{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T02:29:43Z","timestamp":1649125783952},"reference-count":28,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080040","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T11:05:04Z","timestamp":1613646304000},"page":"922-929","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Specification-Based Classification of Network Protocol Vulnerabilities"],"prefix":"10.3103","volume":"54","author":[{"given":"I. V.","family":"Alekseev","sequence":"first","affiliation":[]},{"given":"P. D.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7313_CR1","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR2","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Semyanov, P., Shtyrkina, A., and Zegzhda, P., Wavelet-analysis of network traffic time-series for detection of attacks on digital production infrastructure, SHS Web Conf., 2018, vol. 44. https:\/\/doi.org\/10.1051\/shsconf\/20184400052","DOI":"10.1051\/shsconf\/20184400052"},{"key":"7313_CR3","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7313_CR4","first-page":"909","volume":"68","author":"M. Kalinin","year":"2015","unstructured":"Kalinin, M., Lavrova, D., and Pechenkin, A., High performance traffic processing in virtualized framework, C.\u00a0R. Acad. Bulg. Sci., 2015, vol. 68, no. 7, pp. 909\u2013916.","journal-title":"C.\u00a0R. Acad. Bulg. Sci."},{"key":"7313_CR5","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1\u20133.","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7313_CR6","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196\u2013204."},{"key":"7313_CR7","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, 2018. https:\/\/doi.org\/10.1109\/BlackSeaCom.2018.8433628","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"7313_CR8","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, IEEE International Conference on Industrial Cyber Physical Systems, 2019. https:\/\/doi.org\/10.1109\/ICPHYS.2019.8854888","DOI":"10.1109\/ICPHYS.2019.8854888"},{"key":"7313_CR9","doi-asserted-by":"publisher","first-page":"972","DOI":"10.3103\/S0146411619080339","volume":"53","author":"D.P. Zegzhda","year":"2019","unstructured":"Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972\u2013979.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR10","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3103\/S0146411616080290","volume":"50","author":"A.G. Busygin","year":"2016","unstructured":"Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743\u2013748.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR11","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR12","unstructured":"Cybersecurity Threatscape 2018: Trends and Forecasts, 2019. https:\/\/www.ptsecurity.com\/ww-en\/analytics\/cybersecurity-threatscape-2018\/#id2."},{"key":"7313_CR13","unstructured":"Platonov, V.V., Programmno-apparatnye sredstva zashchity informatsii (Software and Hardware Information Security Means), Moscow: Akademiya, 2013."},{"key":"7313_CR14","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.3103\/S0146411618080060","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Zegzhda, D.P., and Moskvin, D.A., Applying garlic routing to guarantee secure collaboration of segments in a digital manufacturing network, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1127\u20131133.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR15","doi-asserted-by":"crossref","unstructured":"Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, no. 1.","DOI":"10.1088\/1757-899X\/497\/1\/012006"},{"key":"7313_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/WorldS4.2019.8904022","volume":"S4","author":"V. Belenko","year":"2019","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, \n WorldS4, 2019, pp.\u00a0129\u2013135. https:\/\/doi.org\/10.1109\/WorldS4.2019.8904022","journal-title":"World"},{"key":"7313_CR17","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73\u201379.","DOI":"10.1145\/3136825.3136890"},{"key":"7313_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390808","volume-title":"Artificial swarm algorithm for VANET protection against routing attacks, IEEE Industrial Cyber-Physical Systems","author":"V. Krundyshev","year":"2018","unstructured":"Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, IEEE Industrial Cyber-Physical Systems, \n ICPS, 2018, pp. 795\u2013800. https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390808"},{"key":"7313_CR19","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom, 2018. \n https:\/\/doi.org\/10.1109\/BlackSeaCom.2018.8433628","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"7313_CR20","doi-asserted-by":"publisher","first-page":"959","DOI":"10.3103\/S0146411618080217","volume":"52","author":"V.V. Platonov","year":"2018","unstructured":"Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959\u2013964.","journal-title":"Autom. Control Comput. Sci."},{"key":"7313_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S.M. Bellovin","year":"1989","unstructured":"Bellovin, S.M., Security problems in the TCP\/IP protocol suite, Comput. Commun. Rev., 1989, vol. 19, no. 2, pp. 32\u201348.","journal-title":"Comput. Commun. Rev."},{"key":"7313_CR22","doi-asserted-by":"crossref","unstructured":"Tsipenyuk, K., Chess, B., and McGraw, G., Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors, 2005. https:\/\/cwe.mitre.org\/documents\/sources\/SevenPerniciousKingdoms.pdf.","DOI":"10.1109\/MSP.2005.159"},{"key":"7313_CR23","first-page":"96","volume":"5","author":"M.A. Albandari","year":"2017","unstructured":"Albandari, M.A., et al., Security issues in protocols of TCP\/IP model at layers level, Int. J. Comput. Networks Commun. Secur., 2017, vol. 5, no. 5, pp. 96\u2013104.","journal-title":"Int. J. Comput. Networks Commun. Secur."},{"key":"7313_CR24","unstructured":"OWASP Foundation. https:\/\/www.owasp.org\/."},{"key":"7313_CR25","unstructured":"Boneh, D., Network protocols and vulnerabilities, Computer and Network Security, 2010. https:\/\/crypto.stanford.edu\/cs155old\/cs155-spring11\/lectures\/08-tcp-dns.pdf."},{"key":"7313_CR26","unstructured":"DHCP Security Vulnerabilities, 2019. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-64\/product_ id-17706\/ISC-Dhcp.html."},{"key":"7313_CR27","unstructured":"Mitchell, J., Network security protocols and defensive mechanisms, Computer and Network Security, 2009. https:\/\/crypto.stanford.edu\/cs155old\/cs155-spring11\/lectures\/13-network-defense.pdf."},{"key":"7313_CR28","unstructured":"Pothamsetty, V. and Akyol, B., A vulnerability taxonomy for network protocols: Corresponding engineering best practicecountermeasures, IASTED International Conference on Communications, Internet, and Information Technology, 2004. https:\/\/www.researchgate.net\/publication\/221425438_A_vulnerability_taxonomy_for_network_ protocols_Corresponding_engineering_best_practice_countermeasures."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080040.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.3103\/S0146411620080040\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080040.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T11:17:37Z","timestamp":1613647057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.3103\/S0146411620080040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7313"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080040","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"15 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}