanced Anomaly Forecasting in Distributed Wireless Sensor Network Using Fuzzy Model. International Journal of Fuzzy Systems, 24 ( 7 ), 3327–3347.
📄 Zhang, S. T., Lin, X. B., Wu, L., Song, Y. Q., Liao, N. D., and Liang, Z. H. (2020). Network traffic anomaly detection based on ML-ESN for power metering system. Mathematical Problems in Engineering, 2020, 1–21.

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.