{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T18:31:59Z","timestamp":1769970719106,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Decision Technologies"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:p> In the era of rapid development of modern internet technology, network transmission techniques are continuously iterating and updating. The Quick UDP Internet Connections (QUIC) protocol has emerged as a timely response to these advancements. Owing to the strong compatibility and high transmission speed of QUIC, its extended version, Multipath QUIC (MPQUIC), has gained popularity. MPQUIC can integrate various transmission scenarios, achieving parallel transmission with higher bandwidth. However, due to some security flaws in the protocol, MPQUIC is susceptible to attacks from anomalous network traffic. To address this issue, we propose an MPQUIC traffic anomaly detection model based on Empirical Mode Decomposition (EMD) and Long Short-Term Memory (LSTM) networks, which can decompose and denoise data and learn the long-term dependencies of the data. Simulation experiments are conducted by obtaining MPQUIC traffic data under normal and anomalous conditions for prediction, analysis, and evaluation. The results demonstrate that the proposed model exhibits satisfactory prediction performance when trained on both normal and anomalous traffic data, enabling anomaly detection. Moreover, the evaluation metrics indicate that the EMD-LSTM-based model achieves higher accuracy compared to various traditional single models. <\/jats:p>","DOI":"10.3233\/idt-230261","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T17:16:09Z","timestamp":1706289369000},"page":"2789-2810","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel anomaly detection model for secure multipath QUIC communications by jointly using empirical mode decomposition and long short-term memory networks"],"prefix":"10.1177","volume":"18","author":[{"given":"Gang","family":"Lei","sequence":"first","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"given":"Junyi","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"given":"Keyang","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"given":"Fan","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"given":"Shibin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"given":"Changgen","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Normal University, Nanchang, Jiangxi, China"},{"name":"Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance, Nanchang, Jiangxi, China"},{"name":"Management Science and Engineering Center, Jiangxi Normal University, Nanchang, Jiangxi, China"}]}],"member":"179","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"bibr1-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3266173"},{"key":"bibr2-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"bibr3-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695706"},{"key":"bibr4-IDT-230261","doi-asserted-by":"publisher","DOI":"10.3390\/app13084725"},{"key":"bibr5-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131368"},{"key":"bibr6-IDT-230261","unstructured":"ThomsonM. RFC 0000 QUIC: A UDP-based multiplexed and secure transport status of this memo copyright notice. 2021. Available from: https\/\/www.rfc-editor.org\/v3test\/draft-ietf-quic-transport-34-bad-pdf-line-break.pdf."},{"key":"bibr7-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450103"},{"key":"bibr8-IDT-230261","first-page":"1","author":"Trevisan M","year":"2021","journal-title":"IEEE Xplore"},{"key":"bibr9-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143370"},{"key":"bibr10-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3151093"},{"key":"bibr11-IDT-230261","first-page":"1","author":"Wejin JS","year":"2022","journal-title":"2022 5th Information Technology for Education and Development (ITED)"},{"key":"bibr12-IDT-230261","unstructured":"RoskindJ. QUIC Quick UDP Internet Connections Multiplexed Stream Transport over UDP. 2012. Available from: https\/\/docs.google.com\/document\/d\/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34\/edit."},{"key":"bibr13-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3213638"},{"key":"bibr14-IDT-230261","author":"Thanh Trung N","year":"2023","journal-title":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)"},{"key":"bibr15-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3208747"},{"key":"bibr16-IDT-230261","doi-asserted-by":"publisher","DOI":"10.3390\/e25010105"},{"key":"bibr17-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2022.11.005"},{"key":"bibr18-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117163"},{"key":"bibr19-IDT-230261","doi-asserted-by":"crossref","unstructured":"JafariRKaanSelMohammadiAPettigrewRI. Physics-informed neural networks for modeling physiological time series: A case study with continuous blood pressure. 2023.","DOI":"10.21203\/rs.3.rs-2423200\/v1"},{"key":"bibr20-IDT-230261","first-page":"373","volume":"12510","author":"Zhang Y","year":"2023","journal-title":"International Conference on Statistics, Data Science, and Computational Intelligence (CSDSCI 2022)"},{"key":"bibr21-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.126012"},{"key":"bibr22-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.12.091"},{"key":"bibr23-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"bibr24-IDT-230261","author":"Shyam N","year":"2020","journal-title":"2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)"},{"issue":"2","key":"bibr25-IDT-230261","first-page":"19","volume":"17","author":"Wang S","year":"2019","journal-title":"ZTE Communications"},{"key":"bibr26-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"bibr27-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2023.03.024"},{"key":"bibr28-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.907967"},{"key":"bibr29-IDT-230261","first-page":"1","author":"Zhao Z","year":"2023","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"bibr30-IDT-230261","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"bibr31-IDT-230261","first-page":"213","author":"Hubert B","year":"2002","journal-title":"In Ottawa Linux Symposium"},{"key":"bibr32-IDT-230261","first-page":"76","author":"Lei G","year":"2022","journal-title":"IEEE Xplore"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IDT-230261","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/IDT-230261","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IDT-230261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:14:44Z","timestamp":1741670084000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IDT-230261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.3233\/IDT-230261"],"URL":"https:\/\/doi.org\/10.3233\/idt-230261","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}