Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?open access
- Authors
- Cao, Yuanlong; Chen, Jing; Liu, Qinghua; Lei, Gang; Wang, Hao; You, Ilsun
- Issue Date
- 2020
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Keywords
- Cyberattack; Robustness; Mobile handsets; Wireless communication; Data communication; Internet; Wireless fidelity; Multipath TCP; cyber attacks; incomplete information; graph-theoretic model; robustness analysis
- Citation
- IEEE Access, v.8, pp 165872 - 165883
- Pages
- 12
- Journal Title
- IEEE Access
- Volume
- 8
- Start Page
- 165872
- End Page
- 165883
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3694
- DOI
- 10.1109/ACCESS.2020.3021475
- ISSN
- 2169-3536
- Abstract
- Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Information Security Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3694)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.