Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Seongmin | - |
dc.contributor.author | Kim, Sekwon | - |
dc.contributor.author | Son, Kyungho | - |
dc.contributor.author | Kim, Hwankuk | - |
dc.contributor.author | Park, Junyoung | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-08-11T16:24:29Z | - |
dc.date.available | 2021-08-11T16:24:29Z | - |
dc.date.issued | 2017 | - |
dc.identifier.issn | 1741-1106 | - |
dc.identifier.issn | 1741-1114 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8449 | - |
dc.description.abstract | The number of mobile service users has drastically increased due to the development of mobile communication technologies and commercialisation of high-performance smartphones. As a result, the environment for mobile communication networks has changed into one that allows different types of abnormal traffic to easily flow, so the security threats on the network that had been hidden before have started to emerge. In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications. In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats. Also, we have F-score represents the overall accuracy of algorithms was found to be 98.7%. | - |
dc.format.extent | 22 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Inderscience Enterprises | - |
dc.title | Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment | - |
dc.type | Article | - |
dc.publisher.location | 스위스 | - |
dc.identifier.doi | 10.1504/IJWGS.2017.10002838 | - |
dc.identifier.scopusid | 2-s2.0-85011860379 | - |
dc.identifier.wosid | 000397206600001 | - |
dc.identifier.bibliographicCitation | International Journal of Web and Grid Services, v.13, no.1, pp 3 - 24 | - |
dc.citation.title | International Journal of Web and Grid Services | - |
dc.citation.volume | 13 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 3 | - |
dc.citation.endPage | 24 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | GTP | - |
dc.subject.keywordAuthor | 4G | - |
dc.subject.keywordAuthor | LTE | - |
dc.subject.keywordAuthor | security threat | - |
dc.subject.keywordAuthor | mobile grid computing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.