{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:22:28Z","timestamp":1761805348968,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644738"},{"type":"electronic","value":"9783319644745"}],"license":[{"start":{"date-parts":[[2017,7,29]],"date-time":"2017-07-29T00:00:00Z","timestamp":1501286400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-64474-5_34","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T10:30:11Z","timestamp":1501237811000},"page":"402-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyberattack Classificator Verification"],"prefix":"10.1007","author":[{"given":"Igor","family":"Korobiichuk","sequence":"first","affiliation":[]},{"given":"Ruslan","family":"Hryshchuk","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Mamarev","sequence":"additional","affiliation":[]},{"given":"Volodymyr","family":"Okhrimchuk","sequence":"additional","affiliation":[]},{"given":"Maciej","family":"Kachniarz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"34_CR1","unstructured":"Buryachok, V.L., Gryschuk, R.V., Horoshko, V.O.: The Policy of Information Security, 222 p. PVP\u00a0\u00ab\u00a0Zadruga\u00a0\u00bb, \u041ayiv (2014). ISBN 978-966-2970-87-6"},{"key":"34_CR2","unstructured":"ISO\/IEC IS 27001:2013. Information Technology. Security Techniques. Information Security Management Systems. Requirements, Switzerland: ISO\/IEC, 23 p. (2013)"},{"key":"34_CR3","unstructured":"Serduyk, V.A.: The New in the Corporative Systems Security against Hacking, 360 p. Technosphere, Moskva (2007). ISBN: 978-5-94836-133-8"},{"key":"34_CR4","unstructured":"Ostapenko, A.G., Ivanikin, M.P., Savenkov, G.A.: Attack Detection and Counteraction in the Distributed Information Systems: tutorial, 91 p. Voronezh State Technological University, Voronezh (2013). \n                    https:\/\/drive.google.com\/file\/d\/0BxTtsLdUO4tbbUNSQXhKSzdCekE\/view"},{"key":"34_CR5","unstructured":"Sheluhin, O.I.: The Detection of the Attacks into Computer Networks (network anomalies): tutorial, 220 p. Hot Line \u2013 Telecom, Moskva (2013). ISBN\u00a0978-5-9912-0323-4"},{"key":"34_CR6","unstructured":"Shangin, V.F.: Computer Information Security. The Effective Methods and Means, 544 p. DMK Press, Moskva (2010). ISBN 978-5-94074-518-1"},{"key":"34_CR7","unstructured":"Gamayunov, D.Y.: The Computer Attack Detection on the Basis of Network Object Behavior: Ph.D. Thesis: spec. 05.13.11, 89 p. Moskva (2007)"},{"key":"34_CR8","unstructured":"Lukatsky, A.: The Attack Detection. The 2-nd edition, 608 p. BHV-Petersburg, Sankt-Petersburg (2003). ISBN 5-941570-54-6"},{"key":"34_CR9","unstructured":"Scherbakov, A.Y.: The Modern Computer Security. The Theortical Background. The Practical Aspects, 352 p. Knizhnyi Mir, Moskva (2009). ISBN 978-5-8041-0378-2"},{"key":"34_CR10","doi-asserted-by":"publisher","unstructured":"Korobiichuk, I., Ladanyuk, A., Shumyhai, D., Boyko, R., Reshetiuk, V., Kami\u0144ski, M.: How to increase efficiency of automatic control of complex plants by development and implementation of coordination control system. In: Recent Advances in Systems, Control and Information Technology. Advances in Intelligent Systems and Computing, vol. 543, pp. 189\u2013195 (2017). doi:\n                    10.1007\/978-3-319-48923-0_23","DOI":"10.1007\/978-3-319-48923-0_23"},{"key":"34_CR11","doi-asserted-by":"publisher","unstructured":"Korobiichuk, I., Fedushko, S., Ju\u015b, A., Syerov, Y.: Methods of determining information support of web community user personal data verification system. In: Automation, ICA 2017. Advances in Intelligent Systems and Computing (AISC), vol. 550, pp 144\u2013150 (2017). doi:\n                    10.1007\/978-3-319-54042-9_13","DOI":"10.1007\/978-3-319-54042-9_13"},{"key":"34_CR12","unstructured":"McAfee Official Web Site. \n                    http:\/\/www.mcafee.com\/us\/products\/network-security-platform.aspx"},{"key":"34_CR13","unstructured":"Check Point software technologies LTD Official Web Site. \n                    https:\/\/www.checkpoint.com\/products\/next-generation-threat-prevention\/"},{"key":"34_CR14","unstructured":"IBM Official Web Site. \n                    http:\/\/www-03.ibm.com\/software\/products\/ru\/network-ips"},{"key":"34_CR15","unstructured":"Haq, N.F.: Application of machine learning approaches in intrusion detection system: A survey. \n                    http:\/\/thesai.org\/Downloads\/IJARAI\/Volume4No3\/Paper_2-Application_of_Machine_Learning_Approaches_in_Intrusion_Detection_System.pdf"},{"key":"34_CR16","unstructured":"Syarif, I.: Application of Bagging, Boosting and Stacking to Intrusion Detection. \n                    https:\/\/core.ac.uk\/download\/files\/34\/8748111.pdf"},{"key":"34_CR17","unstructured":"Nguyen, H.A.: Application of data mining to network intrusion detection: classifier selection model. \n                    http:\/\/arxiv.org\/ftp\/arxiv\/papers\/1007\/1007.1268.pdf"},{"key":"34_CR18","unstructured":"Sinha, N.K.: A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection. \n                    http:\/\/www.sbsstc.ac.in\/icccs2014\/Papers\/Paper45.pdf"},{"key":"34_CR19","unstructured":"Ghaleb, A.M.M.: Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques. \n                    http:\/\/www.ijsr.net\/archive\/v4i4\/SUB153071.pdf"},{"key":"34_CR20","unstructured":"Shrivas, A.K.: An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set. \n                    http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.677.7890&rep=rep1&type=pdf"},{"key":"34_CR21","unstructured":"Amdal\u2019s Law. \n                    https:\/\/ru.wikipedia.org\/wiki\/%D0%97%D0%B0%D0%BA%D0%BE%D0%BD_%D0%90%D0%BC%D0%B4%D0%B0%D0%BB%D0%B0"},{"key":"34_CR22","doi-asserted-by":"publisher","unstructured":"Gryschuk, R.V., Buryachok, V.L., Mamraev, V.M.: The State Informational Resource Attack Classificator Design. Technological Audit and the Production Reserves. Harkiv: PI\u00a0\u00abTechnolog. Center\u00bb\u00a0. No. 1\/2 (21). pp. 38\u201343 (2015). doi:\n                    10.15587\/2312-8372.2015.37423","DOI":"10.15587\/2312-8372.2015.37423"},{"key":"34_CR23","unstructured":"Dubrovin, V.I., Subbotin, S.A., Boguslaev, A.V., Yatsenko, V.K.: The Intellectual Means of Aviation Engine Reliability Forecast Diagnostics, 279 p. Motor-Sich, Zaporozhya (2003)"},{"key":"34_CR24","unstructured":"Mamraev, V.M.: The State Information Resource Cyber-Attack Classificator Design Method: Ph.D. thesis: spec. 21.05.01 \u201cstate information security\u201d, 160 p. Kyiv (2015)"},{"key":"34_CR25","unstructured":"Voronin, A.N., Ziatdinov, Y.K., Kuklinsky, M.V.: Multicriteria Solutions: Models and Methods, 348 p. NAU, Kyiv (2011)"},{"key":"34_CR26","unstructured":"Weka data mining software. \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/index.html"},{"key":"34_CR27","unstructured":"UCI Knowledge Discovery in Databases Archive. \n                    http:\/\/kdd.ics.uci.edu"},{"key":"34_CR28","unstructured":"Pilkevich, I.A., Molodetska, K.V., Sugoniak, I.I., Lobanchikova, H.M.: The Basics of Automation Control System Design. Zhytomyr. PH of ZhSU named after Franko, I., 226 p. (2014). \n                    http:\/\/ir.znau.edu.ua\/handle\/123456789\/2487"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Solutions in Diagnostics and Fault Tolerant Control"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64474-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T01:16:14Z","timestamp":1558142174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64474-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,29]]},"ISBN":["9783319644738","9783319644745"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64474-5_34","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,29]]},"assertion":[{"value":"29 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Diagnostics of Processes and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sandomierz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dps2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}