{"id":"https://openalex.org/W2581104520","doi":"https://doi.org/10.1504/ijwgs.2017.10002838","title":"Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment","display_name":"Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2581104520","doi":"https://doi.org/10.1504/ijwgs.2017.10002838","mag":"2581104520"},"language":"en","primary_location":{"id":"doi:10.1504/ijwgs.2017.10002838","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10002838","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058090532","display_name":"Kangbin Yim","orcid":"https://orcid.org/0000-0002-1361-1455"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kangbin Yim","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069700732","display_name":"Hwankuk Kim","orcid":"https://orcid.org/0000-0002-4449-5821"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hwankuk Kim","raw_affiliation_strings":["Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087134007","display_name":"Kyungho Son","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungho Son","raw_affiliation_strings":["Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037284987","display_name":"Se\u2010Kwon Kim","orcid":"https://orcid.org/0000-0001-6507-9539"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sekwon Kim","raw_affiliation_strings":["Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100762909","display_name":"Seongmin Park","orcid":"https://orcid.org/0000-0002-9828-7972"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seongmin Park","raw_affiliation_strings":["Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Security Industry Technology Division, Korea Internet & Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100354901","display_name":"Junyoung Park","orcid":"https://orcid.org/0000-0001-8932-2820"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Junyoung Park","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea","institution_ids":["https://openalex.org/I24541011"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5058090532"],"corresponding_institution_ids":["https://openalex.org/I24541011"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58765074,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"13","issue":"1","first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.789340615272522},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.678360641002655},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5295295119285583},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.49227967858314514},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.47428709268569946},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4721184968948364},{"id":"https://openalex.org/keywords/general-packet-radio-service","display_name":"General Packet Radio Service","score":0.4529425799846649},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41454237699508667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40892916917800903},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1473100483417511},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12837758660316467},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08247068524360657},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.07564321160316467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.789340615272522},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.678360641002655},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5295295119285583},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.49227967858314514},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.47428709268569946},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4721184968948364},{"id":"https://openalex.org/C86338984","wikidata":"https://www.wikidata.org/wiki/Q79708","display_name":"General Packet Radio Service","level":3,"score":0.4529425799846649},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41454237699508667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40892916917800903},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1473100483417511},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12837758660316467},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08247068524360657},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.07564321160316467},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijwgs.2017.10002838","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10002838","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1490674876","https://openalex.org/W1552745631","https://openalex.org/W1584308190","https://openalex.org/W1788574667","https://openalex.org/W2022446697","https://openalex.org/W2139644305","https://openalex.org/W2144056585","https://openalex.org/W2160599764"],"related_works":["https://openalex.org/W2387714916","https://openalex.org/W2355551934","https://openalex.org/W2364462499","https://openalex.org/W2616686655","https://openalex.org/W2358280775","https://openalex.org/W2391556052","https://openalex.org/W601216357","https://openalex.org/W1589309122","https://openalex.org/W2379273495","https://openalex.org/W2363063365"],"abstract_inverted_index":{"The":[0],"number":[1],"of":[2,13,19,39,71,95,129],"mobile":[3,14,28,101],"service":[4],"users":[5],"has":[6,31],"drastically":[7],"increased":[8],"due":[9],"to":[10,42,59,68,114,133],"the":[11,25,46,50,93,116,126],"development":[12],"communication":[15,29],"technologies":[16],"and":[17,110],"commercialisation":[18],"high-performance":[20],"smartphones.":[21],"As":[22],"a":[23,63,77,99,107],"result,":[24],"environment":[26,104],"for":[27],"networks":[30],"changed":[32],"into":[33],"one":[34],"that":[35,52,73,105],"allows":[36],"different":[37],"types":[38,94],"abnormal":[40],"traffic":[41],"easily":[43],"flow,":[44],"so":[45],"security":[47],"threats":[48,97],"on":[49,98],"network":[51,65,117],"had":[53],"been":[54],"hidden":[55],"before":[56],"have":[57,123],"started":[58],"emerge.":[60],"In":[61,88],"particular,":[62],"4G":[64,100],"is":[66,83],"exposed":[67],"multiple":[69],"forms":[70],"attacks":[72],"can":[74],"maliciously":[75],"use":[76],"GPRS":[78],"Tunneling":[79],"Protocol":[80],"(GTP),":[81],"which":[82],"used":[84],"in":[85],"LTE":[86],"communications.":[87],"this":[89],"paper,":[90],"we":[91,122],"present":[92],"real":[96],"grid":[102],"computing":[103],"uses":[106],"GTP":[108],"protocol":[109],"provides":[111],"algorithms":[112,130],"studied":[113],"protect":[115],"from":[118],"such":[119],"threats.":[120],"Also,":[121],"F-score":[124],"represents":[125],"overall":[127],"accuracy":[128],"was":[131],"found":[132],"be":[134],"98.7%.":[135]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
