Detailed Information

Cited 0 time in webofscience Cited 5 time in scopus
Metadata Downloads

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Seongmin-
dc.contributor.authorKim, Sekwon-
dc.contributor.authorSon, Kyungho-
dc.contributor.authorKim, Hwankuk-
dc.contributor.authorPark, Junyoung-
dc.contributor.authorYim, Kangbin-
dc.date.accessioned2021-08-11T16:24:29Z-
dc.date.available2021-08-11T16:24:29Z-
dc.date.issued2017-
dc.identifier.issn1741-1106-
dc.identifier.issn1741-1114-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8449-
dc.description.abstractThe number of mobile service users has drastically increased due to the development of mobile communication technologies and commercialisation of high-performance smartphones. As a result, the environment for mobile communication networks has changed into one that allows different types of abnormal traffic to easily flow, so the security threats on the network that had been hidden before have started to emerge. In particular, a 4G network is exposed to multiple forms of attacks that can maliciously use a GPRS Tunneling Protocol (GTP), which is used in LTE communications. In this paper, we present the types of real threats on a 4G mobile grid computing environment that uses a GTP protocol and provides algorithms studied to protect the network from such threats. Also, we have F-score represents the overall accuracy of algorithms was found to be 98.7%.-
dc.format.extent22-
dc.language영어-
dc.language.isoENG-
dc.publisherInderscience Enterprises-
dc.titleReal threats using GTP protocol and countermeasures on a 4G mobile grid computing environment-
dc.typeArticle-
dc.publisher.location스위스-
dc.identifier.doi10.1504/IJWGS.2017.10002838-
dc.identifier.scopusid2-s2.0-85011860379-
dc.identifier.wosid000397206600001-
dc.identifier.bibliographicCitationInternational Journal of Web and Grid Services, v.13, no.1, pp 3 - 24-
dc.citation.titleInternational Journal of Web and Grid Services-
dc.citation.volume13-
dc.citation.number1-
dc.citation.startPage3-
dc.citation.endPage24-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthorGTP-
dc.subject.keywordAuthor4G-
dc.subject.keywordAuthorLTE-
dc.subject.keywordAuthorsecurity threat-
dc.subject.keywordAuthormobile grid computing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE