{"id":"https://openalex.org/W4285089001","doi":"https://doi.org/10.3390/a15070239","title":"IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency","display_name":"IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency","publication_year":2022,"publication_date":"2022-07-12","ids":{"openalex":"https://openalex.org/W4285089001","doi":"https://doi.org/10.3390/a15070239"},"language":"en","primary_location":{"id":"doi:10.3390/a15070239","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15070239","pdf_url":"https://www.mdpi.com/1999-4893/15/7/239/pdf?version=1657613800","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/15/7/239/pdf?version=1657613800","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032094840","display_name":"Sergii Lysenko","orcid":"https://orcid.org/0000-0001-7243-8747"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Sergii Lysenko","raw_affiliation_strings":["Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079282476","display_name":"Kira Bobrovnikova","orcid":"https://orcid.org/0000-0002-1046-893X"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Kira Bobrovnikova","raw_affiliation_strings":["Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine","institution_ids":["https://openalex.org/I164756455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066848534","display_name":"Vyacheslav Kharchenko","orcid":"https://orcid.org/0000-0001-5352-077X"},"institutions":[{"id":"https://openalex.org/I122725048","display_name":"Simon Kuznets Kharkiv National University of Economics","ror":"https://ror.org/02anx2442","country_code":"UA","type":"education","lineage":["https://openalex.org/I122725048"]},{"id":"https://openalex.org/I23686167","display_name":"National Aerospace University \u2013 Kharkiv Aviation Institute","ror":"https://ror.org/048j5n646","country_code":"UA","type":"education","lineage":["https://openalex.org/I23686167"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Vyacheslav Kharchenko","raw_affiliation_strings":["Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 61001 Kharkiv, Ukraine","Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", 61001 Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \u201cKhAI\u201d, 61001 Kharkiv, Ukraine","institution_ids":["https://openalex.org/I23686167","https://openalex.org/I122725048"]},{"raw_affiliation_string":"Department of Computer Systems, Networks and Cybersecurity, National Aerospace University \"KhAI\", 61001 Kharkiv, Ukraine","institution_ids":["https://openalex.org/I23686167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050278704","display_name":"\u041e\u043b\u0435\u0433 \u0421\u0430\u0432\u0435\u043d\u043a\u043e","orcid":"https://orcid.org/0000-0002-4104-745X"},"institutions":[{"id":"https://openalex.org/I164756455","display_name":"Khmelnytskyi National University","ror":"https://ror.org/04r8a1r80","country_code":"UA","type":"education","lineage":["https://openalex.org/I164756455"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleg Savenko","raw_affiliation_strings":["Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Systems Department, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine","institution_ids":["https://openalex.org/I164756455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032094840","https://openalex.org/A5066848534"],"corresponding_institution_ids":["https://openalex.org/I122725048","https://openalex.org/I164756455","https://openalex.org/I23686167"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.9983,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.86727775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"15","issue":"7","first_page":"239","last_page":"239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8221558332443237},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7436495423316956},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5928836464881897},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46813616156578064},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4673861265182495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45947781205177307},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4460047781467438},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4105284810066223},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3978351652622223},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3801037073135376}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8221558332443237},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7436495423316956},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5928836464881897},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46813616156578064},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4673861265182495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45947781205177307},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4460047781467438},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4105284810066223},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3978351652622223},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3801037073135376},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/a15070239","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15070239","pdf_url":"https://www.mdpi.com/1999-4893/15/7/239/pdf?version=1657613800","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6aa8b486eb0f4391a0f3400d1e2deb10","is_oa":true,"landing_page_url":"https://doaj.org/article/6aa8b486eb0f4391a0f3400d1e2deb10","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 15, Iss 7, p 239 (2022)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-4893/15/7/239/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/a15070239","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms; Volume 15; Issue 7; Pages: 239","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/a15070239","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a15070239","pdf_url":"https://www.mdpi.com/1999-4893/15/7/239/pdf?version=1657613800","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5036817778","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innov","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5184107801","display_name":null,"funder_award_id":"830943","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8633428685","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innovat","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285089001.pdf","grobid_xml":"https://content.openalex.org/works/W4285089001.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W2097839764","https://openalex.org/W2158001550","https://openalex.org/W2162387923","https://openalex.org/W2184039922","https://openalex.org/W2216946510","https://openalex.org/W2282861635","https://openalex.org/W2893262342","https://openalex.org/W2899653275","https://openalex.org/W2910931863","https://openalex.org/W2918676688","https://openalex.org/W2921708219","https://openalex.org/W2922140331","https://openalex.org/W2950659434","https://openalex.org/W2962727190","https://openalex.org/W2972542656","https://openalex.org/W2980576170","https://openalex.org/W2991140181","https://openalex.org/W2991435551","https://openalex.org/W3006144347","https://openalex.org/W3012448067","https://openalex.org/W3019994165","https://openalex.org/W3038102095","https://openalex.org/W3043486047","https://openalex.org/W3094123356","https://openalex.org/W3104060823","https://openalex.org/W3116271145","https://openalex.org/W3119918144","https://openalex.org/W3152885730","https://openalex.org/W3154409376","https://openalex.org/W3156453050","https://openalex.org/W3171158244","https://openalex.org/W3171908901","https://openalex.org/W3201789923","https://openalex.org/W3201981752","https://openalex.org/W4205608240","https://openalex.org/W4206278935","https://openalex.org/W4246484440","https://openalex.org/W4280539483","https://openalex.org/W4280576913","https://openalex.org/W4281655279","https://openalex.org/W4399647672","https://openalex.org/W6674582357","https://openalex.org/W6760527582","https://openalex.org/W6775018033","https://openalex.org/W6869608176"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1],"a":[2,19,76],"common":[3],"Internet":[4],"of":[5,11,22,60,90,110,119,160,191],"Things":[6],"security":[7,12],"challenge.":[8],"The":[9,88,103,179],"lack":[10],"in":[13,42,67,121],"IoT":[14,34,39,68,80,98,123,127,136,169],"devices":[15,23,99],"has":[16],"led":[17],"to":[18,54,63,174],"great":[20],"number":[21],"being":[24],"compromised,":[25],"with":[26,107,194],"threats":[27],"from":[28],"both":[29],"inside":[30],"and":[31,125,158],"outside":[32],"the":[33,38,58,91,108,117,122,131,138,145,156,176,183,189],"infrastructure.":[35,69,170],"Attacks":[36],"on":[37,84,130,168],"infrastructure":[40,124],"result":[41],"device":[43],"hacking,":[44],"data":[45],"theft,":[46],"financial":[47],"loss,":[48],"instability,":[49],"or":[50],"even":[51],"physical":[52],"damage":[53],"devices.":[55,128],"This":[56],"requires":[57],"development":[59],"new":[61,77],"approaches":[62],"ensure":[64],"high-security":[65],"levels":[66],"To":[70,143],"solve":[71],"this":[72],"problem,":[73],"we":[74],"propose":[75],"approach":[78,105,187],"for":[79,134],"cyberattack":[81],"detection":[82,190],"based":[83],"machine":[85,149,161],"learning":[86,150,162],"algorithms.":[87],"core":[89],"method":[92],"involves":[93],"network":[94,111,184],"traffic":[95,112,185],"analyses":[96],"that":[97,114,182],"generate":[100],"during":[101],"communication.":[102],"proposed":[104],"deals":[106],"set":[109],"features":[113,133],"may":[115],"indicate":[116],"presence":[118],"cyberattacks":[120,167,193],"compromised":[126],"Based":[129],"obtained":[132],"each":[135],"device,":[137],"feature":[139],"vectors":[140],"are":[141],"formed.":[142],"conclude":[144],"possible":[146],"attack":[147],"presence,":[148],"algorithms":[151],"were":[152,172],"employed.":[153],"We":[154],"assessed":[155],"complexity":[157],"time":[159],"algorithm":[163],"implementation":[164],"considering":[165],"multi-vector":[166,192],"Experiments":[171],"conducted":[173],"approve":[175],"method\u2019s":[177],"efficiency.":[178,196],"results":[180],"demonstrated":[181],"feature-based":[186],"allows":[188],"high":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
