Next Article in Journal
Li-Fi Range Challenge: Improvement and Optimization
Previous Article in Journal
Modeling the Presence of Humanoid Robots in Indoor Propagation Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Chaos Theory with AI Analisys in Network Scenarios

by
Antonio Francesco Gentile
1,* and
Maria Cilione
2
1
Institute for High Performance Computing and Networking Italian National Research Council (ICAR-CNR), Via P. Bucci, 87036 Rende, Italy
2
Independent Researcher, 00133 Roma, Italy
*
Author to whom correspondence should be addressed.
Telecom 2026, 7(1), 18; https://doi.org/10.3390/telecom7010018
Submission received: 30 November 2025 / Revised: 8 January 2026 / Accepted: 28 January 2026 / Published: 4 February 2026

Abstract

Modern TCP/IP networks are increasingly exposed to unpredictable conditions, both from the physical transmission medium and from malicious cyber threats. Traditional stochastic models often fail to capture the non-linear and highly sensitive nature of these disturbances. This work introduces a formal mathematical framework combining classical network modeling with chaos theory to describe perturbations in latency and packet loss, alongside adversarial processes such as denial-of-service, packet injection, or routing attacks. By structuring the problem into four scenarios (quiescent, perturbed, attacked, perturbed-attacked), the model enables a systematic exploration of resilience and emergent dynamics. The integration of artificial intelligence techniques further enhances this approach, allowing automated detection of chaotic patterns, anomaly classification, and predictive analytics. Machine learning models trained on simulation outputs can identify subtle signatures distinguishing chaotic perturbations from cyber attacks, supporting proactive defense and adaptive traffic engineering. This combination of formal modeling, chaos theory, and AI-driven analysis provides network engineers and security specialists with a powerful toolkit to understand, predict, and mitigate complex threats that go beyond conventional probabilistic assumptions. The result is a more robust methodology for safeguarding critical infrastructures in highly dynamic and adversarial environments.

1. Introduction

The rapid expansion of digital infrastructures has amplified both the scale and complexity of modern TCP/IP networks. These networks are no longer static systems operating under predictable conditions but rather dynamic ecosystems subject to continuous change. On one hand, physical communication channels are inherently imperfect, with noise, interference, and hardware imperfections creating unpredictable fluctuations in transmission quality. On the other hand, the same infrastructures are the constant target of increasingly sophisticated cyber attacks, ranging from denial-of-service attempts to advanced persistent threats capable of disrupting traffic flows and degrading service quality.
Traditional models based on linear approximations or probabilistic frameworks often fail to capture the interplay between these two classes of disturbances. In particular, chaotic behaviors in the physical medium may resemble the effects of deliberate attacks, making the differentiation between natural perturbations and adversarial actions non-trivial. Chaos theory, with its ability to model sensitivity to initial conditions and emergent non-linear patterns, offers a powerful framework to better represent such dynamics.
This study proposes the integration of chaos-based perturbation models with adversarial traffic modeling in order to create a unified view of network behavior under stress. Furthermore, artificial intelligence is introduced as a complementary tool capable of detecting anomalies, classifying events, and assisting in the proactive mitigation of risks in real time.
The motivation for this research stems from the urgent need to address the limitations of conventional approaches in network monitoring and defense. Current tools often rely on fixed thresholds or statistical assumptions that prove inadequate in the face of complex, non-linear phenomena. When a transmission medium is affected by chaotic disturbances, performance degradations may mimic the early phases of a cyber attack, leading to false alarms or delayed responses. Conversely, subtle attack patterns can be concealed within background noise, escaping detection until the network is already compromised.
By developing a model that explicitly accounts for both chaotic perturbations and adversarial activities, this work seeks to provide a more faithful representation of real-world network conditions. The ultimate objective is to empower network administrators and security specialists with analytical tools that improve situational awareness and decision-making. Artificial intelligence plays a central role in this vision: by learning from simulated and real data, AI systems can distinguish between chaotic variability and malicious intent, adaptively adjust network policies, and optimize mitigation strategies.
This study is therefore motivated not only by theoretical curiosity but also by the pressing practical demands of securing critical infrastructures. In an era where communication networks underpin economic, social, and national security functions, robust and intelligent models are indispensable for anticipating and countering threats in highly dynamic environments.
Main Contributions. The primary contributions of this research are summarized as follows:
  • Interdisciplinary Framework: The proposal of a unified theoretical framework that integrates formal TCP/IP network modeling with non-linear chaos theory to characterize network instabilities.
  • AI-Driven Stochastic Approximation: The development of an innovative methodology using AI to generate synthetic datasets that emulate chaotic perturbations (latencies and packet loss) through stochastic approximation of the Logistic Map and Lorenz Attractor.
  • Multi-Scenario Discrimination: A comprehensive comparative analysis of machine learning (ML) classifiers—specifically RF, KNN, and Logistic Regression—in distinguishing between deterministic chaotic noise and malicious DoS attack signatures across four distinct operational scenarios.
  • Formal Pipeline Mapping: The formalization of a continuous-to-discrete transformation pipeline, defining mapping operators ( Ψ , Φ ) that bridge the gap between differential network equations and discrete flow-based features.
  • Paper Organization. The remainder of this paper is structured as follows: Section 2 summarizes relevant literature in Related Works. Section 3 introduces the Notation and Base Network Model, while the theoretical foundation of Chaos Theory Perturbations is detailed in Section 4. Section 5 describes the Attacker Model and Combined Model, followed by the formalization of the Four Scenarios and Example Equations in Section 6. The analytical framework is presented in Section 7, covering Metrics of Interest and Comparative Analysis. The core empirical findings are discussed in Section 8 (Experimental Results and AI Analysis) and Section 9 (Experimental Results). Section 10 provides an Discussion and Future Work (Extended Analysis), and Section 11 concludes the paper. Technical implementation details and algorithms are provided in Appendix A and Appendix B.
Figure 1, Figure 2, Figure 3 and Figure 4 show covered scenarios.

2. Related Works

The application of chaos theory within network security and traffic analysis is largely motivated by the premise that network traffic inherently exhibits non-linear and fractal characteristics, which traditional stochastic models often fail to capture accurately. This fundamental assumption has been robustly established in the literature, with studies by [1,2] demonstrating the direct applicability of chaotic theory to the analysis of computer network traffic dynamics. Further analysis by [3] provided a rigorous chaotic characteristic evaluation across different time scales, confirming that key chaotic identification indexes, such as the Largest Lyapunov Exponent and Kolmogorov entropy, vary significantly, reinforcing the idea that network behavior is a complex, sensitive system. Notably, [4] extended this observation by proving that chaotic dynamics can emerge even within deterministic networks, suggesting that chaos is an intrinsic property of network congestion rather than solely a result of external randomness. This concept is also applied in other contexts, such as the prediction of motorised traffic flows on urban networks [5].
Historically, the convergence of chaos and security has focused heavily on data protection and secrecy. A comprehensive survey by [6] detailed how chaotic maps are primarily exploited for cryptography, steganography, and secure key generation, leveraging properties like ergodicity for robust security primitives, a principle also explored by [7] in the context of chaotic quantum cryptography. More broadly, the literature has provided recent extensive reviews of chaos theory applications across various domains, including security [8] and cultural applications [9]. Other related work explores the theoretical synchronization of neural networks, a concept adjacent to chaotic dynamics modeling [10].
In recent years, the focus has broadened to detection and prediction through hybrid models that integrate chaotic analysis with machine learning (ML). Early works include the short-term network traffic forecasting algorithm developed by [11], which combined chaos theory with support vector machines (SVM) to improve prediction accuracy. The utility of chaotic modeling in countering specific threats was shown by [12], who proposed a chaos-theory-based approach for detection against network mimicking distributed denial-of-service (DDoS) attacks, and by [13], who designed a DDoS detection algorithm integrating traffic prediction via chaos theory. This dual focus is also evident in specialized architectures, where [14] applied chaos theory and wavelet analysis to model traffic in wireless sensor networks. In contemporary research, the integration has evolved towards deep learning, with [15] developing anomaly detection methods based on chaotic neural networks to address high-dimensional traffic features and model overfitting.
More widely, the integration of deep learning architectures, such as Autoencoders [16] and Unsupervised Ensembles [17], has become standard practice for anomaly detection. Specifically in the domain of IoT security, numerous hybrid methods have been proposed, leveraging deep learning alongside optimization algorithms and other technologies, for instance, in DDoS detection using Elman NNs with Chaotic Bacterial Colony Optimization [18], Robust DDoS detection with Piecewise Harris Hawks Optimizer [19], and Blockchain-assisted deep DDoS detection [20]. These studies underscore the relentless pursuit of high-performance detection, particularly in complex and resource-constrained environments, including future 6G systems [21], whose overall objectives are defined by bodies like the ITU-R [22]. Furthermore, cutting-edge anomaly detection methods, such as that by [23] which uses deep residual shrinkage networks, predominantly target the objective of optimizing detection performance by maximizing accuracy and minimizing false alarms.
In contrast, the present study introduces a methodological shift. We utilize controlled chaotic perturbation—derived from the logistic map—not to improve a detector or model traffic, but to simulate adversarial ambiguity specifically to validate the stability and locate the failure boundaries of different ML classifiers. This transition from achieving superior accuracy to intentionally observing and measuring controlled model confusion provides a critical assessment of ML model resilience, representing the key distinction from the prior art. The application of non-linear dynamics and chaos theory spans across various scientific disciplines, providing a robust mathematical foundation for modeling complex and unpredictable system behaviors [9]. In the context of hardware security and the Internet of Things (IoT), chaotic mapping has been successfully utilized to enhance the non-linear properties of cryptographic components, such as the design of lightweight S-boxes that optimize the trade-off between computational cost and security [24]. The increasing complexity of network infrastructures, particularly concerning overlay and virtual private networks (VPNs), requires rigorous performance and security analysis, especially when deployed through open-source infrastructures [25]. As threats evolve, the role of artificial intelligence (AI) has become central to modern cybersecurity. Recent studies have emphasized the potential of AI-enabled threat detection for advanced mitigation strategies [26], as well as its application in critical infrastructures like next-generation smart grids, where AI-driven defense and cyber deception techniques are vital against operational technology (OT) threats [27]. However, the integration of deep learning also introduces new vulnerabilities; for instance, Yang et al. [28] demonstrated how adversarial attacks can effectively compromise deep-learning-based estimation models by targeting covariance inputs, highlighting the ongoing arms race between AI-driven defense and adversarial exploitation

3. Notation and Base Network Model

We introduce the notation for the TCP/IP network model.
  • The network is a directed graph G = ( V , E ) , where:
    V: nodes (hosts, routers),
    E: links with attributes.
  • Each link e E is characterized by:
    capacity C e [bit/s],
    base latency L e 0 [s],
    base packet loss probability p e 0 [ 0 , 1 ] .
  • Flows: set F = { f 1 , , f N } . Each flow f i has:
    source s i , destination d i ,
    instantaneous rate r i ( t ) [bit/s].
  • Queues: each link e has a buffer of size B e . Queue dynamics:
    d Q e d t = i F e r i ( t ) C e .
  • Queueing latency:
    L q , e ( t ) = Q e ( t ) C e .
  • Effective RTT of flow f i : sum of link latencies and queueing delays.
  • TCP rate adaptation (fluid approximation):
    d r i d t = 1 R T T i ( t ) λ i ( t ) r i ( t ) ,
    where λ i ( t ) reflects congestion and packet loss.

Logical Flow Description

The diagram in Figure 5 illustrates the methodology used to assess the resilience of a machine-learning-based intrusion detection system (IDS) under chaotic perturbations and that in Figure 6 the logical simulation flow. The process is divided into three logical phases. The pre-training phase begins with defining the network topology (1) and simulating traffic to generate labeled data (2). Key network metrics are then extracted during feature extraction (3) to create the pre-processed dataset (4). In the subsequent training phase, the clean dataset is split (5), and the ML model is trained (6) to achieve high accuracy in distinguishing between BENIGN and ATTACK_DOS traffic. The critical post-training phase introduces the novel validation approach: chaotic noise generation (7), based on the logistic map, is applied to the base feature set via noise injection (8), simulating adversarial ambiguity. The resulting chaotic dataset (9) is then used to perform model testing (10) on the previously trained ML classifier. The final step, confusion measurement (11), quantifies the model’s loss of performance and resilience boundaries by analyzing the resulting confusion matrix and accuracy drop.

4. Chaos Theory Perturbations

To simulate physical medium disturbances (non-Gaussian, deterministic), we introduce chaotic sources c e ( t ) .

Example Generators

  • Logistic map:
    x n + 1 = r x n ( 1 x n ) , r ( 3.57 , 4 ] .
  • Lorenz attractor:
    X ˙ = σ ( Y X ) , Y ˙ = X ( ρ Z ) Y , Z ˙ = X Y β Z .
Chaotic signal impact on losses and latency:
p e ( t ) = p e 0 + α e Ψ p ( c e ( t ) ) ,
L e ( t ) = L e 0 + α e Ψ L ( c e ( t ) ) ,
where α e 0 is the intensity of chaos and Ψ maps chaotic output to perturbations.

5. Attacker Model and Combined Model

Let a ( t ) represent malicious processes.
  • DoS/DDoS:
    r a d v ( t ) = β ( t ) S ( t ) ,
    increasing inflow on victim link.
  • Packet injection: Increases effective packet loss rate or resets flow state.
  • Jamming: Direct increment of p e ( t ) or L e ( t ) .
  • Routing attacks: Change path P i ( t ) , introducing spikes in RTT and loss.
Generic attack process:
a ( t ) = β χ [ t 0 , t 0 + Δ t ] ( t ) h ( t ) ,
where β is intensity, χ is an indicator, and h is temporal profile.
Full perturbation equations:
p e ( t ) = p e 0 + α e Ψ p ( c e ( t ) ) + Φ p ( a ( t ) ) ,
L e ( t ) = L e 0 + α e Ψ L ( c e ( t ) ) + Φ L ( a ( t ) ) .

6. Four Scenarios and Example Equations

Define configuration vector S = ( α , β ) :
1.
Quiescent model:  α = 0 , β = 0 . No chaos, no attack.
2.
Perturbed model:  α > 0 , β = 0 . Chaos active, no attack.
3.
Attacked model:  α = 0 , β > 0 . Attack active, no chaos.
4.
Perturbed-attacked model:  α > 0 , β > 0 . Both chaos and attack active.

Example Equations

For each link e:
x n + 1 = r e x n ( 1 x n ) , c e ( t n ) = 2 x n 1 , p e ( t n ) = clip p e 0 + α e max ( 0 , c e ( t n ) θ p ) + Φ p ( a ( t n ) ) , 0 , 1 , L e ( t n ) = L e 0 + α e γ L | c e ( t n ) | + Φ L ( a ( t n ) ) , d Q e d t = i F e r i ( t ) + r a d v , e ( t ) C e , d r i d t = 1 R T T i ( t ) ( λ 0 + p p a t h ( i ) ( t ) ) r i ( t ) .

7. Metrics of Interest and Comparative Analysis

  • Average throughput: T h r o u g h p u t ¯ e .
  • Packet loss: mean and variance of p e ( t ) .
  • RTT and jitter.
  • Sensitivity to chaos: empirical Lyapunov exponent from divergence of trajectories.
  • Attack effectiveness: relative increase in loss/latency.

7.1. Comparative Analysis

7.2. Bit Error Rate (BER)

The Bit Error Rate (BER) quantifies the probability of a bit being incorrectly received. In traditional communication theory, BER is modeled as a function of the signal-to-noise ratio (SNR):
B E R = Q 2 × S N R ,
where Q ( × ) is the Gaussian tail probability function.
In our model, BER is augmented by both chaotic perturbations c e ( t ) and attack processes a ( t ) . Let B E R 0 denote the baseline bit error probability for link e. Then:
B E R e ( t ) = B E R 0 + α e × Ψ B E R ( c e ( t ) ) + Φ B E R ( a ( t ) ) ,
where:
  • Ψ B E R ( c e ( t ) ) maps chaotic fluctuations to error probability increments, modeling bursty, or correlated errors;
  • Φ B E R ( a ( t ) ) captures adversarial actions such as jamming or packet injection.
This formulation allows BER to evolve dynamically, reflecting both environmental chaos, and malicious interference.

7.3. Packet Error Rate (PER)

The Packet Error Rate (PER) extends BER by measuring the probability that an entire packet of length L bits is corrupted:
P E R = 1 ( 1 B E R ) L .
In the proposed model, the packet error probability at time t becomes:
P E R e ( t ) = 1 1 B E R e ( t ) L .
Because chaotic processes introduce temporal correlations, error bursts are more likely, leading to packet-level degradation that cannot be explained by independent error assumptions. Under active attack scenarios, Φ B E R ( a ( t ) ) increases sharply, resulting in compounded error rates and packet drops. This allows for a unified quantitative treatment of both physical and adversarial degradation.

7.4. Logical Comparison and Error Correction Codes (ECC)

From a logical perspective, our framework differs from classical stochastic models by unifying natural perturbations and malicious actions under a single analytical structure. While traditional methods separate physical noise from intentional attacks, our approach treats both as dynamic contributors to error probability.
Error correction codes (ECC), such as Hamming codes, Reed–Solomon, or Low-Density Parity-Check (LDPC) codes, are traditionally designed to mitigate stochastic errors. Their effectiveness, however, can degrade under chaotic or adversarially correlated error bursts. Within our model, the effective post-correction BER can be expressed as:
B E R E C C ( t ) f E C C B E R e ( t ) , L , d m i n ,
where d m i n is the minimum Hamming distance of the chosen code, and  f E C C ( × ) represents the decoding capability.
Similarly, the corrected PER is:
P E R E C C ( t ) = 1 1 B E R E C C ( t ) L .
This formulation highlights that ECC performance must be evaluated against both chaotic dynamics and adversarial errors, ensuring resilience in hybrid threat environments. Artificial intelligence can further enhance this process by dynamically selecting coding schemes and redundancy levels based on real-time classification of chaos versus attack patterns. The measured impact of these threats on network performance is detailed in Table 1 (large packets) and Table 2 (small packets), while the performance of various ECC schemes under these conditions is summarized in Table 3.
  • Compact Comparative Tables
Implementation of Chaotic Perturbations and AI Approximation. To address the complexity of chaotic dynamics within network environments, this study adopts an AI-driven stochastic approximation as a primary tool to emulate the non-linear trajectories of chaotic systems. This methodological choice allows the framework to capture the “phenomenological signature” of instability before transitioning to purely deterministic models. By leveraging AI to generate these perturbations, we establish a robust baseline for identifying chaotic-like signatures in network traffic. Furthermore, this approach is designed to be extensible to specific IoT environments, such as MQTT-based systems, where packet-level analysis is critical. Future iterations of this framework are planned to integrate formal deterministic maps, such as the logistic map and the Lorenz attractor, directly into the latency generation engine to refine the distinction between legitimate jitter and coordinated adversarial attacks.
Synthetic Dataset Rationale and Robustness. The use of a custom-generated synthetic dataset in this work is a deliberate methodological necessity. Existing standard IDS datasets, such as CICIDS2018 or UNSW-NB15, while excellent for representing malicious signatures, lack the required ground-truth labels for deterministic chaotic perturbations. Our dataset serves as a “Digital Twin” of the network, providing a controlled laboratory environment where chaotic variables can be isolated and analyzed without the confounding noise of unmodeled real-world traffic. To ensure the robustness of the machine learning classifiers and mitigate concerns regarding linear separability, we have introduced controlled feature overlap and Gaussian variance between the benign and attack classes. This ensures that models like Random Forest, hereinafter RF, and KNN are evaluated on their ability to recognize complex non-linear temporal signatures rather than relying on trivial threshold-based discrimination. Table 4 resumes the formalization of Network Operators by Mapping Theory to ML Features.

8. Experimental Results and AI Analysis

The experimental phase focused on validating the machine learning (ML) model’s ability to discriminate network traffic flows across two primary scenarios: the baseline simulated attack detection and the critical analysis of model robustness under controlled chaotic conditions.

8.1. Baseline Classification and Feature Importance (RF)

The initial objective was to establish the maximum achievable performance in detecting the simulated denial of service (DoS) attack using the defined flow metrics. The RF (RF) classifier was trained on the linearly separable dataset, preprocessed from the file simulated_security_dataset.csv. The dataset ensures a clear distinction between the BENIGN and ATTACK_DOS classes by using non-overlapping feature ranges (as summarized in Table A1).
The results confirmed the expected maximal performance:
  • Accuracy: 1.00 (100%)
  • Precision, Recall, F1-Score: 1.00 for both classes.
This perfect score serves as a vital Proof of Concept for the chosen set of features, confirming that, in an ideal, noise-free environment, the attack pattern is perfectly defined and detectable.

8.2. Class Separability Analysis and Feature Importance

The observed near-perfect classification performance of the RF (RF) model, achieving an F1-Score of 0 . 9999 is primarily attributed to the clear linear separability of the primary classes within the chosen feature set. Specifically, an analysis of the feature space reveals that the classes BENIGN and ATTACK_DOS can be perfectly isolated based on two key features: Flow Duration and Total _ Fwd _ Packets . The ATTACK_DOS traffic exhibits extremely high Flow Duration values compared to the BENIGN traffic, and conversely, Total_Fwd_Packets is often low or zero for the attack flows, but medium-to-high for benign traffic. This distinct separation, illustrated in Figure 7, indicates that the initial dataset is an ideal proof-of-concept for the selected features. Furthermore, the simulated attack, though easily separable via aggregate features, represents a sustained, high-volatility packet flood (with packet counts ranging from 600 to 2000 over the flow duration). This complexity justifies the need for robust machine learning techniques, as this high variability is intentionally designed to bypass simple threshold-based detection systems.

8.3. Baseline Performance of the Logistic Regression Model

To establish a measurable baseline for classification errors, we employed a simple linear classifier, the logistic regression (LR) model. The LR performance under minimal perturbation is summarized by its confusion matrix and derived metrics, shown in Table 5.
The LR model demonstrated an exceptional Recall of 1 . 0000 , correctly identifying all 200 instances of the attack ( True Positives = 200 ) with zero False Negatives ( FN = 0 ). This result further reinforces the hypothesis of linear separability in the feature space. However, it committed a small number of False Positives ( FP = 2 ), indicating a high-confidence, but not perfect, prediction capability. The performance of this linear model serves as the ideal benchmark against which the effects of the chaotic perturbations are evaluated as shown in Figure 8.

8.4. Classification Performance Analysis

As requested during the review process, the performance metrics for the RF, KNN, and Logistic Regression models have been expanded to include True Negative (TN) values. Table 6 provides the complete classification counts for the four analyzed scenarios (Quiescent, Perturbed, Attacked, and Perturbed-Attacked) and Table 7 shows representative case for Confusion Matrix RF Classifier.

Feature Importance

The feature importance analysis, a crucial output from the RF model (detailed in Analisi_con_attacchi.odt), confirmed that the model relied almost exclusively on the four primary network metrics, which are the fundamental discriminators of the simulated attack. These features are, in order of importance:
1.
Total_Fwd_Packets (Total Forward Packets)
2.
Flow_Duration (Duration of the Flow)
3.
Packet_Length_Mean (Mean Packet Length)
4.
Bwd_IAT_Min (Minimum Backward Inter-Arrival Time)
This outcome suggests that these four metrics must be the focal points for real-time monitoring within any robust Network Intrusion Detection System (NIDS).
Class Imbalance and Mitigation Strategy. A 1:4 ratio exists between Benign (20%) and Attack (80%) samples. To prevent the classifiers from developing a bias toward the majority class, we implemented a cost-sensitive learning approach during the training phase. Specifically, for models such as RF and KNN, we applied class weighting, which penalizes misclassifications of the minority class more heavily within the loss function. Furthermore, to provide a rigorous and unbiased evaluation, we shifted the primary performance metrics from simple accuracy to Balanced Accuracy and the F1-Score. The Balanced Accuracy, being the arithmetic mean of class-specific recall, ensures that the model’s ability to correctly identify Benign traffic is weighted equally to its performance on Attack traffic, regardless of the sample size.

8.5. Analysis of Chaos Impact and Model Robustness Challenge

While the 100 % accuracy in the baseline scenario is excellent for validating the feature set, it presents a challenge for the scientific validity of the AI component. The RF model demonstrated excessive Robustness, successfully classifying the attack even when a small amount of chaotic perturbation was introduced (as observed in the repeated simulations from simulazioni_ripetute_results_caos.csv, which showed near-perfect metrics 0.999 ). This hyper-robustness is characteristic of ensemble models like RF when applied to highly separable data, making it difficult to visibly demonstrate the intended ambiguity and confusion caused by chaotic input.
To perform a proper critical analysis of the AI’s susceptibility to confusion under network ambiguity (the core element of this research), the experimental design was adjusted to force a controlled failure.

8.6. Resilience Assessment: Robustness vs. Sensitivity to Chaotic Noise

To test the core hypothesis regarding the susceptibility of different algorithmic designs to chaotic network characteristics, we conducted a direct comparative analysis between the highly robust RF (RF) ensemble model and the Agnostic K-Nearest Neighbors (KNN) model, which is highly sensitive to local and non-linear variations. The results are summarized in Table 8.

8.6.1. RF Robustness

The RF model exhibited extreme robustness, maintaining an F1-Score of 0 . 9999 even under maximum chaotic stress. The failure rate was minimal, resulting in only 1 False Negative ( FN = 1 ). This result validates the hypothesis that ensemble learning methods are highly effective in filtering out unpredictable, high-frequency noise inherent in chaotic systems.

8.6.2. K-Nearest Neighbors Catastrophic Failure

In stark contrast, the Agnostic KNN model suffered a catastrophic collapse, with its F1-Score plunging to 0 . 3346 . This low value clusters near the statistical baseline of random chance, rendering the model unusable. The confusion matrix revealed an unacceptable balance of errors, with 62 False Positives ( FP = 62 ) and 62 False Negatives ( FN = 62 ). This signifies a simultaneous failure to raise valid alarms and a critical inability to detect actual threats.
The experiment successfully validates the hypothesis: non-ensemble, sensitive models like KNN are highly susceptible to the non-linear, chaotic characteristics of network traffic data, whereas ensemble methods like RF maintain structural stability and superior resilience. Figure 9 and Figure 10, respectively, show KNN baseline and the matrix for the KNN model under maximum chaotic perturbation.

8.7. Controlled Chaos Scenario and Linear Model Failure (Logistic Regression)

To effectively visualize the impact of controlled ambiguity (simulating network chaos and noise) on classification simplicity, the robust RF model was replaced with the less powerful, strictly linear Logistic Regression (LR) classifier. This linear model is less tolerant of ambiguous boundaries, making it an ideal tool to visually expose model failure.
The model was trained and tested using the dataset preprocessed_security_data_ caos.csv, which includes a degree of perturbation in the feature values to emulate the confusion caused by chaotic network dynamics.

Confusion Matrix Results

The Logistic regression model, tested against a specific test set seed (random_state = 4), identified as the most error-prone in the initial analysis (documented in Analisi_Simulazione_ Senza Rumore.odt), finally produced a visible confusion matrix, confirming the susceptibility of linear models to chaotic ambiguity. The results are presented in Table 9.
This controlled failure is highly significant: the presence of just one false negative (FN) indicates that the model missed a real attack flow. This small error, invisible to the robust RF, successfully validates the hypothesis that chaotic or ambiguous inputs can push simple ML models below the threshold of perfect detection, proving the need for a dynamic framework that can account for such non-linear disturbances. Figure 11 shows top 10 feature importance for the RF classifier.

8.8. Visual Analysis of Traffic Scenarios

Visualizations are essential to illustrate the dynamics of the simulated network and attack scenario. The figures generated by the analysis scripts (visualizza_risultati.py, visualizza_grafo.py, and simula_tempo.py) confirm the expected patterns.

8.8.1. Class Separation

Figure 12 clearly illustrates the linear separation of the two classes in the feature space (using the dataset preprocessed_security_data.csv), validating the high baseline accuracy.

8.8.2. Network Attack Visualization

Figure 13 depicts the simulated network topology, highlighting the targets of the DoS attack.

8.8.3. Temporal Progression of the Attack

Figure 14 uses the flow duration as a proxy for the temporal sequence to plot the attack intensity, showing the expected high and sustained volume of packets characteristic of a volumetric DoS attack.

9. Experimental Results

Our experimental analysis aims to validate the capability of machine learning (ML) models to distinguish traffic patterns originating from a cyber attack (the Attacked scenario) from those generated by chaotic perturbations (the Perturbed scenario).

9.1. Implementation and Dataset Generation

The simulated network topology for the experiments is modeled as an Erdos–Renyi random graph with N = 100 nodes. We generated a composite dataset containing 1500 traffic flows distributed between the B E N I G N and A T T A C K _ D O S (Denial of Service attack) classes.
For the simulation, four main features were defined that allow for the discrimination of attack traffic, as summarized in Table 10 (referring to the file dati_attacchi.pdf). The  A T T A C K _ D O S traffic is characterized by:
  • Low Flow_Duration (short flows, ≤10,000 μ s).
  • High Total_Fwd_Packets (many packets, ≥500).
  • Low Bwd_IAT_Min (minimum temporal intervals between very close packets, <10 μ s).
The raw dataset was subjected to pre-processing, including One-Hot Encoding for the source and destination IP addresses, transforming the IPs into binary features for use in the model.

9.2. Classification Results with RF

For the classification analysis, we used a RF Classifier model trained on the simulated dataset. The model was evaluated using an 80 / 20 split for training and testing.
The results obtained on the test set are exceptionally high:
  • Accuracy:  1.00 ( 100 % ).
  • Precision:  100 % .
  • Recall:  100 % .
  • F1-Score:  100 % .
Such perfect metrics indicate that the model was able to correctly classify every single traffic flow in the test set.
The analysis of Feature Importance (F.I.) confirms that classification is driven almost entirely by the four behavioral metrics that define the simulated DoS attack: Total_Fwd_Packets, Flow_Duration, Packet_Length_Mean, and Bwd_IAT_Min.
This result is expected given the high linear separability of the classes in the feature space ss evidenced by the dataset generation code (genera_dataset_sicurezza.py), where B E N I G N and A T T A C K _ D O S flows were created using non-overlapping value ranges for the key features, effectively guaranteeing a sharp and simplified distinction that any modern classifier, such as RF, can learn perfectly.

10. Discussion and Future Work (Extended Analysis)

The primary objective of this work is the integration between Chaos Theory and Artificial Intelligence to address scenarios where chaotic disturbances (physical) and attacks (adversarial) produce complex and hard-to-distinguish effects.
While the RF model results validate the ML approach for detecting anomalies in well-defined attack scenarios (Accuracy 100 % ), they highlight a limitation in the current dataset modeling phase.
Critique of Chaos Modeling: The abstraction of the “chaotic perturbation” is not yet fully implemented in line with the proposed mathematical formalization, which involves the use of generators like the logistic map or the Lorenz attractor. The current dataset uses simple stochastic generation based on discrete intervals (np.random.randint/uniform), which, although effective for simulating a classical attack, does not introduce the sensitivity to initial conditions and the emergent non-linear patterns that constitute the true challenge posed by Chaos. The perfect separability of the classes, which led to 100 % accuracy, is an indication that the model has not yet been subjected to the necessary stress to distinguish between a high-intensity chaotic disturbance (the Perturbed Scenario) that mimics an attack, and malicious intent (the Perturbed-Attacked Scenario).
Future Perspectives: To advance the research and validate the paper’s core thesis, future directions must focus on generating traffic flows that implement the chaotic equations c e ( t ) formalized in Section 5. Specifically, it will be crucial to:
1.
Chaos Injection into BENIGN Traffic: Modify the metrics Flow_Duration,
Packet_Length_Mean, and Bwd_IAT_Min of normal traffic using signals generated by a chaotic system (e.g., x n + 1 = r x n ( 1 x n ) ). This will create legitimate flows with non-linear deviations that could partially overlap with the attack ranges.
2.
Robustness Evaluation: Test the RF model, and subsequently neural networks, on their ability to maintain high Recall (minimal false negatives) in the presence of this chaos-induced ambiguity, thereby measuring their capability to distinguish the chaotic dynamic from the attack signature.
This evolution of the dataset will allow for a critical evaluation of the AI’s capacity to function as a non-linear pattern analyzer and not just as a simple statistical threshold classifier.

11. Conclusions

This framework defines a formal and mathematical model of a TCP/IP network under both chaotic perturbations and cyber attacks. The four scenarios (quiescent, perturbed, attacked, perturbed-attacked) allow studying resilience, non-linear interactions, and the impact of chaotic disturbances on attack efficiency.
This work developed a formal framework that integrates network modeling, controlled chaos perturbations, and machine learning (ML) techniques to analyze the resilience of cyber defense systems. The central contribution is the methodological approach used to validate the core hypothesis: chaotic disturbance can compromise the decision boundary of simple classifiers. The experimental analysis confirmed the efficacy of the chosen flow features (Total_Fwd_Packets, Flow_Duration, Packet_Length_Mean, and Bwd_IAT_Min) as primary discriminators for the simulated denial of service (DoS) attack.
The results yielded a perfect accuracy ( 100 % ) in the baseline scenario using the RF (RF) classifier. While this performance highlights the exceptional robustness and stability of the model in conditions of well-separated traffic, it also represented a methodological limitation. The extreme resilience of the RF, which maintained an accuracy close to 0.999 even on the chaotically perturbed dataset, effectively masked the ambiguity the chaotic inputs were intended to introduce. This success, while a merit for a real-world Intrusion Detection System (IDS), suggests that the simulated dataset was overly separable, limiting the generalizability of the perfect accuracy to network scenarios characterized by greater feature overlap.
To isolate and measure the effect of ambiguity, it was necessary to employ Logistic Regression (LR), a linear classification model. The main merit of this approach was to force a controlled failure, which allowed for a measurable error (a single False Negative) in the Confusion Matrix under the effect of the chaotic perturbation. This result validated the hypothesis: chaotic inputs challenge linear discrimination, compromising the simplicity of the decision boundary. The clear flaw of the LR, however, is its excessive fragility and practical inapplicability in a production NIDS, where its linear nature would render it vulnerable to minimal non-linear fluctuations, making it too simple for real-world deployment.
Future work will focus on extending the chaotic model with a non-linear control system capable of actively measuring and compensating for the impact of perturbations, rather than merely measuring its effect. It will also be crucial to employ deep learning (DL) models, which are intrinsically more resilient to noise, to verify if they can match the robustness of the RF while providing a more generalized classification boundary. Finally, the generation of more complex and non-linearly separable datasets, including a wider variety of attack types and background traffic, is necessary to enhance the practical relevance of the findings.

Author Contributions

Conceptualization, A.F.G.; Methodology, M.C.; Software, M.C.; Formal analysis, M.C.; Investigation, A.F.G.; Data curation, M.C.; Writing—original draft, A.F.G.; Writing—review and editing, A.F.G.; Visualization, M.C.; Project administration, A.F.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The datasets presented in this article are not readily available because the data are part of an ongoing study. Requests to access the datasets should be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Simulation and Machine Learning Implementation Details

This appendix provides the full source code listings for the key components used in the simulation and machine learning validation process, specifically the dataset generation and the RF model training.

Appendix A.1. Dataset Generation Script (Genera_Dataset_Sicurezza.py)

The script defined the core methodology for creating linearly separable traffic flows for the B E N I G N and A T T A C K _ D O S classes based on distinct feature ranges.
Listing A1. Pseudocode for Simulated Security Dataset Generation (genera_dataset_sicurezza.py).
  • FUNCTION generate_simulated_security_dataset(num_normal, num_attack, num_nodes):
  •            // 1. Network Setup
  •            CREATE network_graph as an Erdos-Renyi random graph with ’num_nodes’.
  •            GENERATE ’ip_addresses’~list.
  •            // 2. BENIGN Traffic Generation
  •            CREATE DataFrame df_normal:
  •                      ASSIGN random HIGH values to: Flow_Duration, Packet_Length_Mean, Bwd_IAT_Min.
  •                      ASSIGN random LOW values to: Total_Fwd_Packets.
  •                      ASSIGN Label: ’BENIGN’.
  •            // 3. ATTACK Traffic Generation (ATTACK_DOS)
  •            CREATE DataFrame df_attack:
  •                      ASSIGN random LOW values to: Flow_Duration, Packet_Length_Mean, Bwd_IAT_Min.
  •                      ASSIGN random HIGH values to: Total_Fwd_Packets (Clear Separation).
  •                      ASSIGN Label: ’ATTACK_DOS’.
  •            // 4. Combination and Finalization
  •            CONCATENATE df_normal and df_attack into df_final.
  •            SHUFFLE df_final randomly.
  •            RETURN df_final.

Appendix A.2. Machine Learning Training Script (Addestra_Modello.py)

The script implements the pre-processing steps, including One-Hot Encoding for the categorical IP features and the training of the RF Classifier, which yielded the reported 100 % accuracy on the test set.
Listing A2. Pseudocode for RF Model Training (addestra_modello.py).
  • FUNCTION load_and_preprocess_data(file_path):
  •            // 1. Data Loading and Target Encoding
  •            LOAD df from JSON file_path.
  •            USE LabelEncoder on df[’Label’] to create ’Target’.
  •            // 2. Categorical Feature Encoding
  •            APPLY One-Hot Encoding to ’IP_Source’ and ’IP_Destination’ columns.
  •            RETURN processed_df (X) and y (Target).
  • MAIN PROGRAM:
  •            processed_df, y = CALL load_and_preprocess_data(...).
  •            IF processed_df IS NOT Null:
  •                   // 1. Data Splitting
  •                   SPLIT X and y into Training and Test sets (80/20, stratified).
  •                   // 2. Model Training
  •                   CREATE and TRAIN a RF Classifier.
  •                   // 3. Evaluation
  •                   CALCULATE predictions y_pred.
  •                   CALCULATE and PRINT accuracy_score and classification_report.
  •                   // 4. Feature Importance Analysis
  •                   CALCULATE and IDENTIFY the most important features (Flow_Duration, Total_Fwd_Packets, etc.).

Appendix A.3. Key Data Separation Summary

As discussed in Section 9, the perfect classification results stem from the non-overlapping ranges defined during dataset generation. Table A1 summarizes the critical differences in the four main features distinguishing B E N I G N from A T T A C K _ D O S traffic as implemented in genera_dataset_sicurezza.py.
Table A1. Key Feature Value Ranges in the Simulated Dataset.
Table A1. Key Feature Value Ranges in the Simulated Dataset.
FeatureBENIGN RangeATTACK_DOS Range
Flow_Duration ( μ s)50,000 → 300,0001000 → 10,000
Total_Fwd_Packets10 → 50500 → 2000
Packet_Length_Mean (B)150 → 50050 → 100
Bwd_IAT_Min ( μ s)1000 → 10,0001 → 10
The lack of overlap in these ranges results in the 100 % linear separability observed by the RF Classifier.

Appendix B. Pseudocode for Simulation and Analysis Scripts

Appendix B.1. Genera_Dataset_Sicurezza.py

This script creates an artificially balanced dataset to clearly distinguish normal traffic from a DoS attack using non-overlapping feature ranges.
Listing A3. Pseudocode for generating the simulated security dataset (Genera_Dataset_Sicurezza.py).
  • FUNCTION generate_simulated_security_dataset(num_normal, num_attack, num_nodes):
  •            // 1. Network Setup
  •            CREATE network_graph as an Erdos-Renyi random graph with ’num_nodes’.
  •            GENERATE ’ip_addresses’ list (from "192.168.1.1" to "192.168.1.num_nodes").
  •            // 2. BENIGN Traffic Generation
  •            CREATE DataFrame df_normal:
  •                      ASSIGN random HIGH values to: Flow_Duration, Packet_Length_Mean, Bwd_IAT_Min.
  •                      ASSIGN random LOW values to: Total_Fwd_Packets.
  •                      ASSIGN Label: ’BENIGN’.
  •            // 3. ATTACK Traffic Generation (ATTACK_DOS)
  •            CREATE DataFrame df_attack:
  •                      ASSIGN random LOW values to: Flow_Duration, Packet_Length_Mean, Bwd_IAT_Min.
  •                      ASSIGN random HIGH values to: Total_Fwd_Packets (ensuring clear separation).
  •                      ASSIGN Label: ’ATTACK_DOS’.
  •            // 4. Combination and Finalization
  •            CONCATENATE df_normal and df_attack into df_final.
  •            SHUFFLE df_final randomly.
  •            RETURN df_final.
  • MAIN PROGRAM:
  •            security_df = CALL generate_simulated_security_dataset(1000, 500, 100).
  •            PRINT summary and class count.
  •            SAVE security_df to "simulated_security_dataset.json".

Appendix B.2. Addestra_Modello.py

This script loads the simulated dataset, preprocesses it (One-Hot Encoding of IPs), and trains a RF model for classification.
  • FUNCTION load_and_preprocess_data(file_path):
  •            // 1. Data Loading and Error Handling
  •            TRY to LOAD df from JSON file_path.
  •            IF failed (FileNotFound), PRINT ERROR and RETURN Null.
  •            // 2. Target Column Encoding
  •            USE LabelEncoder on df[’Label’] to create ’Label_Encoded’.
  •            ASSIGN y = ’Label_Encoded’.
  •            // 3. Categorical Feature Encoding
  •            APPLY One-Hot Encoding to ’IP_Source’ and ’IP_Destination’ columns.
  •            // 4. Final Feature Selection
  •            REMOVE the original ’Label’ column.
  •            RETURN processed_df (X) and y (Encoded Target).
  • MAIN PROGRAM:
  •            processed_df, y = CALL load_and_preprocess_data("simulated_security_dataset.json").
  •            IF processed_df IS NOT Null:
  •                  // 1. Preparation
  •                  RENAME ’Label_Encoded’ to ’Target’.
  •                  SAVE processed_df to "preprocessed_security_data.csv" (for visualization).
  •                  // 2. Data Splitting
  •                  X = processed_df excluding ’Target’.
  •                  SPLIT X and y into Training and Test sets (80/20, stratified).
  •                  // 3. Model Training
  •                  CREATE a RF Classifier (100 estimators).
  •                  TRAIN the model with the training sets.
  •                  // 4. Evaluation
  •                  CALCULATE predictions y_pred on the test set.
  •                  CALCULATE and PRINT accuracy_score and detailed classification_report.
  •                  // 5. Feature Importance Analysis
  •                  CALCULATE importance for all features.
  •                  PRINT the top 5 most important features.

Appendix B.3. Visualizza_Risultati.py

This script generates a scatter plot to visually demonstrate the clear separation of the BENIGN and ATTACK_DOS classes based on the key features.
  • FUNCTION plot_feature_separation(file_path):
  •            // 1. Data Loading
  •            TRY to LOAD df from CSV file_path (ELSE PRINT ERROR).
  •            // 2. Label Preparation
  •            CREATE df[’Label_Text’] by mapping ’Target’ (0 -> ’BENIGN’, 1 -> ’ATTACK_DOS’).
  •            // 3. Feature Selection for Plot
  •            ASSIGN feature_x = ’Total_Fwd_Packets’.
  •            ASSIGN feature_y = ’Flow_Duration’.
  •            // 4. Scatter Plot Creation
  •            INITIALIZE a Matplotlib figure.
  •            GENERATE a Seaborn scatter plot using:
  •                  X-AXIS: Total_Fwd_Packets.
  •                  Y-AXIS: Flow_Duration.
  •                  COLOR (Hue): df[’Label_Text’] (to color points by class).
  •            // 5. Finalization and Display
  •            SET Title, Axis Labels, and Legend.
  •            SHOW the plot.
  • MAIN PROGRAM:
  •            CALL plot_feature_separation("preprocessed_security_data.csv").

Appendix B.4. Visualizza_Grafo.py

This script visualizes the network topology, highlighting the nodes that received the highest volume of simulated DoS attack traffic.
  • FUNCTION visualize_network_attack(file_path, num_nodes):
  •            // 1. Data Loading
  •            TRY to LOAD df from JSON file_path.
  •            // 2. NetworkX Setup
  •            CREATE network_graph as an Erdos-Renyi graph with ’num_nodes’.
  •            CREATE ’ip_to_node’ map (IP addresses to node indices 0 to 99).
  •            // 3. Identify Attack Targets
  •            FILTER df for ’ATTACK_DOS’ flows.
  •            COUNT the occurrences of ’IP_Destination’ in attack flows.
  •            SELECT the top 5 highest-count IPs (top_targets).
  •            MAP top_targets to node numbers in ’attacked_nodes’.
  •            // 4. Visualization Styles
  •            DEFINE ’node_colors’: Red for attacked nodes, Gray for others.
  •            DEFINE ’node_sizes’: Large (500) for attacked, Small (200) for others.
  •            CREATE ’attack_labels’: Text labels ONLY for attacked nodes.
  •            CALCULATE node positions (spring_layout).
  •            // 5. Graph Visualization
  •            INITIALIZE Matplotlib figure.
  •            DRAW the network_graph (nx.draw_networkx) using the defined style parameters.
  •            HIDE the axes.
  •            SHOW the plot.
  • MAIN PROGRAM:
  •            CALL visualize_network_attack("simulated_security_dataset.json", 100).

Appendix B.5. Simula_Tempo.py

This script simulates the progression of attack intensity over time by using the ‘Flow_Duration’ as a proxy for the temporal sequence.
  • FUNCTION plot_attack_intensity(file_path):
  •            // 1. Data Loading
  •            TRY to LOAD df from JSON file_path.
  •            // 2. Sort by Temporal Proxy
  •            SORT df by ’Flow_Duration’ ascending (df_sorted).
  •            // 3. Filter for Attack Intensity
  •            FILTER df_sorted to get only ’ATTACK_DOS’ flows.
  •            ASSIGN ’attack_intensity’ to the ’Total_Fwd_Packets’ values of these flows.
  •            // 4. Line Plot Creation
  •            INITIALIZE Matplotlib figure.
  •            PLOT a line graph:
  •                  X-AXIS: Sequential index of flows (the simulated progression order).
  •                  Y-AXIS: Total_Fwd_Packets.
  •                  Color: Red.
  •            // 5. Finalization and Display
  •            SET Title, Axis Labels, and Grid.
  •            SHOW the plot.
  • MAIN PROGRAM:
  •            CALL plot_attack_intensity("simulated_security_dataset.json").

References

  1. Kaklauskas, L.; Sakalauskas, L. Application of Chaos Theory to Analysis of Computer Network Traffic. In Proceedings of the Application of Chaos Theory to Analysis of Computer Network Traffic, XIII International Conference “Applied Stochastic Models and Data Analysis”, Vilnius, Lithuania, 30 June–3 July 2009. [Google Scholar]
  2. Nikulchev, E.; Pluzhnik, E. Study of Chaos in the Traffic of Computer Networks. Int. J. Adv. Comput. Sci. Appl. 2014, 5, 60–62. [Google Scholar] [CrossRef]
  3. Tian, Z. Chaotic characteristic analysis of network traffic time series at different time scales. Chaos Solitons Fractals 2020, 130, 109412. [Google Scholar] [CrossRef]
  4. Wu, W.; Huang, N.; Wu, Z. Traffic chaotic dynamics modeling and analysis of deterministic network. Mod. Phys. Lett. B 2016, 30, 1650285. [Google Scholar] [CrossRef]
  5. Adewumi, A.; Kagamba, J.; Alochukwu, A. Application of Chaos Theory in the Prediction of Motorised Traffic Flows on Urban Networks. Math. Probl. Eng. 2016, 2016, 5656734. [Google Scholar] [CrossRef]
  6. Sheela, S.; Sathyanarayana, S. Application of chaos theory in data security-a survey. ACCENTS Trans. Inf. Secur. 2016, 2, 1–15. [Google Scholar] [CrossRef]
  7. Kartalopoulos, S. Chaotic quantum cryptography—The ultimate for network security. In Proceedings of the 2010 International Conference on Signal Processing and Multimedia Applications (SIGMAP), Athens, Greece, 26–28 July 2010; p. IS-9. [Google Scholar]
  8. Mashuri, A.; Adenan, N.H.; Abd Karim, N.S.; Tho, S.W.; Zeng, Z. Application of chaos theory in different fields-A literature review. J. Sci. Math. Lett. 2024, 12, 92–101. [Google Scholar] [CrossRef]
  9. Kiel, L.D.; Elliott, E.W. Chaos Theory in the Social Sciences: Foundations and Applications; University of Michigan Press: Ann Arbor, MI, USA, 1996. [Google Scholar]
  10. Chenthamarakshan, C.; Ganesan, S.; Sivakumar, K.; Kashkynbayev, A. Quasi-bipartite synchronization for delayed coupled inertial neural networks having cooperative and competitive communication via pinning control strategy. IET Control Theory Appl. 2025, 19, e12780. [Google Scholar] [CrossRef]
  11. Liu, X.; Fang, X.; Qin, Z.; Ye, C.; Xie, M. A Short-Term Forecasting Algorithm for Network Traffic Based on Chaos Theory and SVM. J. Netw. Syst. Manag. 2011, 19, 427–447. [Google Scholar] [CrossRef]
  12. Chonka, A.; Singh, J.; Zhou, W. Chaos theory based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 2009, 13, 717–719. [Google Scholar] [CrossRef]
  13. Chen, Y.; Ma, X.; Wu, X. DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory. IEEE Commun. Lett. 2013, 17, 1052–1054. [Google Scholar] [CrossRef]
  14. Li, G.H.; Zhu, C.M.; Li, X. Application of Chaos Theory and Wavelet to Modeling the Traffic of Wireless Sensor Networks. In Proceedings of the 2010 International Conference on Biomedical Engineering and Computer Science, Wuhan, China, 23–25 April 2010; pp. 1–4. [Google Scholar] [CrossRef]
  15. Sheng, S.; Wang, X. Network traffic anomaly detection method based on chaotic neural network. Alex. Eng. J. 2023, 77, 567–579. [Google Scholar] [CrossRef]
  16. Simon, J.; Kapileswar, N.; Vani, R.; Reddy, N.M.; Moulali, D.; Narayana Reddy, A.R. Enhanced Network Anomaly Detection Using Autoencoders: A Deep Learning Approach for Proactive Cybersecurity. In Proceedings of the 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI), Coimbatore, India, 28–30 August 2024; pp. 90–96. [Google Scholar] [CrossRef]
  17. Shahnawaz Ahmad, M.; Mehraj Shah, S. Unsupervised ensemble based deep learning approach for attack detection in IoT network. Concurr. Comput. Pract. Exp. 2022, 34, e7338. [Google Scholar]
  18. Hussan, M.T.; Reddy, G.V.; Anitha, P.; Kanagaraj, A.; Naresh, P. DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization. Clust. Comput. 2024, 27, 4469–4490. [Google Scholar] [CrossRef]
  19. Ragab, M.; M. Alshammari, S.; Maghrabi, L.A.; Alsalman, D.; Althaqafi, T.; AL-Ghamdi, A.A.M. Robust DDoS attack detection using piecewise harris hawks optimizer with deep learning for a secure Internet of Things environment. Mathematics 2023, 11, 4448. [Google Scholar] [CrossRef]
  20. Katib, I.; Ragab, M. Blockchain-assisted hybrid harris hawks optimization based deep DDoS attack detection in the IoT environment. Mathematics 2023, 11, 1887. [Google Scholar]
  21. Ara, I.; Kelley, B. Physical Layer Security for 6G: Toward Achieving Intelligent Native Security at Layer-1. IEEE Access 2024, 12, 82800–82824. [Google Scholar] [CrossRef]
  22. International Telecommunication Union. Framework and Overall Objectives of the Future Development of IMT for 2030 and Beyond. ITU-R Recommendation. 2023. Available online: https://www.itu.int/dms_pub/itu-d/oth/07/31/D07310000090015PDFE.pdf (accessed on 15 January 2025).
  23. Zuo, F.; Zhang, D.; Li, L.; He, Q.; Deng, J. GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks. Heliyon 2024, 10, e32087. [Google Scholar] [CrossRef]
  24. Thakor, V.A.; Razzaque, M.A.; Darji, A.D.; Patel, A.R. A novel 5-bit S-box design for lightweight cryptography algorithms. J. Inf. Secur. Appl. 2023, 73, 103444. [Google Scholar] [CrossRef]
  25. Gentile, A.F.; Macrì, D.; Greco, E.; Fazio, P. Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment. Future Internet 2024, 16, 283. [Google Scholar] [CrossRef]
  26. Dhanushkodi, K.; Thejas, S. AI Enabled Threat Detection: Leveraging Artificial Intelligence for Advanced Security and Cyber Threat Mitigation. IEEE Access 2024, 12, 173127–173136. [Google Scholar] [CrossRef]
  27. Lakhal, H.; Zegrari, M.; Bahnasse, A. Next-Generation Smart Grid Cybersecurity: A Systematic Review of OT Cyber Threats, AI-Driven Defense, Cyber Deception Techniques, and Emerging Security Strategies. IEEE Access 2025, 13, 181519–181552. [Google Scholar] [CrossRef]
  28. Yang, Z.; Zheng, S.; Zhang, L.; Zhao, Z.; Yang, X. Adversarial Attacks on Deep Learning-Based DOA Estimation With Covariance Input. IEEE Signal Process. Lett. 2023, 30, 1377–1381. [Google Scholar] [CrossRef]
Figure 1. Quiescent Topology.
Figure 1. Quiescent Topology.
Telecom 07 00018 g001
Figure 2. Perturbed Topology.
Figure 2. Perturbed Topology.
Telecom 07 00018 g002
Figure 3. Attacked Topology.
Figure 3. Attacked Topology.
Telecom 07 00018 g003
Figure 4. Perturbed Attacked Topology.
Figure 4. Perturbed Attacked Topology.
Telecom 07 00018 g004
Figure 5. Network Analysis Flow.
Figure 5. Network Analysis Flow.
Telecom 07 00018 g005
Figure 6. Simulation Flow.
Figure 6. Simulation Flow.
Telecom 07 00018 g006
Figure 7. Analysis of Class Separation based on Flow Duration and Total _ Fwd _ Packets . The lack of overlap enables nearly perfect classification.
Figure 7. Analysis of Class Separation based on Flow Duration and Total _ Fwd _ Packets . The lack of overlap enables nearly perfect classification.
Telecom 07 00018 g007
Figure 8. Confusion Matrix for the Logistic Regression Model without maximum chaotic perturbation.
Figure 8. Confusion Matrix for the Logistic Regression Model without maximum chaotic perturbation.
Telecom 07 00018 g008
Figure 9. CM K-Nearest Neighbors (KNN): Baseline.
Figure 9. CM K-Nearest Neighbors (KNN): Baseline.
Telecom 07 00018 g009
Figure 10. Confusion Matrix for the K-Nearest Neighbors (KNN) model under maximum chaotic perturbation. The results show a catastrophic breakdown of detection capabilities, with a high and balanced error rate (FN = 62 and FP = 62), validating the model’s extreme sensitivity to non-linear noise.
Figure 10. Confusion Matrix for the K-Nearest Neighbors (KNN) model under maximum chaotic perturbation. The results show a catastrophic breakdown of detection capabilities, with a high and balanced error rate (FN = 62 and FP = 62), validating the model’s extreme sensitivity to non-linear noise.
Telecom 07 00018 g010
Figure 11. Top 10 Feature Importance for the RF classifier. The model’s decisions are primarily driven by the volumetric statistic Total _ Fwd _ Packets and the temporal statistic Flow _ Duration . This finding confirms that the attack’s fingerprint is both volumetric and temporal, allowing the model to achieve high effectiveness without dependence on specific IP addresses.
Figure 11. Top 10 Feature Importance for the RF classifier. The model’s decisions are primarily driven by the volumetric statistic Total _ Fwd _ Packets and the temporal statistic Flow _ Duration . This finding confirms that the attack’s fingerprint is both volumetric and temporal, allowing the model to achieve high effectiveness without dependence on specific IP addresses.
Telecom 07 00018 g011
Figure 12. Visualization of Class Separation. The scatter plot shows the distinct separation between BENIGN flows (low intensity, long duration) and ATTACK_DOS flows (high intensity, short duration), which justifies the 100% baseline accuracy of the RF classifier.
Figure 12. Visualization of Class Separation. The scatter plot shows the distinct separation between BENIGN flows (low intensity, long duration) and ATTACK_DOS flows (high intensity, short duration), which justifies the 100% baseline accuracy of the RF classifier.
Telecom 07 00018 g012
Figure 13. Network Attack Topology Visualization. The graph highlights the destination nodes (in red) that received the highest volume of ATTACK_DOS traffic, demonstrating the attack’s concentrated distribution on the simulated Erdos-Renyi graph.
Figure 13. Network Attack Topology Visualization. The graph highlights the destination nodes (in red) that received the highest volume of ATTACK_DOS traffic, demonstrating the attack’s concentrated distribution on the simulated Erdos-Renyi graph.
Telecom 07 00018 g013
Figure 14. Simulated Attack Intensity Progression. The line plot shows the evolution of Total Forward Packets for ATTACK_DOS flows over time (sequential index), confirming the high and persistent packet rate typical of a DoS attack.
Figure 14. Simulated Attack Intensity Progression. The line plot shows the evolution of Total Forward Packets for ATTACK_DOS flows over time (sequential index), confirming the high and persistent packet rate typical of a DoS attack.
Telecom 07 00018 g014
Table 1. Impact of Chaotic and Adversarial Threats on BER and PER for Large Packets (12,000 bits).
Table 1. Impact of Chaotic and Adversarial Threats on BER and PER for Large Packets (12,000 bits).
ScenarioBERPER (12,000 b)
Quiescent 1 × 10 6 1.2%
Perturbed 5 × 10 5 45%
Attacked 1 × 10 4 70%
Pert. + Attacked 5 × 10 4 99.8%
Table 2. Impact of Chaotic and Adversarial Threats on BER and PER for Small Packets (512 bits).
Table 2. Impact of Chaotic and Adversarial Threats on BER and PER for Small Packets (512 bits).
ScenarioBERPER (512 b)
Quiescent 1 × 10 6 0.05%
Perturbed 5 × 10 5 2.5%
Attacked 1 × 10 4 5.0%
Pert. + Attacked 5 × 10 4 22.6%
Table 3. Performance Comparison of ECC Schemes under Combined Perturbation and Attack.
Table 3. Performance Comparison of ECC Schemes under Combined Perturbation and Attack.
ECC SchemeEff. BERPER (12,000 b)
None 5 × 10 4 99.8%
Hamming 5 × 10 5 45%
Reed–Sol. 5 × 10 6 5.8%
LDPC 5 × 10 7 0.6%
Table 4. Formalization of Network Operators: Mapping Theory to ML Features.
Table 4. Formalization of Network Operators: Mapping Theory to ML Features.
ComponentSymbolMapping FunctionParam. UnitsImpacted ML Features
Chaos Perturbation Ψ L , Ψ p Stochastic AI Approx. r [ 3.5 , 4.0 ] Flow_Duration (ms)
(Logistic/Lorenz) x 0 ( 0 , 1 ) IAT_Mean (ms)
Attack Operator Φ L , Φ p Deterministic Step λ a t k > 10 × λ b e n Fwd_Packets/s
Burst Functionpackets/sFlow_Bytes/s
Sampling Window S ( t ) Discrete Aggregation Δ t = 1.0 sTotal_Fwd_Packets
(Time-Slotted)window sizeTotal_Bwd_Packets
Clipping Rule C m a x Saturation Logic C m a x = 1 GbpsPacket_Count_Saturation
B c = min ( B , C m a x ) Bandwidth limitFlow_Duration_Max
Table 5. Derived Performance Metrics for Logistic Regression.
Table 5. Derived Performance Metrics for Logistic Regression.
MetricValueInterpretation
Precision (PPV)0.9901High confidence in positive predictions.
Recall (TPR)1.0000Zero missed attacks ( FN = 0 ).
F1-Score0.9950High harmonic mean, near-perfect score.
Table 6. Detailed Classification Results including True Negatives (TN).
Table 6. Detailed Classification Results including True Negatives (TN).
ScenarioTrue Pos. (TP)True Neg. (TN)False Pos. (FP)False Neg. (FN)
Quiescent9851000150
Perturbed (Chaos)9429802058
Attacked (DoS)100099550
Perturbed-Attacked9109653590
Table 7. Standard Confusion Matrix for the RF Classifier (Representative Case).
Table 7. Standard Confusion Matrix for the RF Classifier (Representative Case).
Predicted Class
PositiveNegative
ActualPositiveTP: 942FN: 58
ClassNegativeFP: 20TN: 980
Table 8. Final Contrast: RF vs. KNN Resilience to Chaotic Perturbation.
Table 8. Final Contrast: RF vs. KNN Resilience to Chaotic Perturbation.
ModelResulting F1-ScoreStability (Variance)Conclusion
RF (RF)0.9999Zero (Maximum Stability)The ideal algorithm for IDS; resistant to chaotic noise.
KNN (Agnostic)0.3346Extreme (Maximum Sensitivity)A catastrophic failure; unsuitable for production environments.
Table 9. Confusion Matrix (Logistic Regression under Controlled Chaos—Seed 4).
Table 9. Confusion Matrix (Logistic Regression under Controlled Chaos—Seed 4).
Actual/PredictedPredicted: BENIGN (0)Predicted: ATTACK_DOS (1)
ACTUAL: BENIGN (0)200 (True Negatives, TN)0 (False Positives, FP)
ACTUAL: ATTACK_DOS (1)1 (False Negative, FN)799 (True Positives, TP)
The single false negative demonstrates a controlled failure: one true attack flow was misclassified as benign due to the perturbed features. No false positives were recorded, maintaining a high level of security but confirming ambiguity.
Table 10. Key Features Distinguishing BENIGN and ATTACK_DOS Traffic.
Table 10. Key Features Distinguishing BENIGN and ATTACK_DOS Traffic.
FeatureNormal Traffic (BENIGN)DoS Attack (ATTACK_DOS)ML Relevance/Motivation
Flow Duration ( μ s)High (e.g., 70,245 → 296,544 μ s)Low (e.g., 13 → 9653  μ s)Attacks are typically brief and terminate quickly, providing a strong signal.
Total Fwd PacketsLow (e.g., 10 → 49 packets)Very High (e.g., 511 → 1997 packets)Hallmark of a DoS: overwhelming the target with many packets in a short time.
Pkt Length Mean (B)Variable/Medium-High (e.g.,
160 → 500 B)
Low (e.g., 50 → 100 B)DoS attacks often use small packets (e.g., SYN flood) to maximize volume and throughput.
Bwd IAT Min ( μ s)High (Slow: 1200 → 9900  μ s)Low (Fast: 1 → 9  μ s)Attacks generate packets with extremely close inter-arrival times, an obvious anomaly.
FIN Flag CountCan be 0 or 1Always 0Legitimate traffic closes the connection (FIN = 1); DoS attacks often do not (e.g., half-open connections).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gentile, A.F.; Cilione, M. Chaos Theory with AI Analisys in Network Scenarios. Telecom 2026, 7, 18. https://doi.org/10.3390/telecom7010018

AMA Style

Gentile AF, Cilione M. Chaos Theory with AI Analisys in Network Scenarios. Telecom. 2026; 7(1):18. https://doi.org/10.3390/telecom7010018

Chicago/Turabian Style

Gentile, Antonio Francesco, and Maria Cilione. 2026. "Chaos Theory with AI Analisys in Network Scenarios" Telecom 7, no. 1: 18. https://doi.org/10.3390/telecom7010018

APA Style

Gentile, A. F., & Cilione, M. (2026). Chaos Theory with AI Analisys in Network Scenarios. Telecom, 7(1), 18. https://doi.org/10.3390/telecom7010018

Article Metrics

Back to TopTop