FUZZY ENSEMBLE OF DECISION TREES FOR THE COMPUTER SYSTEMS STATE IDENTIFICATION

Authors

  • Viktor Chelak
  • Oleksii Hornostal

DOI:

https://doi.org/10.26906/SUNZ.2025.4.144

Keywords:

state identification, computer systems, machine learning, ensemble, stacking, decision trees, fuzzy logic

Abstract

The object of the research is the process of identifying the state of computer systems. The subject of the research is the methods of fuzzy ensemble decision trees with multidimensional decision nodes for identifying the state of computer systems. The goal of the research is to develop and evaluate the effectiveness of a fuzzy ensemble of decision trees to improve the accuracy of identifying computer system states under conditions of uncertainty, noise, and incomplete data. Methods used: machine learning methods, data preprocessing techniques, ensemble classifiers, stacking approaches, methods for feature selection and combination of computer system attributes. Results obtained: the effectiveness of both classical and newly developed methods for identifying the state of computer systems under complex conditions, including data imbalance and the presence of anomalous states, was investigated. A comprehensive approach using Fuzzy Stacking with MDT was proposed, providing high accuracy and stability of classification. The best results were achieved with the stacking approach, which combines base classifiers and fuzzy decision trees, minimizing both type I and type II errors and achieving high generalization ability (MCC, F1-score, TS, LN(DOR)). Conclusions. Based on the results of the study, an improved approach for identifying the state of computer systems is proposed, which combines the stacking method with Fuzzy MDT and feature selection optimization. The integrated use of these methods significantly enhances classification accuracy, result stability, and model robustness to data imbalance, while ensuring high-quality classification even in the presence of new anomalous states.

Downloads

Download data is not yet available.

References

1. K. Shanthi and R. Maruthi, "A Comparative Study of Intrusion Detection and Prevention Systems for Cloud Environment," 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2023, pp. 493-496, doi: https://doi.org/10.1109/ICESC57686.2023.10193694

2. Z. Chiba, N. Abghour, K. Moussaid, O. Lifandali and R. Kinta, "Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT Networks," 2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 2022, pp. 1-6, doi: https://doi.org/10.23919/SoftCOM55329.2022.9911401

3. W. Villegas-Ch, J. Govea, R. Gutierrez, A. Maldonado Navarro and A. Mera-Navarrete, "Effectiveness of an Adaptive Deep Learning-Based Intrusion Detection System," in IEEE Access, vol. 12, pp. 184010-184027, 2024, doi: https://doi.org/10.1109/ACCESS.2024.3512363

4. R. Latha and S. J. J. Thangaraj, “Securing the Digital Perimeter: A Comprehensive Intrusion Detection System with Ensemble Learning”, 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI), Chennai, India, 2023, pp. 1-5, doi: https://doi.org/10.1109/ICDSAAI59313.2023.10452636

5. О. Горносталь, В. Челак, Класифікація мережевих атак методами машинного навчання в умовах дисбалансу тренувальних даних / Системи управління, навігації та зв’язку, Полтава, 2025, Том 3 (81), С. 64-71, doi: https://doi.org/10.26906/SUNZ.2025.3.064

6. V. Chelak, S. Gavrylenko Method of Computer System State Identification based on Boosting Ensemble with Special Preprocessing Procedure / Advanced Information Systems, Kharkiv, 2022, Vol. 6 No. 1, P. 12-18, 2022, doi: https://doi.org/10.20998/2522-9052.2022.1.02

7. О.Hornostal , S. Gavrylenko. Development of a method for identification of the state of computer systems based on bagging classifiers. Advanced Information Systems. Kharkiv, 2021, vol. 5, no. 4, pp. 5–9, doi: https://doi.org/10.20998/2522-9052.2021.4.01

8. D. Wang, S. Ji, H. Shi and J. Liu, "Power Encoding Transmission Intrusion Detection Method Based on Convolutional Autoencoders-XGBoost," 2025 2nd International Symposium on New Energy Technologies and Power Systems (NETPS), Hangzhou, China, 2025, pp. 470-474, doi: https://doi.org/10.1109/NETPS65392.2025.11102095

9. Гавриленко С. Ю., Челак В. В. Розробка методу ідентифікації стану комп'ютерної системи на основі нечітких дерев рішень / Системи управління, навігації та зв’язку, Полтава, 2023, Випуск 1 (71), С. 78-83, doi: https://doi.org/100.26906/SUNZ.2023.1.078

10. Q. -V. Dang, "Studying the Fuzzy clustering algorithm for intrusion detection on the attacks to the Domain Name System," 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), London, United Kingdom, 2021, pp. 271-274, doi: https://doi.org/10.1109/WorldS451998.2021.9514038

11. Das, Abhishek, et al. "Design of deep ensemble classifier with fuzzy decision method for biomedical image classification." Applied Soft Computing, vol. 115, 2022, p. 108178. ScienceDirect, doi: https://doi.org/10.1016/j.asoc.2021.108178

12. Chatterjee, S., Das, A. An ensemble algorithm integrating consensus-clustering with feature weighting based ranking and probabilistic fuzzy logic-multilayer perceptron classifier for diagnosis and staging of breast cancer using heterogeneous datasets. Appl Intell 53, 13882–13923 (2023), doi: https://doi.org/10.1007/s10489-022-04157-0

13. Shaikh, T.A., Rasool, T., Verma, P. et al. A fundamental overview of ensemble deep learning models and applications: systematic literature and state of the art. Ann Oper Res (2024), doi: https://doi.org/10.1007/s10479-024-06444-0

14. S. Y. Gavrylenko, V. V. Chelak, S. G. Semenov Development of Method for Identification the Computer System State based on the Decision Tree with Multi-Dimensional Nodes / Radio Electronics, Computer Science, Control (RECSC), Zaporizhzhia, No. 2 (2022), P. 113-122, doi: https://doi.org/10.15588/1607-3274-2022-2-11

Published

2025-12-02