{"id":"https://openalex.org/W3129511590","doi":"https://doi.org/10.23919/fruct50888.2021.9347629","title":"Reducing the Dimension of Input Data for IDS by Using Match Analysis","display_name":"Reducing the Dimension of Input Data for IDS by Using Match Analysis","publication_year":2021,"publication_date":"2021-01-27","ids":{"openalex":"https://openalex.org/W3129511590","doi":"https://doi.org/10.23919/fruct50888.2021.9347629","mag":"3129511590"},"language":"en","primary_location":{"id":"doi:10.23919/fruct50888.2021.9347629","is_oa":false,"landing_page_url":"https://doi.org/10.23919/fruct50888.2021.9347629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th Conference of Open Innovations Association (FRUCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/7b9836e4cd2c4de6acb0fe64785d9f5b","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001264759","display_name":"S. D. Erokhin","orcid":"https://orcid.org/0000-0002-0293-9500"},"institutions":[{"id":"https://openalex.org/I4210110898","display_name":"Moscow Technical University of Communication and Informatics","ror":"https://ror.org/015zw2f19","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210110898"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Sergey Erokhin","raw_affiliation_strings":["Moscow Technical University of Communications and Informatics,Moscow,Russia","Moscow Technical University of Communications and Informatics, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics,Moscow,Russia","institution_ids":["https://openalex.org/I4210110898"]},{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics, Moscow, Russia","institution_ids":["https://openalex.org/I4210110898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076875274","display_name":"\u0411. \u0411. \u0411\u043e\u0440\u0438\u0441\u0435\u043d\u043a\u043e","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110898","display_name":"Moscow Technical University of Communication and Informatics","ror":"https://ror.org/015zw2f19","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210110898"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Boris Borisenko","raw_affiliation_strings":["Moscow Technical University of Communications and Informatics,Moscow,Russia","Moscow Technical University of Communications and Informatics, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics,Moscow,Russia","institution_ids":["https://openalex.org/I4210110898"]},{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics, Moscow, Russia","institution_ids":["https://openalex.org/I4210110898"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004684834","display_name":"\u0410. \u0421. \u0424\u0430\u0434\u0435\u0435\u0432","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110898","display_name":"Moscow Technical University of Communication and Informatics","ror":"https://ror.org/015zw2f19","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210110898"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Aleksander Fadeev","raw_affiliation_strings":["Moscow Technical University of Communications and Informatics,Moscow,Russia","Moscow Technical University of Communications and Informatics, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics,Moscow,Russia","institution_ids":["https://openalex.org/I4210110898"]},{"raw_affiliation_string":"Moscow Technical University of Communications and Informatics, Moscow, Russia","institution_ids":["https://openalex.org/I4210110898"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001264759"],"corresponding_institution_ids":["https://openalex.org/I4210110898"],"apc_list":null,"apc_paid":null,"fwci":1.0697,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.77444493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10820","display_name":"Fuzzy Logic and Control Systems","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.838338315486908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039926290512085},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.6682879328727722},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6316444277763367},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5821361541748047},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5503243803977966},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46856147050857544},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4315212666988373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3935375213623047},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12796875834465027}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.838338315486908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039926290512085},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.6682879328727722},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6316444277763367},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5821361541748047},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5503243803977966},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46856147050857544},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4315212666988373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3935375213623047},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12796875834465027},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/fruct50888.2021.9347629","is_oa":false,"landing_page_url":"https://doi.org/10.23919/fruct50888.2021.9347629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th Conference of Open Innovations Association (FRUCT)","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:7b9836e4cd2c4de6acb0fe64785d9f5b","is_oa":true,"landing_page_url":"https://doaj.org/article/7b9836e4cd2c4de6acb0fe64785d9f5b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 28, Iss 1, Pp 96-102 (2021)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:7b9836e4cd2c4de6acb0fe64785d9f5b","is_oa":true,"landing_page_url":"https://doaj.org/article/7b9836e4cd2c4de6acb0fe64785d9f5b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 28, Iss 1, Pp 96-102 (2021)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W172466510","https://openalex.org/W1501102327","https://openalex.org/W1572460128","https://openalex.org/W2325070825","https://openalex.org/W2484616705","https://openalex.org/W2489962730","https://openalex.org/W2786530277","https://openalex.org/W2946437596","https://openalex.org/W2970162225","https://openalex.org/W4210968171","https://openalex.org/W4213163851","https://openalex.org/W4229903798","https://openalex.org/W4300882602","https://openalex.org/W6634162035"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Network":[0],"attack":[1],"detection":[2,19,59],"is":[3,37],"currently":[4],"one":[5],"of":[6,15,31,52,69],"the":[7,12,34,50,54,74],"most":[8,75],"pressing":[9],"problems":[10],"in":[11,57],"secure":[13],"use":[14,68],"networks.":[16],"Network-based":[17],"intrusion":[18,58],"systems":[20],"based":[21],"on":[22],"signature":[23],"rules":[24],"are":[25],"unable":[26],"to":[27,38,43],"detect":[28,44],"new":[29],"types":[30],"attacks.":[32,46],"Thus,":[33],"urgent":[35],"task":[36],"quickly":[39],"classify":[40],"network":[41,45],"traffic":[42],"This":[47],"paper":[48],"analyzes":[49],"possibility":[51],"downgrading":[53],"data":[55],"vector":[56],"systems.":[60],"The":[61],"proposed":[62],"approach":[63],"will":[64],"allow":[65],"more":[66],"efficient":[67],"system":[70],"resources":[71],"and":[72],"select":[73],"appropriate":[76],"(efficient)":[77],"features.":[78]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
