{"id":"https://openalex.org/W3009085767","doi":"https://doi.org/10.1109/globecom38437.2019.9013952","title":"No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS","display_name":"No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3009085767","doi":"https://doi.org/10.1109/globecom38437.2019.9013952","mag":"3009085767"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9013952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101913329","display_name":"Likun Liu","orcid":"https://orcid.org/0000-0002-2113-4679"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Likun Liu","raw_affiliation_strings":["School of Computer Science and Technology Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101947243","display_name":"Jiantao Shi","orcid":"https://orcid.org/0000-0002-9780-5184"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiantao Shi","raw_affiliation_strings":["School of Computer Science and Technology Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417312","display_name":"Hongli Zhang","orcid":"https://orcid.org/0000-0002-8167-7106"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongli Zhang","raw_affiliation_strings":["School of Computer Science and Technology Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072540013","display_name":"Xiangzhan Yu","orcid":"https://orcid.org/0000-0002-1183-2844"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangzhan Yu","raw_affiliation_strings":["School of Computer Science and Technology Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101913329"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.1768,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57715281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"pp","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7775185108184814},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.6103559136390686},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6057026982307434},{"id":"https://openalex.org/keywords/intranet","display_name":"Intranet","score":0.5962983965873718},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5941746234893799},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5920704007148743},{"id":"https://openalex.org/keywords/substring","display_name":"Substring","score":0.5898831486701965},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.581963062286377},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.468000590801239},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.43107283115386963},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.24058932065963745},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19123563170433044},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1057436466217041}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7775185108184814},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.6103559136390686},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6057026982307434},{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.5962983965873718},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5941746234893799},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5920704007148743},{"id":"https://openalex.org/C182407805","wikidata":"https://www.wikidata.org/wiki/Q2626534","display_name":"Substring","level":3,"score":0.5898831486701965},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.581963062286377},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.468000590801239},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.43107283115386963},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.24058932065963745},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19123563170433044},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1057436466217041},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9013952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1515106148","https://openalex.org/W1564964053","https://openalex.org/W1716229707","https://openalex.org/W1823805418","https://openalex.org/W2034538170","https://openalex.org/W2051619378","https://openalex.org/W2179500942","https://openalex.org/W2286156580","https://openalex.org/W2586867227","https://openalex.org/W2617939809","https://openalex.org/W2768251545","https://openalex.org/W2804883358","https://openalex.org/W2805825012","https://openalex.org/W2808425496","https://openalex.org/W2854921244","https://openalex.org/W2900623286","https://openalex.org/W2912967877","https://openalex.org/W4233762780","https://openalex.org/W6630750119","https://openalex.org/W6637696349"],"related_works":["https://openalex.org/W2374107376","https://openalex.org/W4241047679","https://openalex.org/W562045822","https://openalex.org/W2379752699","https://openalex.org/W2493140802","https://openalex.org/W2754858745","https://openalex.org/W2498491176","https://openalex.org/W2028692324","https://openalex.org/W2347957298","https://openalex.org/W2072703265"],"abstract_inverted_index":{"In":[0,72,107],"order":[1],"to":[2,33,63,160],"protect":[3],"intranet":[4],"security,":[5],"the":[6,24,46,74,120,132,144,168,182],"enterprises":[7],"or":[8,13],"organizations":[9],"usually":[10],"deploy":[11],"one":[12],"multiple":[14,55],"NIDS":[15,98,111,135],"at":[16],"ingress":[17],"points.":[18],"Each":[19],"works":[20],"independently":[21,118],"and":[22,57,119,153],"monitors":[23],"complete":[25],"TCP":[26,42,79],"flow.":[27,43],"That":[28],"said,":[29],"a":[30,41,82,95],"malicious":[31,52],"signature":[32,53],"be":[34,38],"detected":[35],"can":[36,50],"only":[37],"obtained":[39],"from":[40],"Drawing":[44],"on":[45],"feature,":[47],"an":[48],"attacker":[49],"split":[51],"into":[54],"substrings":[56],"transfer":[58],"them":[59],"in":[60,181],"different":[61],"flows":[62],"evade":[64],"detection,":[65],"which":[66,102],"is":[67,173],"named":[68],"multi-path":[69,89],"routing":[70,90],"attack.":[71],"particular,":[73],"emerging":[75],"new":[76],"technology":[77],"Multi-Path":[78],"(MPTCP)":[80],"offers":[81],"hotbed":[83],"for":[84],"such":[85],"attacks.":[86],"To":[87,142],"monitor":[88],"attacks,":[91],"this":[92,108],"literature":[93],"proposed":[94],"distributed":[96],"asynchronous":[97],"detection":[99],"model":[100],"(DANDM)":[101],"consists":[103],"of":[104,146,155,170,178,184,187],"three":[105],"algorithms.":[106],"model,":[109,148],"each":[110],"scans":[112,136],"its":[113],"own":[114],"received":[115],"data":[116,125],"packets":[117,126],"adjacent":[121],"contents":[122],"between":[123],"two":[124],"with":[127,162],"consecutive":[128],"sequence":[129],"numbers.":[130],"For":[131],"latter,":[133],"all":[134],"cooperatively":[137],"through":[138],"broadcast":[139],"state":[140],"information.":[141],"demonstrate":[143],"validity":[145],"our":[147,171],"we":[149],"take":[150],"attack":[151],"density":[152],"number":[154,186],"segmented":[156,188],"signatures":[157],"as":[158],"parameters":[159],"compare":[161],"Ma's":[163],"algorithm.The":[164],"results":[165],"show":[166],"that":[167,177],"performance":[169],"DANDM":[172],"significantly":[174],"better":[175],"than":[176],"Ma's,":[179],"especially":[180],"case":[183],"large":[185],"signatures.":[189]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
