{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:16:35Z","timestamp":1753881395690,"version":"3.41.2"},"reference-count":15,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":161,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016QY05X1000","2016QY01W0100"],"award-info":[{"award-number":["2016QY05X1000","2016QY01W0100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016QY05X1000","2016QY01W0100"],"award-info":[{"award-number":["2016QY05X1000","2016QY01W0100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>During the last decade, rapid development of mobile devices and applications has produced a large number of mobile data which hide numerous cyber\u2010attacks. To monitor the mobile data and detect the attacks, NIDS\/NIPS plays important role for ISP and enterprise, but now it still faces two challenges, high performance for super large patterns and detection of the latest attacks. High performance is dominated by Deep Packet Inspection (DPI) mechanism, which is the core of security devices. A new TTL attack is just put forward to escape detecting, such that the adversary inserts packet with short TTL to escape from NIDS\/NIPS. To address the above\u2010mentioned problems, in this paper, we design a security system to handle the two aspects. For efficient DPI, a new two\u2010step partition of pattern set is demonstrated and discussed, which includes first set\u2010partition and second set\u2010partition. For resisting TTL attacks, we set reasonable TTL threshold and patch TCP protocol stack to detect the attack. Compared with recent produced algorithm, our experiments show better performance and the throughput increased 27% when the number of patterns is 10<jats:sup>6<\/jats:sup>. Moreover, the success rate of detection is 100%, and while attack intensity increased, the throughput decreased.<\/jats:p>","DOI":"10.1155\/2018\/9809345","type":"journal-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T23:32:43Z","timestamp":1528759963000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Security System for Mobile Data Monitoring"],"prefix":"10.1155","volume":"2018","author":[{"given":"Likun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1183-2844","authenticated-orcid":false,"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5855-3837","authenticated-orcid":false,"given":"Yi","family":"Xin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9929-3744","authenticated-orcid":false,"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1182-5772","authenticated-orcid":false,"given":"Mengmeng","family":"Ge","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2518712"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-011-0185-0"},{"key":"e_1_2_9_3_2","doi-asserted-by":"crossref","unstructured":"JiangH. ZhangG. XieG. SalamatianK. andMathyL. Scalable high-performance parallel design for Network Intrusion Detection Systems on many-core processors Proceedings of the 9th ACM\/IEEE Symposium on Architectures for Networking and Communications Systems ANCS 2013 October 2013 San Jose CA USA 137\u2013146 https:\/\/doi.org\/10.1109\/ANCS.2013.6665196 2-s2.0-84893491705.","DOI":"10.1109\/ANCS.2013.6665196"},{"key":"e_1_2_9_4_2","unstructured":"HaiyangJ. GaogangX. andKaveS. Load Balancing by Ruleset Partition for Parallel IDS on Muti-Core Processors Proceedings of the 22th International Conference on Computer Communications and Networks 2013 Nassau Bahamas."},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","unstructured":"JamshedM. LeeJ. MoonS. YunI. KimD. LeeS. YiY. andParkK. S. Kargus: A highly-scalable software-based intrusion detection system Proceedings of the 2012 ACM Conference on Computer and Communications Security CCS 2012 October 2012 NC USA 317\u2013328 https:\/\/doi.org\/10.1145\/2382196.2382232 2-s2.0-84869475315.","DOI":"10.1145\/2382196.2382232"},{"key":"e_1_2_9_6_2","doi-asserted-by":"crossref","unstructured":"NamJ. JamshedM. ChoiB. HanD. andParkK. Scaling the performance of network intrusion detection with many-core processors Proceedings of the 2015 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS) May 2015 Oakland CA USA 191\u2013192 https:\/\/doi.org\/10.1109\/ANCS.2015.7110135.","DOI":"10.1109\/ANCS.2015.7110135"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_2_9_8_2","unstructured":"WuS.andManberU. A fast algorithm for multi-pattern searching Technical Report TR-94-17 1994."},{"key":"e_1_2_9_9_2","unstructured":"BeateC. W. A string matching algorithm fast on the average Proceedings of the 6th Colloquium on Automata Languages and Programmin Graz Austria 118\u2013132."},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.4548"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"VakiliS. LangloisJ. P. BoughzalaB. andSavariaY. Memory-Efficient String Matching for Intrusion Detection Systems using a High-Precision Pattern Grouping Algorithm Proceedings of the the 2016 Symposium March 2016 Santa Clara California USA 37\u201342 https:\/\/doi.org\/10.1145\/2881025.2881031.","DOI":"10.1145\/2881025.2881031"},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"PingL. YanL. andJianT. A partition-based efficient algorithm for large scale multiple-strings matching In Proceedings of the 12th ACM Internet Conference. String Processing and Information Retrieval 2005 Buenos Aires Argentina 399\u2013404.","DOI":"10.1007\/11575832_44"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.4.25"},{"key":"e_1_2_9_14_2","unstructured":"SheharbanoK. MobinJ. andPhilipD. A. V. Towards Illuminating a Censorship Monitors Model to Faicilitate Evasion Proceedings of the In Proceedings of the 3th USENIX Workshop on Free and Open Communications on the Internet 2013 Washington D.C. USA."},{"key":"e_1_2_9_15_2","unstructured":"ZhongjieW. YueC. andZhiyunQ. C. S. A Closer Look at Evading Stateful Internet Censorship In Proceedings of the 17th ACM Internet Measurement Conference 2017 London UK."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9809345.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9809345.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/9809345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:04:16Z","timestamp":1723014256000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/9809345"}},"subtitle":[],"editor":[{"given":"Lu","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/9809345"],"URL":"https:\/\/doi.org\/10.1155\/2018\/9809345","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-02-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9809345"}}