Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cao, Yuanlong | - |
dc.contributor.author | Chen, Jing | - |
dc.contributor.author | Liu, Qinghua | - |
dc.contributor.author | Lei, Gang | - |
dc.contributor.author | Wang, Hao | - |
dc.contributor.author | You, Ilsun | - |
dc.date.accessioned | 2021-08-11T08:43:46Z | - |
dc.date.available | 2021-08-11T08:43:46Z | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3694 | - |
dc.description.abstract | Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information? | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2020.3021475 | - |
dc.identifier.scopusid | 2-s2.0-85096226300 | - |
dc.identifier.wosid | 000572897500001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.8, pp 165872 - 165883 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 165872 | - |
dc.citation.endPage | 165883 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PROTOCOL | - |
dc.subject.keywordPlus | FEEDBACK | - |
dc.subject.keywordPlus | VIDEO | - |
dc.subject.keywordAuthor | Cyberattack | - |
dc.subject.keywordAuthor | Robustness | - |
dc.subject.keywordAuthor | Mobile handsets | - |
dc.subject.keywordAuthor | Wireless communication | - |
dc.subject.keywordAuthor | Data communication | - |
dc.subject.keywordAuthor | Internet | - |
dc.subject.keywordAuthor | Wireless fidelity | - |
dc.subject.keywordAuthor | Multipath TCP | - |
dc.subject.keywordAuthor | cyber attacks | - |
dc.subject.keywordAuthor | incomplete information | - |
dc.subject.keywordAuthor | graph-theoretic model | - |
dc.subject.keywordAuthor | robustness analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.