{"id":"https://openalex.org/W2742153735","doi":"https://doi.org/10.3103/s0146411617030026","title":"The detection of Udpstorm attacks based on model checking linear temporal logic","display_name":"The detection of Udpstorm attacks based on model checking linear temporal logic","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2742153735","doi":"https://doi.org/10.3103/s0146411617030026","mag":"2742153735"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411617030026","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411617030026","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078165151","display_name":"Miaolei Deng","orcid":"https://orcid.org/0000-0003-4366-4643"},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"education","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Miaolei Deng","raw_affiliation_strings":["College of Information Science and Technology, Henan University of Technology, Zhengzhou, 450001, P. R. China","Key Laboratory of Grain Information Processing and Control (Henan University of Technology), Ministry of Education, Zhengzhou, 450001, P. R. China","College of Information Science and Technology, Henan University of Technology, Zhengzhou, P. R. China","Key Laboratory of Grain Information Processing and Control (Henan University of Technology), Ministry of Education, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Henan University of Technology, Zhengzhou, 450001, P. R. China","institution_ids":["https://openalex.org/I36152291"]},{"raw_affiliation_string":"Key Laboratory of Grain Information Processing and Control (Henan University of Technology), Ministry of Education, Zhengzhou, 450001, P. R. China","institution_ids":["https://openalex.org/I36152291"]},{"raw_affiliation_string":"College of Information Science and Technology, Henan University of Technology, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I36152291"]},{"raw_affiliation_string":"Key Laboratory of Grain Information Processing and Control (Henan University of Technology), Ministry of Education, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I36152291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019824583","display_name":"Kai Nie","orcid":"https://orcid.org/0000-0001-7568-4628"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Nie","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, 450001, P. R. China","School of Information Engineering, Zhengzhou University, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, 450001, P. R. China","institution_ids":["https://openalex.org/I38877650","https://openalex.org/I169689159"]},{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100696709","display_name":"Weijun Zhu","orcid":"https://orcid.org/0000-0001-9064-7833"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijun Zhu","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, 450001, P. R. China","School of Information Engineering, Zhengzhou University, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, 450001, P. R. China","institution_ids":["https://openalex.org/I38877650","https://openalex.org/I169689159"]},{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100350831","display_name":"Chunyan Zhang","orcid":"https://orcid.org/0000-0002-2095-7833"},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"education","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunyan Zhang","raw_affiliation_strings":["College of Information Science and Technology, Henan University of Technology, Zhengzhou, 450001, P. R. China","College of Information Science and Technology, Henan University of Technology, Zhengzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Technology, Henan University of Technology, Zhengzhou, 450001, P. R. China","institution_ids":["https://openalex.org/I36152291"]},{"raw_affiliation_string":"College of Information Science and Technology, Henan University of Technology, Zhengzhou, P. R. China","institution_ids":["https://openalex.org/I36152291"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078165151"],"corresponding_institution_ids":["https://openalex.org/I36152291"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65660525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"51","issue":"3","first_page":"174","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8325534462928772},{"id":"https://openalex.org/keywords/linear-temporal-logic","display_name":"Linear temporal logic","score":0.7710183262825012},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.7630612850189209},{"id":"https://openalex.org/keywords/temporal-logic","display_name":"Temporal logic","score":0.697757363319397},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.6015475988388062},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5126613974571228},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4542664587497711},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.4492352604866028},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1282510757446289}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8325534462928772},{"id":"https://openalex.org/C4777664","wikidata":"https://www.wikidata.org/wiki/Q1536492","display_name":"Linear temporal logic","level":2,"score":0.7710183262825012},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.7630612850189209},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.697757363319397},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.6015475988388062},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5126613974571228},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4542664587497711},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.4492352604866028},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1282510757446289},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411617030026","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411617030026","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W33961106","https://openalex.org/W131049964","https://openalex.org/W1499438245","https://openalex.org/W1599249895","https://openalex.org/W2001322402","https://openalex.org/W2004114991","https://openalex.org/W2046359540","https://openalex.org/W2096063762","https://openalex.org/W2169889002","https://openalex.org/W2543610835","https://openalex.org/W2913459036","https://openalex.org/W3145257457","https://openalex.org/W4237913625","https://openalex.org/W6816194311"],"related_works":["https://openalex.org/W2124110813","https://openalex.org/W1551070491","https://openalex.org/W2034301573","https://openalex.org/W3021103820","https://openalex.org/W2350953867","https://openalex.org/W1592102986","https://openalex.org/W2103740034","https://openalex.org/W2477338659","https://openalex.org/W1967076997","https://openalex.org/W2062273688"],"abstract_inverted_index":{"The":[0,73,139],"intrusion":[1,127],"detection":[2,128],"based":[3],"on":[4],"model":[5,44,106,122,136],"checking":[6,137],"temporal":[7,39],"logic":[8,40],"is":[9,41,60,87],"effective":[10],"in":[11,89],"detecting":[12],"the":[13,28,45,55,63,96,105,109,113,117,121,124,134,142,146,152],"complicated":[14],"and":[15,62,108,141],"variable":[16,46],"network":[17],"attacks.":[18,50],"However,":[19],"certain":[20],"types":[21],"of":[22,30,48,54,57,65,85,104,120,126,145],"attacks":[23,59,67,86],"remain":[24],"undetected":[25],"due":[26],"to":[27,43],"lack":[29],"formal":[31],"models.":[32],"To":[33],"solve":[34],"this":[35,83],"problem,":[36],"a":[37],"linear":[38],"employed":[42],"patterns":[47],"Udpstorm":[49,58],"First,":[51],"an":[52],"analysis":[53],"principles":[56],"given":[61],"details":[64],"these":[66],"are":[68,76,149],"transformed":[69,78],"into":[70,79],"atomic":[71,74],"actions.":[72],"actions":[75],"then":[77],"action":[80],"sequence.":[81],"Finally,":[82],"type":[84],"expressed":[88],"Linear":[90],"Temporal":[91],"Logic":[92],"(LTL)":[93],"formulas.":[94],"With":[95],"formula":[97],"thus":[98],"obstained":[99],"used":[100,115],"as":[101,116],"one":[102],"input":[103,119],"checker":[107],"automaton,":[110],"which":[111],"expresses":[112],"log,":[114],"other":[118],"checker,":[123],"results":[125],"can":[129],"be":[130],"obtained":[131],"by":[132,151],"conducting":[133],"LTL":[135],"algorithm.":[138],"effectiveness":[140],"comparative":[143],"advantages":[144],"new":[147],"algorithm":[148],"verified":[150],"simulation":[153],"experiments.":[154]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
