{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:38:05Z","timestamp":1775018285788,"version":"3.50.1"},"reference-count":31,"publisher":"Pleiades Publishing Ltd","issue":"4","license":[{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1134\/s0361768823040126","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T09:02:21Z","timestamp":1690534941000},"page":"333-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detection of Network Attacks in a Heterogeneous Industrial Network Based on Machine Learning"],"prefix":"10.1134","volume":"49","author":[{"given":"A. M.","family":"Vulfin","sequence":"first","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"key":"3747_CR1","unstructured":"Moore, B., Gartner\u2019s top 10 IoT tech trends, IT Brief. https:\/\/itbrief.com.au\/story\/gartner-s-top-10-iot-tech-trends. Accessed December 5, 2021."},{"key":"3747_CR2","unstructured":"Topical Cyber Threats: Q4 2020. Positive Technologies report. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/cybersecurity-threatscape-2020-q4\/. Accessed December 5, 2021."},{"key":"3747_CR3","unstructured":"Threat landscape for industrial automation systems. 2019 year. Kaspersky ICS CERT [Online]. https:\/\/ics-cert.kaspersky.ru\/reports\/2020\/04\/24\/threat-landscape-for-industrial-automation-systems-2019-report-at-a-glance\/. Accessed December 5, 2021."},{"key":"3747_CR4","unstructured":"Cecil, A., A summary of network traffic monitoring and analysis techniques. \nhttps:\/\/www.cse.wustl.edu\/~jain\/cse567-06\/ftp\/net_monitoring\/index.html. Accessed December 5, 2021."},{"key":"3747_CR5","doi-asserted-by":"crossref","unstructured":"Gaifulina, D.A. and Kotenko, I.V., Application of deep learning methods in cybersecurity tasks, Voprosy kiberbezopasnosti, 2020, no. 3, pp.\u00a076\u201386.","DOI":"10.21681\/2311-3456-2020-03-76-86"},{"key":"3747_CR6","doi-asserted-by":"publisher","first-page":"100964","DOI":"10.1109\/ACCESS.2019.2930832","volume":"7","author":"M. Monshizadeh","year":"2019","unstructured":"Monshizadeh M. et al., Performance evaluation of a combined anomaly detection platform, IEEE Access, 2019, vol.\u00a07, pp.\u00a0100964\u2013100978.","journal-title":"IEEE Access"},{"key":"3747_CR7","doi-asserted-by":"crossref","unstructured":"Moustafa N. et al., Collaborative anomaly detection framework for handling big data of cloud computing, 2017 Military Communications and Information Systems Conference (MilCIS). IEEE, 2017, pp.\u00a01\u20136.","DOI":"10.1109\/MilCIS.2017.8190421"},{"key":"3747_CR8","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","volume":"40","author":"C.W. Ten","year":"2010","unstructured":"Ten, C.W., Manimaran G., and Liu, C.C., Cybersecurity for critical infrastructures: Attack and defense modeling, IEEE Trans. Syst., Man,Cybernetics Part A: Syst. and Humans, 2010, vol. 40, no. 4, pp. 853\u2013865.","journal-title":"IEEE Trans. Syst., Man,Cybernetics Part A: Syst. and Humans"},{"key":"3747_CR9","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TSG.2011.2159406","volume":"2","author":"C.W. Ten","year":"2011","unstructured":"Ten, C.W., Hong, J., and Liu, C.C., Anomaly detection for cybersecurity of the substations, IEEE Trans. Smart Grid, 2011, vol. 2, no. 4, pp. 865\u2013873.","journal-title":"IEEE Trans. Smart Grid"},{"key":"3747_CR10","doi-asserted-by":"crossref","unstructured":"Alrashdi, I. et al., Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019, pp. 305\u2013310.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"3747_CR11","doi-asserted-by":"crossref","unstructured":"Kiss, I. et al., Data clustering-based anomaly detection in industrial control systems, 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2014, pp. 275\u2013281.","DOI":"10.1109\/ICCP.2014.6937009"},{"key":"3747_CR12","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1109\/TII.2016.2599841","volume":"12","author":"T. Cruz","year":"2016","unstructured":"Cruz, T. et al., A cybersecurity detection framework for supervisory control and data acquisition systems, IEEE Trans. Industr. Inform., 2016, vol.\u00a012, no. 6, pp. 2236\u20132246.","journal-title":"IEEE Trans. Industr. Inform."},{"key":"3747_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/JSTSP.2012.2233713","volume":"7","author":"A.G. Tartakovsky","year":"2012","unstructured":"Tartakovsky, A.G., Polunchenko, A.S., and Sokolov, G., Efficient computer network anomaly detection by changepoint detection methods, IEEE J. Selected Topics Signal Process., 2012, vol. 7, no. 1, pp. 4\u201311.","journal-title":"IEEE J. Selected Topics Signal Process"},{"key":"3747_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TSUSC.2019.2906657","volume":"6","author":"M. Keshk","year":"2019","unstructured":"Keshk, M. et al., An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems, IEEE Trans. Sustainable Comput., 2019, vol. 6, no. 1, pp. 66\u201379.","journal-title":"IEEE Trans. Sustainable Comput"},{"key":"3747_CR15","doi-asserted-by":"publisher","first-page":"177460","DOI":"10.1109\/ACCESS.2019.2958284","volume":"7","author":"\u00c1.L.P. G\u00f3mez","year":"2019","unstructured":"G\u00f3mez, \u00c1.L.P. et al., On the generation of anomaly detection datasets in industrial control systems, IEEE Access, 2019, vol. 7, pp. 177460\u2013177473.","journal-title":"IEEE Access"},{"key":"3747_CR16","doi-asserted-by":"crossref","unstructured":"Tavallaee, M. et al., A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009, pp. 1\u20136.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"3747_CR17","doi-asserted-by":"crossref","unstructured":"Sharafaldin I., Lashkari A.H., Ghorbani A.A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp, 2018, vol.\u00a01, pp.\u00a0108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"#cr-split#-3747_CR18.1","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J., UNSW-NB15: a Comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"#cr-split#-3747_CR18.2","unstructured":"Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1-6."},{"key":"3747_CR19","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3390\/fi10080076","volume":"10","author":"M.A. Teixeira","year":"2018","unstructured":"Teixeira, M.A. et al., SCADA system testbed for cybersecurity research using machine learning approach, Future Internet. 2018, vol. 10, no. 8, p. 76.","journal-title":"Future Internet"},{"key":"3747_CR20","doi-asserted-by":"crossref","unstructured":"Miciolino, E.E. et al., Communications network analysis in a SCADA system testbed under cyber-attacks, 2015 23rd Telecommunications Forum Telfor (TELFOR), IEEE, 2015, pp. 341\u2013344.","DOI":"10.1109\/TELFOR.2015.7377479"},{"key":"3747_CR21","doi-asserted-by":"crossref","unstructured":"Sapozhnikova, M.U., Nikonov, A.V., and Vulfin, A.M., Intrusion detection system based on data mining techniques for industrial networks, 2018 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), IEEE, 2018, pp.\u00a01\u20135.","DOI":"10.1109\/ICIEAM.2018.8728771"},{"key":"3747_CR22","doi-asserted-by":"crossref","unstructured":"Vulfin, A.M. et al., Network traffic analysis based on machine learning methods, Journal of Physics: Conference Series. \n               IOP Publishing, 2021, vol. 2001, no.\u00a01, pp.\u00a0012017.","DOI":"10.1088\/1742-6596\/2001\/1\/012017"},{"key":"3747_CR23","doi-asserted-by":"crossref","unstructured":"Gurin M.A. et al., Intrusion detection system on the basis of data mining algorithms in the industrial network, CEUR Workshop Proceedings, 2019, pp. 553\u2013565.","DOI":"10.18287\/1613-0073-2019-2416-553-565"},{"key":"3747_CR24","doi-asserted-by":"crossref","unstructured":"Vulfin, A.M. et al., Algorithms for detecting network attacks in an enterprise industrial network based on data mining algorithms, J. Phys., \n               Conf. Ser. IOP Publishing, 2021, vol. 2001, no. 1, p. 012004.","DOI":"10.1088\/1742-6596\/2001\/1\/012004"},{"key":"3747_CR25","doi-asserted-by":"crossref","unstructured":"Almomani, I., Al-Kasasbeh, B., and Al-Akhras, M., WSN-DS: A dataset for intrusion detection systems in wireless sensor networks, J. Sensors, 2016, vol.\u00a02016.","DOI":"10.1155\/2016\/4731953"},{"key":"3747_CR26","first-page":"70","volume":"69","author":"V.I. Vasilyev","year":"2019","unstructured":"Vasilyev, V.I. et al., System of attacks detection in wireless sensor networks of Industrial Internet of Things, Trudy ISA RAN, 2019, vol.\u00a069, no. 4, pp. 70\u201378.","journal-title":"Trudy ISA RAN"},{"key":"3747_CR27","first-page":"81","volume":"32","author":"M.N. Goryunov","year":"2020","unstructured":"Goryunov, M.N., Matskevich, A.G., and Rybolovlev,\u00a0D.A., Synthesis of a machine learning model for detecting computer attacks based on the CICIDS2017 dataset, Trudy ISP RAN, 2020, vol. 32, no. 5, pp. 81\u201393.","journal-title":"Trudy ISP RAN"},{"key":"3747_CR28","first-page":"3","volume":"160","author":"S. B. Kotsiantis","year":"2007","unstructured":"Kotsiantis, S. B. et al., Supervised machine learning: A\u00a0review of classification techniques, Emerging artif. Intell. Appl. Comput. Eng., 2007. vol.\u00a0160. no. 1, pp. 3\u201324.","journal-title":"Intell. Appl. Comput. Eng."},{"key":"3747_CR29","doi-asserted-by":"publisher","unstructured":"Vulfin, A.M., Cyber threat intelligence data management system, Model. Optim. Inf. Techn., 2021, vol. 9, no.\u00a01. https:\/\/moitvivt.ru\/ru\/journal\/pdf?id=925. https:\/\/doi.org\/10.26102\/2310-6018\/2021.32.1.020. Accessed December 5, 2021.","DOI":"10.26102\/2310-6018\/2021.32.1.020"},{"key":"3747_CR30","first-page":"3","volume":"31","author":"L. Tobarra","year":"2019","unstructured":"Tobarra, L. et al., A Cybersecurity Experience with Cloud Virtual-Remote Laboratories, Multidisciplinary Digital Publishing Institute Proceedings, 2019, vol.\u00a031, no. 1, p. 3.","journal-title":"Multidisciplinary Digital Publishing Institute Proceedings"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823040126.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823040126","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823040126.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:51:34Z","timestamp":1775011894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823040126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,28]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3747"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823040126","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,28]]},"assertion":[{"value":"3 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}