{"id":"https://openalex.org/W2592006715","doi":"https://doi.org/10.1109/tvt.2017.2675454","title":"Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks","display_name":"Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2592006715","doi":"https://doi.org/10.1109/tvt.2017.2675454","mag":"2592006715"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2017.2675454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2017.2675454","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034471100","display_name":"Sok\u2010Ian Sou","orcid":"https://orcid.org/0000-0002-1103-9504"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Sok-Ian Sou","raw_affiliation_strings":["Department of Electrical Engineering, Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000554496","display_name":"Chuan-Sheng Lin","orcid":"https://orcid.org/0000-0001-7078-1939"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chuan-Sheng Lin","raw_affiliation_strings":["Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, Taiwan","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034471100"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":1.2432,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.81670831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"66","issue":"9","first_page":"8385","last_page":"8397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7559599876403809},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7523229718208313},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6285741925239563},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5906512141227722},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5813580751419067},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.5365248918533325},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5288905501365662},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5236065983772278},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44170358777046204},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1658923327922821}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7559599876403809},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7523229718208313},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6285741925239563},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5906512141227722},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5813580751419067},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.5365248918533325},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5288905501365662},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5236065983772278},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44170358777046204},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1658923327922821},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2017.2675454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2017.2675454","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2019535530","display_name":null,"funder_award_id":"105-2628-E-006-007-MY3","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"},{"id":"https://openalex.org/G2447338405","display_name":null,"funder_award_id":"102-2221-E-006-112-MY3","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"}],"funders":[{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W109802382","https://openalex.org/W1416139041","https://openalex.org/W1516506771","https://openalex.org/W1529004212","https://openalex.org/W1674877186","https://openalex.org/W1971076702","https://openalex.org/W1982585548","https://openalex.org/W1987209479","https://openalex.org/W1999550161","https://openalex.org/W2035452798","https://openalex.org/W2037974030","https://openalex.org/W2047682800","https://openalex.org/W2062401262","https://openalex.org/W2068061330","https://openalex.org/W2089501902","https://openalex.org/W2096504104","https://openalex.org/W2115026336","https://openalex.org/W2125011234","https://openalex.org/W2138351610","https://openalex.org/W2159342279","https://openalex.org/W2322524800","https://openalex.org/W2399891510","https://openalex.org/W2399978149","https://openalex.org/W2511894128","https://openalex.org/W3122218227","https://openalex.org/W4250738563","https://openalex.org/W4299370734","https://openalex.org/W6713095524"],"related_works":["https://openalex.org/W1635888956","https://openalex.org/W2246035246","https://openalex.org/W2057608945","https://openalex.org/W4213199388","https://openalex.org/W2592006715","https://openalex.org/W2160606723","https://openalex.org/W2015896281","https://openalex.org/W1925982271","https://openalex.org/W2135882234","https://openalex.org/W3123531784"],"abstract_inverted_index":{"In":[0],"Long-Term":[1],"Evolution":[2],"(LTE),":[3],"the":[4,16,22,31,35,42,56,62,74,85,93,98,107,110,114,126,138,146,156,167,171],"security":[5],"threat":[6],"posed":[7],"by":[8,14],"malicious":[9],"users":[10],"can":[11],"be":[12],"reduced":[13],"using":[15],"traffic":[17,48],"detection":[18,116,121,158,172],"function":[19],"(TDF)":[20],"in":[21,83,149],"policy":[23],"and":[24,120,170],"charging":[25],"control":[26],"(PCC)":[27],"system":[28],"to":[29,50,58,105,154],"inspect":[30,59],"packets":[32],"passing":[33],"through":[34,131],"Packet":[36],"Data":[37],"Network":[38],"Gateway.":[39],"However,":[40],"as":[41,153],"volume":[43],"of":[44,61,97,109,125,144],"global":[45],"cellular":[46],"data":[47],"continues":[49],"grow,":[51],"it":[52],"becomes":[53],"impossible":[54],"for":[55],"TDF":[57],"all":[60],"packets.":[63],"Consequently,":[64],"more":[65],"efficient":[66],"Intrusion":[67],"Detection":[68],"Systems":[69],"(IDSs)":[70],"are":[71],"required.":[72],"Accordingly,":[73],"present":[75],"study":[76],"proposes":[77],"a":[78,151,163],"random":[79],"packet":[80],"inspection":[81,86,111,118,147,168],"scheme":[82],"which":[84],"rate":[87,112,148],"is":[88,103,129,135],"dynamically":[89],"adjusted":[90],"based":[91],"on":[92,113],"perceived":[94],"intrusion":[95,115,157],"period":[96],"session.":[99],"An":[100],"analytical":[101],"model":[102,128,139],"proposed":[104,127],"evaluate":[106],"effect":[108],"rate,":[117,159],"cost,":[119],"latency.":[122,173],"The":[123],"validity":[124],"demonstrated":[130],"numerical":[132],"simulations.":[133],"It":[134],"shown":[136],"that":[137],"provides":[140],"an":[141],"effective":[142],"means":[143],"setting":[145],"such":[150],"way":[152],"maximize":[155],"while":[160],"simultaneously":[161],"achieving":[162],"satisfactory":[164],"tradeoff":[165],"between":[166],"cost":[169]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
