{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:43Z","timestamp":1773655663872,"version":"3.50.1"},"reference-count":43,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080295","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"907-914","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems"],"prefix":"10.3103","volume":"54","author":[{"given":"E. A.","family":"Popova","sequence":"first","affiliation":[]},{"given":"V. V.","family":"Platonov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7311_CR1","unstructured":"Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex\u00a0Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210\u2013214."},{"key":"7311_CR2","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/S0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR3","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems","author":"E. Pavlenko","year":"2018","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, \n               ICPS, 2018, pp. 830\u2013834."},{"key":"7311_CR4","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3103\/S0146411617080272","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835\u2013843.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR5","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, IEEE International Black Sea Conference on Communications and Networking, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812786","DOI":"10.1109\/BlackSeaCom.2019.8812786"},{"key":"7311_CR6","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR7","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7311_CR8","unstructured":"Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, EISWT 2010, 2010, pp. 104\u2013110."},{"key":"7311_CR9","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1\u20133.","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7311_CR10","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7311_CR11","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977\u2013983.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR12","first-page":"795","volume":"2018","author":"V. Krundyshev","year":"2018","unstructured":"Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems, \n               ICPS 2018, 2018, pp. 795\u2013800.","journal-title":"ICPS"},{"key":"7311_CR13","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375\u2013382.","DOI":"10.33581\/1561-4085-2019-22-4-375-382"},{"key":"7311_CR14","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR15","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7311_CR16","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501783","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"7311_CR17","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, ACM International Conference Proceeding Series, 2019. https:\/\/doi.org\/10.1145\/3357613.3357623","DOI":"10.1145\/3357613.3357623"},{"key":"7311_CR18","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/S0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR19","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196\u2013204."},{"key":"7311_CR20","doi-asserted-by":"publisher","first-page":"665","DOI":"10.3103\/S0146411615080180","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665\u2013672.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR21","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Y. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR22","doi-asserted-by":"publisher","first-page":"713","DOI":"10.3103\/S0146411615080167","volume":"49","author":"N.S. Vert","year":"2015","unstructured":"Vert, N.S., Volkova, A.S., Zegzhda, D.P., and Kalinin, M.O., Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 713\u2013720.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR23","doi-asserted-by":"publisher","first-page":"984","DOI":"10.3103\/S0146411618080291","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Y., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984\u2013992.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR24","doi-asserted-by":"publisher","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, ACM International Conference Proceeding Series, 2015. https:\/\/doi.org\/10.1145\/2799979.2799995","DOI":"10.1145\/2799979.2799995"},{"key":"7311_CR25","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR26","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd\u00a0World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317\u2013321.","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7311_CR27","volume-title":"Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems","author":"D. Lavrova","year":"2018","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, 2018 IEEE Industrial Cyber-Physical Systems \n               (ICPS), 2018, pp. 818\u2013823."},{"key":"7311_CR28","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Y. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Y., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR29","doi-asserted-by":"publisher","first-page":"766","DOI":"10.3103\/S0146411615080131","volume":"49","author":"V.V. Platonov","year":"2015","unstructured":"Platonov, V.V. and Semenov, P.O., Using data-mining methods to detect network attacks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 766\u2013769.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR30","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R. Kohavi","year":"1997","unstructured":"Kohavi, R. and John, G., Wrappers for feature selection, Artif. Intell., 1997, vol. 97, nos. 1\u20132, pp. 273\u2013324.","journal-title":"Artif. Intell."},{"key":"7311_CR31","volume-title":"A Novel Two-Stage Classifier with Feature Selection for Intrusion Detection","author":"A. Kamath","year":"2015","unstructured":"Kamath, A., A Novel Two-Stage Classifier with Feature Selection for Intrusion Detection, Maulana Azad Inst. Technol., Bhopal, 2015."},{"key":"7311_CR32","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I. Guyon","year":"2002","unstructured":"Guyon, I., et al., Gene selection for cancer classification using support vector machines, Mach. Learn., 2002, vol. 46, nos. 1\u20133, pp. 389\u2013422.","journal-title":"Mach. Learn."},{"key":"7311_CR33","doi-asserted-by":"crossref","unstructured":"Vafaie, H. and De Jong, K., Genetic algorithms as a tool for feature selection in machine learning, Proceedings Fourth International Conference on Tools with Artificial Intelligence TAI'92, 1992, pp. 200\u2013203.","DOI":"10.1109\/TAI.1992.246402"},{"key":"7311_CR34","first-page":"39","volume":"10","author":"J. Goscik","year":"2013","unstructured":"Goscik, J. and Lukaszuk, T., Application of the recursive feature elimination and the relaxed linear separability feature selection algorithms to gene expression data analysis, Adv. Comput. Sci. Res., 2013, vol. 10, pp. 39\u201352.","journal-title":"Adv. Comput. Sci. Res."},{"key":"7311_CR35","first-page":"1525","volume":"2017","author":"X. Chen","year":"2017","unstructured":"Chen, X., et al., Semi-supervised feature selection via rescaled linear regression, IJCAI, 2017, vol. 2017, pp.\u00a01525\u20131531.","journal-title":"IJCAI"},{"key":"7311_CR36","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR37","doi-asserted-by":"crossref","unstructured":"Xu, Z., et al., Gradient boosted feature selection, 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014, pp. 522\u2013531.","DOI":"10.1145\/2623330.2623635"},{"key":"7311_CR38","doi-asserted-by":"publisher","first-page":"894","DOI":"10.3103\/S0146411617080168","volume":"51","author":"V.V. Platonov","year":"2017","unstructured":"Platonov, V.V. and Semenov, P.O., An adaptive model of a distributed intrusion detection system, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 894\u2013898.","journal-title":"Autom. Control Comput. Sci."},{"key":"7311_CR39","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, IEEE International Conference on Industrial Cyber Physical Systems, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812786","DOI":"10.1109\/BlackSeaCom.2019.8812786"},{"key":"7311_CR40","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, IEEE International Conference on Industrial Cyber Physical Systems, 2019. https:\/\/doi.org\/10.1109\/ICPHYS.2019.8854888","DOI":"10.1109\/ICPHYS.2019.8854888"},{"key":"7311_CR41","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L., Random forests, Mach. Learn., 2001, vol. 45, no. 1, pp. 5\u201332.","journal-title":"Mach. Learn."},{"key":"7311_CR42","first-page":"18","volume":"25","author":"N. Moustafa","year":"2016","unstructured":"Moustafa, N. and Slay, J., The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set, Inf. Secur. J.: Glob. Perspect., 2016, vol.\u00a025, nos. 1\u20133, pp. 18\u201331.","journal-title":"Inf. Secur. J.: Glob. Perspect."},{"key":"7311_CR43","first-page":"5094","volume":"96","author":"M. Nawir","year":"2018","unstructured":"Nawir, M., et al., Multi-classification of UNSW-NB15 dataset for network anomaly detection system, J. Theor. Appl. Inf. Technol., 2018, vol. 96, no. 15, pp. 5094\u20135104.","journal-title":"J. Theor. Appl. Inf. Technol."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080295.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080295","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080295.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:21Z","timestamp":1773612141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7311"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080295","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"3 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}