Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?
Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the curr...
Saved in:
Published in | IEEE access Vol. 8; pp. 165872 - 165883 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP. |
---|---|
AbstractList | Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP. |
Author | Liu, Qinghua Lei, Gang Cao, Yuanlong You, Ilsun Chen, Jing Wang, Hao |
Author_xml | – sequence: 1 givenname: Yuanlong orcidid: 0000-0002-6557-6559 surname: Cao fullname: Cao, Yuanlong organization: School of Software, Jiangxi Normal University, Nanchang, China – sequence: 2 givenname: Jing orcidid: 0000-0002-6350-9416 surname: Chen fullname: Chen, Jing organization: School of Software, Jiangxi Normal University, Nanchang, China – sequence: 3 givenname: Qinghua orcidid: 0000-0002-2462-0971 surname: Liu fullname: Liu, Qinghua organization: School of Software, Jiangxi Normal University, Nanchang, China – sequence: 4 givenname: Gang orcidid: 0000-0001-5472-7211 surname: Lei fullname: Lei, Gang organization: School of Software, Jiangxi Normal University, Nanchang, China – sequence: 5 givenname: Hao orcidid: 0000-0003-3884-8771 surname: Wang fullname: Wang, Hao organization: School of Software, Jiangxi Normal University, Nanchang, China – sequence: 6 givenname: Ilsun orcidid: 0000-0002-0604-3445 surname: You fullname: You, Ilsun email: ilsunu@gmail.com organization: Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea |
BookMark | eNp9kU9r3DAQxUVJock2nyAXQ867Hf21dCqLSdOFlJYmpUchyeNWG6-1kbWHfPt646SUHqKLhuH9Hm94Z-RkSAMSckFhRSmYD-umubq9XTFgsOLAqKjlG3LKqDJLLrk6-Wd-R87HcQvT09NK1qdk07ih-nLoS9y78ru6a75VHqvvyR_GUpVUNY8ec7UuxYX7sfoZJ81mCGm377HgNHYp71yJafj4nrztXD_i-fO_ID8-Xd01n5c3X683zfpmGQTosvTBOVd77FCiojR0EkE441WrVas8RQi1MAggWgmdEu2UU0vTeQbSeNPyBdnMvm1yW7vPcefyo00u2qdFyr-syyWGHq3uOHAmhGwFEzXlGnzrjZMQHCJVevK6nL32OT0ccCx2mw55mOJbJqRQtaHsqDKzKuQ0jhk7G2J5OrpkF3tLwR6LsHMR9liEfS5iYvl_7Evi16mLmYqI-JcwVCsqNf8DZt2UgQ |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_3390_electronics11152384 crossref_primary_10_1016_j_cose_2021_102180 crossref_primary_10_3390_s20226573 crossref_primary_10_1007_s10922_022_09677_1 crossref_primary_10_1155_2021_9968550 crossref_primary_10_1587_transinf_2021NGP0009 |
Cites_doi | 10.1109/LCN.2017.69 10.23919/CNSM.2017.8255970 10.3390/app10010380 10.1109/GLOCOM.2012.6503599 10.1109/TSMC.2019.2959630 10.1109/TMC.2018.2889059 10.1109/ACCESS.2017.2785849 10.1109/TNET.2017.2701153 10.1109/TNET.2020.2970032 10.1109/ACCESS.2019.2962247 10.1109/LCN44214.2019.8990831 10.1109/ACCESS.2019.2957434 10.1109/INFOCOM.2016.7524599 10.1109/TNET.2019.2961759 10.1109/ACCESS.2018.2888582 10.1109/TVT.2017.2753398 10.1007/s11036-017-0901-2 10.1109/TBC.2016.2590819 10.1109/INFOCOM.2017.8057011 10.1109/INFOCOM.2017.8057182 10.1109/ICNP.2017.8117547 10.1016/j.jnca.2017.11.004 10.1109/TNET.2014.2300140 10.1109/TMC.2012.189 10.1109/COMPSAC.2018.10230 10.1109/TVT.2016.2543842 10.1109/ACCESS.2019.2958986 10.1109/TNET.2016.2527759 10.1109/TMM.2018.2879748 10.17487/rfc6824 10.1109/JIOT.2019.2958097 10.1109/MNET.2018.1800017 10.1109/INFOCOM.2014.6848120 10.1109/LCOMM.2017.2740918 10.1109/MNET.2018.1800187 10.1109/IWCMC.2018.8450509 10.1109/CC.2017.7868178 10.3390/s18061926 10.1209/epl/i2004-10286-2 10.1109/ICC.2015.7249436 10.1109/WAINA.2012.283 10.1109/ACCESS.2017.2731899 10.1109/ACCESS.2019.2921603 10.1109/TII.2019.2950109 10.1109/ICPADS47876.2019.00117 10.1109/LCN.2015.7366348 10.1038/srep22916 10.1145/381677.381704 10.1109/TNET.2019.2950908 10.1109/TNET.2019.2923955 10.1016/j.ins.2018.06.002 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2020.3021475 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 165883 |
ExternalDocumentID | oai_doaj_org_article_8f3032445d42471380bdb9a50caee168 10_1109_ACCESS_2020_3021475 9186158 |
Genre | orig-research |
GrantInformation_xml | – fundername: Soonchunhyang University Research Fund funderid: 10.13039/501100002560 – fundername: National Natural Science Foundation of China (NSFC) grantid: 61962026 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-bcaaa7befe5e611cf5e04a9b6d86d6b1e0c749e004d50f64d695859fb2059b9d3 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:28:24 EDT 2025 Mon Jun 30 04:28:21 EDT 2025 Tue Jul 01 02:55:47 EDT 2025 Thu Apr 24 23:12:30 EDT 2025 Wed Aug 27 02:32:26 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-bcaaa7befe5e611cf5e04a9b6d86d6b1e0c749e004d50f64d695859fb2059b9d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-6350-9416 0000-0002-0604-3445 0000-0003-3884-8771 0000-0002-2462-0971 0000-0001-5472-7211 0000-0002-6557-6559 |
OpenAccessLink | https://doaj.org/article/8f3032445d42471380bdb9a50caee168 |
PQID | 2454679128 |
PQPubID | 4845423 |
PageCount | 12 |
ParticipantIDs | crossref_primary_10_1109_ACCESS_2020_3021475 crossref_citationtrail_10_1109_ACCESS_2020_3021475 ieee_primary_9186158 proquest_journals_2454679128 doaj_primary_oai_doaj_org_article_8f3032445d42471380bdb9a50caee168 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 20200000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref14 ref55 ref11 ref54 ref10 (ref56) 2020 ref17 ref16 (ref51) 0 ref19 ref18 zhang (ref47) 2015; 37 paasch (ref12) 2012 ref50 xu (ref37) 2017 ref46 ref45 ref48 ref42 ref41 ref44 kim (ref59) 2020; 10 ref43 ref49 ref7 ref9 ref4 ref3 ref6 ref5 (ref53) 2020 ref40 kimura (ref15) 2020 ref35 kim park lee you (ref57) 2012; 2 ref34 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 abhishta (ref58) 2020; 11 ref24 ref23 ref26 ref25 ref20 ref63 (ref52) 2020 saha (ref8) 2019 ref22 ref21 ref28 ref27 ref29 ref60 ref62 ref61 |
References_xml | – ident: ref18 doi: 10.1109/LCN.2017.69 – year: 0 ident: ref51 publication-title: LBL USC/ISI and Xerox Parc NS-2 Documentation and Software Version 2 35 – ident: ref42 doi: 10.23919/CNSM.2017.8255970 – ident: ref14 doi: 10.3390/app10010380 – ident: ref44 doi: 10.1109/GLOCOM.2012.6503599 – ident: ref6 doi: 10.1109/TSMC.2019.2959630 – ident: ref1 doi: 10.1109/TMC.2018.2889059 – year: 2020 ident: ref56 publication-title: Cyberattack – ident: ref28 doi: 10.1109/ACCESS.2017.2785849 – ident: ref27 doi: 10.1109/TNET.2017.2701153 – ident: ref20 doi: 10.1109/TNET.2020.2970032 – ident: ref62 doi: 10.1109/ACCESS.2019.2962247 – ident: ref21 doi: 10.1109/LCN44214.2019.8990831 – volume: 10 start-page: 1 year: 2020 ident: ref59 article-title: 5G core network security issues and attack classification from network protocol perspective publication-title: J Internet Services Inf Secur – ident: ref40 doi: 10.1109/ACCESS.2019.2957434 – ident: ref22 doi: 10.1109/INFOCOM.2016.7524599 – ident: ref23 doi: 10.1109/TNET.2019.2961759 – ident: ref48 doi: 10.1109/ACCESS.2018.2888582 – ident: ref16 doi: 10.1109/TVT.2017.2753398 – ident: ref19 doi: 10.1007/s11036-017-0901-2 – ident: ref31 doi: 10.1109/TBC.2016.2590819 – ident: ref41 doi: 10.1109/INFOCOM.2017.8057011 – ident: ref26 doi: 10.1109/INFOCOM.2017.8057182 – ident: ref43 doi: 10.1109/ICNP.2017.8117547 – ident: ref60 doi: 10.1016/j.jnca.2017.11.004 – ident: ref32 doi: 10.1109/TNET.2014.2300140 – ident: ref55 doi: 10.1109/TMC.2012.189 – ident: ref35 doi: 10.1109/COMPSAC.2018.10230 – year: 2017 ident: ref37 publication-title: Multipath Transmission Control Protocol (MPTCP) Partial Reliability Extension – ident: ref33 doi: 10.1109/TVT.2016.2543842 – ident: ref4 doi: 10.1109/ACCESS.2019.2958986 – ident: ref13 doi: 10.1109/TNET.2016.2527759 – ident: ref3 doi: 10.1109/TMM.2018.2879748 – year: 2020 ident: ref52 publication-title: Multipath-TCP Implement Multipath TCP on NS-2 – ident: ref5 doi: 10.17487/rfc6824 – ident: ref61 doi: 10.1109/JIOT.2019.2958097 – start-page: 1 year: 2019 ident: ref8 article-title: AMuSe: An agile multipath-TCP scheduler for dual-band 802.11ad/ac wireless LANs publication-title: Proc ACM MobiCom – ident: ref7 doi: 10.1109/MNET.2018.1800017 – ident: ref34 doi: 10.1109/INFOCOM.2014.6848120 – ident: ref17 doi: 10.1109/LCOMM.2017.2740918 – ident: ref63 doi: 10.1109/MNET.2018.1800187 – ident: ref38 doi: 10.1109/IWCMC.2018.8450509 – ident: ref30 doi: 10.1109/CC.2017.7868178 – ident: ref54 doi: 10.3390/s18061926 – volume: 11 start-page: 3 year: 2020 ident: ref58 article-title: Why would we get attacked? An analysis of attacker's aims behind DDoS attacks publication-title: J Wireless Mobile Netw Ubiquitous Comput Dependable Appl – ident: ref49 doi: 10.1209/epl/i2004-10286-2 – ident: ref24 doi: 10.1109/ICC.2015.7249436 – ident: ref39 doi: 10.1109/WAINA.2012.283 – ident: ref10 doi: 10.1109/ACCESS.2017.2731899 – ident: ref45 doi: 10.1109/ACCESS.2019.2921603 – ident: ref2 doi: 10.1109/TII.2019.2950109 – ident: ref36 doi: 10.1109/ICPADS47876.2019.00117 – ident: ref29 doi: 10.1109/LCN.2015.7366348 – year: 2020 ident: ref15 article-title: Packet scheduling in multipath TCP: Fundamentals, lessons, and opportunities publication-title: IEEE Syst J – ident: ref46 doi: 10.1038/srep22916 – ident: ref50 doi: 10.1145/381677.381704 – year: 2012 ident: ref12 publication-title: Securing the MultiPath TCP handshake with external keys – ident: ref25 doi: 10.1109/TNET.2019.2950908 – ident: ref9 doi: 10.1109/TNET.2019.2923955 – volume: 2 start-page: 134 year: 2012 ident: ref57 article-title: A brief survey on rootkit techniques in malicious codes publication-title: J Internet Services Inf Secur – year: 2020 ident: ref53 publication-title: Cyber Attack Trends Analysis Report – ident: ref11 doi: 10.1016/j.ins.2018.06.002 – volume: 37 start-page: 180 year: 2015 ident: ref47 article-title: Method to analyse the robustness of aviation communication network based on complex networks publication-title: Syst Eng Electron |
SSID | ssj0000816957 |
Score | 2.2100077 |
Snippet | Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 165872 |
SubjectTerms | Communications systems cyber attacks Cyberattack Cybersecurity Data communication Data transmission Electronic devices graph-theoretic model incomplete information Internet Measurement methods Mobile handsets Multipath TCP Multipath transmission Protocol (computers) Robustness Robustness (mathematics) robustness analysis TCP (protocol) Wireless communication Wireless fidelity |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fSxwxEB7UJ32wVi1eqyUPfXTP7F6SS57kXBRbUEQUfQv5MQul5a7o3kP713eym1vEltK3sCQhmy_JzCQz3wB8CmbKHU5kgUHJQjTcFaZyWKjGx4l0Ogif4p2vrtXlvfjyKB_X4HiIhUHEzvkMx6nYveXHRVimq7ITU2oSwHod1slw62O1hvuUlEDCyGkmFiq5OZnVNf0DmYAVWaaJGiz5Er4QPh1Hf06q8sdJ3ImXizdwtRpY71Xybbxs_Tj8esXZ-L8j34HtrGeyWb8w3sIazndh6wX74B58rt2cdQG4KS0xu6tvmEd2u_DL55a1C1b_9PjEZm2bwvDZw1eqQ6dJckEnRZvlOKaE6-k-3F-c39WXRc6sUATBdVv44JybemxQoirL0EjkwhmvolZR-RJ5mAqDtIGi5I0SkaZWS9P4irQxb-LkHWzMF3M8ABZ05Ukn1FUsUYQmUC_UL5XJ9HEY-Aiq1ZTbkGnHU_aL77YzP7ixPU424WQzTiM4Hhr96Fk3_l39LGE5VE2U2d0HwsDmHWh1Q9KalBkZRUUSeaK5j944yYNDLJUewV7CbegkQzaCw9XKsHl7P9tKSBIwhmT7-7-3-gCbaYD9Xc0hbLRPSzwi7aX1H7tl-xtuEeva priority: 102 providerName: IEEE |
Title | Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information? |
URI | https://ieeexplore.ieee.org/document/9186158 https://www.proquest.com/docview/2454679128 https://doaj.org/article/8f3032445d42471380bdb9a50caee168 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6yJz2IT1xf5ODRYtpNsslJ1uKigiKyoreQxxQE2RWtB_-9kzS7LAh68VZCmjZfpvMoM98QcuL1kFkYiAK8FAVvmC10ZaGQjQsDYZXnLtY7397Jq0d-8yyel1p9xZywjh64A-5MNahk0QaJwCtUpAPFXHDaCuYtQClTmS_avKVgKulgVUothplmqGT6bFTXuCMMCCuMUyNRWMwsXDJFibE_t1j5oZeTsRlvkPXsJdJR93abZAWmW2RtiTtwm1zXdkpT-WxsKkwn9T11QB9m7vOjpe2M1l8O3umobWMRPX16wTmoC2ICObrJNFchxVM53yGP48tJfVXkvgiF50y1hfPW2qGDBgTIsvSNAMatdjIoGaQrgfkh14DiHwRrJA8IhRK6cRX6Uk6HwS7pTWdT2CPUq8qhR6eqUAL3jcdVcF28xsDFgmd9Us0hMj6ThsfeFa8mBQ9Mmw5XE3E1Gdc-OV3c9NZxZvw-_SJiv5gaCa_TAIqByWJg_hKDPtmOJ7dYRJcKfTUcPpyfpMkf54epuEDzoNEy7__How_IatxO91_mkPTa9084Qk-ldcdJKI9TUeE3aTTijg |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAe-CqIhQI-cGy2Ttb22ie0RFRb6FYIbUVvlj8mUgXardrsAX4948QbVYAQtyiyLcfP9hs7M28A3gYz5Q4nssCgZCEa7gpTOSxU4-NEOh2ET_HOizM1PxcfL-TFDhwOsTCI2Dmf4Tg9dv_y4zps0lXZkSk1EbC-A3eJ92XVR2sNNyophYSR0ywtVHJzNKtr-go6BFZ0Nk3iYMmb8Bb9dCr9Oa3KH3txRzDHD2Gx7VrvV_JtvGn9OPz8TbXxf_v-CB5kS5PN-qnxGHZw9QT2bukP7sNJ7VasC8FNiYnZsv7MPLIva7-5aVm7ZvUPj9ds1rYpEJ99vaQytJ8kJ3QytVmOZErIvnsK58cflvW8yLkViiC4bgsfnHNTjw1KVGUZGolcOONV1CoqXyIPU2GQllCUvFEi0tBqaRpfkT3mTZw8g93VeoXPgQVdebIKdRVLFKEJ1Aq1S890-HEY-Aiq7ZDbkIXHU_6L77Y7gHBje5xswslmnEZwOFS66nU3_l38fcJyKJpEs7sXhIHNa9DqhviazBkZRUWcPNHcR2-c5MEhlkqPYD_hNjSSIRvBwXZm2LzAb2wlJFGMIXZ_8fdab-DefLk4tacnZ59ewv3U2f7m5gB22-sNviJbpvWvuyn8C-T07yQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Can+Multipath+TCP+be+Robust+to+Cyber+Attacks+With+Incomplete+Information%3F&rft.jtitle=IEEE+access&rft.au=Cao%2C+Yuanlong&rft.au=Chen%2C+Jing&rft.au=Liu%2C+Qinghua&rft.au=Lei%2C+Gang&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=165872&rft.epage=165883&rft_id=info:doi/10.1109%2FACCESS.2020.3021475&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_3021475 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |