{"id":"https://openalex.org/W4391742710","doi":"https://doi.org/10.1109/icct59356.2023.10419479","title":"Anomaly Detection of 5G Control Plane Based on Hidden Semi-Markov Model","display_name":"Anomaly Detection of 5G Control Plane Based on Hidden Semi-Markov Model","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4391742710","doi":"https://doi.org/10.1109/icct59356.2023.10419479"},"language":"en","primary_location":{"id":"doi:10.1109/icct59356.2023.10419479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct59356.2023.10419479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 23rd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113148284","display_name":"Miaoshun Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Miaoshun Lu","raw_affiliation_strings":["Zhengzhou University,Zhengzhou,China,450052"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,Zhengzhou,China,450052","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100858018","display_name":"Qian Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Sun","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China,100190","University of Chinese Academy of Sciences, Beijing, China","Nanjing Institute of InforSuperBahn, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China,100190","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Nanjing Institute of InforSuperBahn, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111416778","display_name":"Lin Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Tian","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China,100190","Nanjing Institute of InforSuperBahn, Nanjing, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing,China,100190","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Nanjing Institute of InforSuperBahn, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052563154","display_name":"Qianyun Zhang","orcid":"https://orcid.org/0000-0002-2147-4059"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianyun Zhang","raw_affiliation_strings":["BeiHang University,Beijing,China,100191"],"affiliations":[{"raw_affiliation_string":"BeiHang University,Beijing,China,100191","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113148284"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20177578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1291","last_page":"1296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7001000046730042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7001000046730042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7858306765556335},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.7567676901817322},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5753231048583984},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5560681223869324},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5041531324386597},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.4414108097553253},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43510767817497253},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38608577847480774},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15843379497528076},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1536283791065216},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.14512455463409424},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09391382336616516}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7858306765556335},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.7567676901817322},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5753231048583984},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5560681223869324},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5041531324386597},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.4414108097553253},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43510767817497253},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38608577847480774},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15843379497528076},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1536283791065216},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.14512455463409424},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09391382336616516},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct59356.2023.10419479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct59356.2023.10419479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 23rd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7123918047","display_name":null,"funder_award_id":"62120106007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2122646361","https://openalex.org/W2307746788","https://openalex.org/W2743241343","https://openalex.org/W2893238330","https://openalex.org/W2910977229","https://openalex.org/W2954508354","https://openalex.org/W3011987308","https://openalex.org/W3031937788","https://openalex.org/W3064708100","https://openalex.org/W3089977857","https://openalex.org/W3136173905","https://openalex.org/W3141567114","https://openalex.org/W3164952570","https://openalex.org/W3186625072","https://openalex.org/W4225994670","https://openalex.org/W4240723389","https://openalex.org/W4297911804","https://openalex.org/W4322706722","https://openalex.org/W4327779036","https://openalex.org/W4362499142","https://openalex.org/W6748102297","https://openalex.org/W6863083842"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4300558037","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"This":[0],"research":[1],"delves":[2],"into":[3,115],"the":[4,25,35,69,88,98,117,146,157,175,182,185],"security":[5,26],"concerns":[6],"surrounding":[7],"5th":[8],"generation":[9],"mobile":[10],"networks(5G)":[11],"control":[12],"plane":[13],"(CP)":[14],"protocols.":[15],"With":[16],"intrusion":[17],"detection":[18,71,84,134,208],"playing":[19],"a":[20],"pivotal":[21],"role":[22],"in":[23,41,188],"safeguarding":[24],"of":[27,72,119,159,174,184,199],"5G":[28,99,125,176],"CP,":[29],"it":[30,194],"is":[31],"essential":[32],"to":[33,96,109,204],"overcome":[34],"limitations":[36],"and":[37,45,61,106,111,171],"incredibility":[38],"issues":[39],"found":[40],"existing":[42,206],"machine":[43],"learning":[44,47],"deep":[46],"methods.":[48],"These":[49],"methods":[50],"not":[51],"only":[52],"overlook":[53],"important":[54],"network":[55],"functions":[56],"responsible":[57],"for":[58,139,196],"data":[59],"transmission":[60],"their":[62],"corresponding":[63],"states":[64,105],"but":[65],"also":[66],"risk":[67],"hindering":[68],"effective":[70],"CP":[73,100,126,147],"regulation":[74],"violations.":[75],"To":[76],"tackle":[77],"this":[78,123],"issue,":[79],"we":[80],"propose":[81],"an":[82,132],"anomaly":[83,133,207],"algorithm":[85,129,162,187],"based":[86],"on":[87],"Hidden":[89],"Semi-Markov":[90],"Model":[91],"(HSMM).":[92],"We":[93,155],"use":[94],"HSMM":[95,186],"represent":[97],"protocol":[101],"by":[102,148],"mapping":[103],"unknown":[104],"known":[107],"signals":[108],"hidden":[110,120],"observable":[112],"states,":[113],"taking":[114],"account":[116],"duration":[118],"states.":[121],"Leveraging":[122],"HSMM-based":[124],"model,":[127],"our":[128,160],"design":[130],"involves":[131],"methodology":[135],"that":[136],"calculates":[137],"probabilities":[138,151],"observed":[140],"signals,":[141],"detecting":[142,190],"abnormal":[143,191],"behaviors":[144],"within":[145],"comparing":[149],"these":[150],"against":[152],"predefined":[153],"thresholds.":[154],"validate":[156],"effectiveness":[158],"proposed":[161,164],"through":[163],"scenarios":[165,201],"including":[166],"normal":[167],"scenario,":[168,170],"DoS":[169],"intercept":[172],"scenario":[173],"CP.":[177],"The":[178],"experimental":[179],"results":[180],"show":[181],"capabilities":[183],"accurately":[189],"behaviors,":[192],"making":[193],"well-suited":[195],"diverse":[197],"types":[198],"attack":[200],"when":[202],"compared":[203],"two":[205],"algorithms.":[209]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
