Detailed Information

Cited 0 time in webofscience Cited 9 time in scopus
Metadata Downloads

Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?

Full metadata record
DC Field Value Language
dc.contributor.authorCao, Yuanlong-
dc.contributor.authorChen, Jing-
dc.contributor.authorLiu, Qinghua-
dc.contributor.authorLei, Gang-
dc.contributor.authorWang, Hao-
dc.contributor.authorYou, Ilsun-
dc.date.accessioned2021-08-11T08:43:46Z-
dc.date.available2021-08-11T08:43:46Z-
dc.date.issued2020-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3694-
dc.description.abstractPromoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP.-
dc.format.extent12-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleCan Multipath TCP be Robust to Cyber Attacks With Incomplete Information?-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2020.3021475-
dc.identifier.scopusid2-s2.0-85096226300-
dc.identifier.wosid000572897500001-
dc.identifier.bibliographicCitationIEEE Access, v.8, pp 165872 - 165883-
dc.citation.titleIEEE Access-
dc.citation.volume8-
dc.citation.startPage165872-
dc.citation.endPage165883-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPROTOCOL-
dc.subject.keywordPlusFEEDBACK-
dc.subject.keywordPlusVIDEO-
dc.subject.keywordAuthorCyberattack-
dc.subject.keywordAuthorRobustness-
dc.subject.keywordAuthorMobile handsets-
dc.subject.keywordAuthorWireless communication-
dc.subject.keywordAuthorData communication-
dc.subject.keywordAuthorInternet-
dc.subject.keywordAuthorWireless fidelity-
dc.subject.keywordAuthorMultipath TCP-
dc.subject.keywordAuthorcyber attacks-
dc.subject.keywordAuthorincomplete information-
dc.subject.keywordAuthorgraph-theoretic model-
dc.subject.keywordAuthorrobustness analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE