{"id":"https://openalex.org/W4415003911","doi":"https://doi.org/10.1109/acit65614.2025.11185805","title":"Combined ML Approaches for Automated Detection of Server Attack","display_name":"Combined ML Approaches for Automated Detection of Server Attack","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415003911","doi":"https://doi.org/10.1109/acit65614.2025.11185805"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022703187","display_name":"\u0422\u0435\u0442\u044f\u043d\u0430 \u041a\u043e\u0440\u043e\u0431\u0435\u0439\u043d\u0456\u043a\u043e\u0432\u0430","orcid":"https://orcid.org/0000-0003-2487-8742"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Tetiana Korobeinikova","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109389504","display_name":"\u041d\u0430\u0437\u0430\u0440 \u041a\u0440\u0430\u0432\u0447\u0443\u043a","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Nazar Kravchuk","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031305355","display_name":"S. A. Semenyuk","orcid":"https://orcid.org/0000-0002-8143-5887"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Serhiy Semenyuk","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108766053","display_name":"Sergey Romanyuk","orcid":null},"institutions":[{"id":"https://openalex.org/I40179345","display_name":"Odessa National Polytechnic University","ror":"https://ror.org/05xaz0w84","country_code":"UA","type":"education","lineage":["https://openalex.org/I40179345"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Sergey Romanyuk","raw_affiliation_strings":["Odessa National Polytechnic University,Department of Biomedical Engineering,Odessa,Ukraine"],"affiliations":[{"raw_affiliation_string":"Odessa National Polytechnic University,Department of Biomedical Engineering,Odessa,Ukraine","institution_ids":["https://openalex.org/I40179345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081492014","display_name":"\u041e\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440 \u0420\u043e\u043c\u0430\u043d\u044e\u043a","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100610","display_name":"Vinnytsia National Technical University","ror":"https://ror.org/00nagev26","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210100610"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksandr Romanyuk","raw_affiliation_strings":["Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"],"affiliations":[{"raw_affiliation_string":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine","institution_ids":["https://openalex.org/I4210100610"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052249065","display_name":"Oleksandr Reyda","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100610","display_name":"Vinnytsia National Technical University","ror":"https://ror.org/00nagev26","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210100610"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksandr Reyda","raw_affiliation_strings":["Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine"],"affiliations":[{"raw_affiliation_string":"Vinnytsia National Technical University,Faculty of Information Technologies and Computer Engineering,Vinnytsia,Ukraine","institution_ids":["https://openalex.org/I4210100610"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022703187"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":1.3852,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86677883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"569","last_page":"572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6291999816894531},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5468999743461609},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.47429999709129333},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.47350001335144043},{"id":"https://openalex.org/keywords/matlab","display_name":"MATLAB","score":0.4514999985694885},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.38589999079704285},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3788999915122986}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7148000001907349},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6291999816894531},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5468999743461609},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.489300012588501},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.47429999709129333},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.47350001335144043},{"id":"https://openalex.org/C2780365114","wikidata":"https://www.wikidata.org/wiki/Q169478","display_name":"MATLAB","level":2,"score":0.4514999985694885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4406000077724457},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4318000078201294},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.38589999079704285},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3465000092983246},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.3052000105381012},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2782000005245209},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C164554305","wikidata":"https://www.wikidata.org/wiki/Q71550","display_name":"Application server","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1996327075","https://openalex.org/W2768736262","https://openalex.org/W2900080797","https://openalex.org/W3118180162","https://openalex.org/W4304814082","https://openalex.org/W4321843874","https://openalex.org/W4403937800","https://openalex.org/W4404689566","https://openalex.org/W4405040254","https://openalex.org/W4406627982","https://openalex.org/W4406755163","https://openalex.org/W4407145131"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"explores":[2],"machine":[3],"learning":[4],"techniques":[5],"for":[6,27],"detecting":[7,65],"and":[8,23,31,39,45,57,82],"blocking":[9],"dangerous":[10],"server":[11,80],"requests.":[12],"The":[13,69],"study":[14],"evaluates":[15],"logistic":[16],"regression,":[17],"support":[18],"vector":[19],"machines,":[20],"decision":[21],"trees,":[22],"deep":[24],"neural":[25],"networks":[26],"classification.":[28],"Using":[29],"MATLAB":[30],"a":[32,52],"network":[33],"traffic":[34],"dataset,":[35],"models":[36],"were":[37],"trained":[38],"tested,":[40],"assessing":[41],"accuracy,":[42,59],"F-score,":[43],"precision,":[44],"recall.":[46],"Results":[47],"show":[48],"that":[49],"DT":[50],"provides":[51],"balance":[53],"between":[54],"computational":[55],"efficiency":[56],"classification":[58],"while":[60],"DNN":[61],"demonstrates":[62],"potential":[63],"in":[64],"complex":[66],"cyber":[67],"threats.":[68],"findings":[70],"highlight":[71],"the":[72],"importance":[73],"of":[74],"combining":[75],"ML":[76],"approaches":[77],"to":[78],"enhance":[79],"cybersecurity":[81],"mitigate":[83],"cyberattacks":[84],"effectively.":[85]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
