Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.26636/jtit.2022.155821
In the 1970s, roaming interconnections for cellular networks were designed for a few trusted parties. Hence, security was not a major concern. Today, the SS7 (Signaling System no. 7) solution that is several decades old is still used for many roaming interconnections. SS7 has been proven vulnerable to serious threats due to deregulation, expansion, and convergence with IP-based Long Term Evolution (LTE) networks. The limitations of the SS7 network that it is unable to check the subscriber’s authentic location, verify their identity and filter illegitimate messages, makes the system vulnerable to attacks. Adversaries taking advantage of these shortcomings can inflict threats such as interception of calls and text messages, subscriber tracking and denial of service attacks. Although LTE and Diameter signaling protocols promise enhanced security keeping up with the latest attack vectors, their inherent flaws related to roaming interconnections are still there and continue to make the networks vulnerable. Hence, a highly secure signaling network is required to protect the operators and the subscribers from a diverse range of security attacks. SS7 network protocol layers, such as signaling connection control part (SCCP), transaction capabilities application part (TCAP), and global system for mobile Communications – mobile application part (GSM MAP), manage connectivity between networks and subscribers. An analysis of the parameters of these layers may provide a clear insight into any anomalies present. Unfortunately, these parameters are not validated and verified at the network’s edge. The major contribution of this research is a methodology for detecting anomalies by checking malformed parameters and intra-layer parameter discrepancies at the abovementioned protocol layers. This paper provides an insight into the severity of SS7 network security vulnerabilities. Furthermore, it provides a proof of concept for the analysis of SS7 network traffic using the Wireshark packet capture tool and the Snort intrusion detection system (IDS) capable of detecting malicious traffic patterns.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.26636/jtit.2022.155821
- https://jtit.pl/jtit/article/download/428/428
- OA Status
- diamond
- Cited By
- 6
- References
- 15
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4220805178
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4220805178Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.26636/jtit.2022.155821Digital Object Identifier
- Title
-
Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network SecurityWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-03-31Full publication date if available
- Authors
-
Rafia Afzal, Raja Kumar MurugesanList of authors in order
- Landing page
-
https://doi.org/10.26636/jtit.2022.155821Publisher landing page
- PDF URL
-
https://jtit.pl/jtit/article/download/428/428Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://jtit.pl/jtit/article/download/428/428Direct OA link when available
- Concepts
-
Roaming, Computer science, Computer network, Computer security, Cellular network, Denial-of-service attack, Enhanced Data Rates for GSM Evolution, Telecommunications, World Wide Web, The InternetTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
6Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 2, 2023: 3Per-year citation counts (last 5 years)
- References (count)
-
15Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4220805178 |
|---|---|
| doi | https://doi.org/10.26636/jtit.2022.155821 |
| ids.doi | https://doi.org/10.26636/jtit.2022.155821 |
| ids.openalex | https://openalex.org/W4220805178 |
| fwci | 1.28545047 |
| type | article |
| title | Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security |
| biblio.issue | 2022 |
| biblio.volume | 1 |
| biblio.last_page | 71 |
| biblio.first_page | 64 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9988999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11598 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9977999925613403 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Internet Traffic Analysis and Secure E-voting |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.992900013923645 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C194498986 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8085015416145325 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q680016 |
| concepts[0].display_name | Roaming |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7796807885169983 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6398362517356873 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.6109747290611267 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C153646914 |
| concepts[4].level | 2 |
| concepts[4].score | 0.580296516418457 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q535695 |
| concepts[4].display_name | Cellular network |
| concepts[5].id | https://openalex.org/C38822068 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5673093199729919 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[5].display_name | Denial-of-service attack |
| concepts[6].id | https://openalex.org/C162307627 |
| concepts[6].level | 2 |
| concepts[6].score | 0.43209731578826904 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q204833 |
| concepts[6].display_name | Enhanced Data Rates for GSM Evolution |
| concepts[7].id | https://openalex.org/C76155785 |
| concepts[7].level | 1 |
| concepts[7].score | 0.2684882879257202 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[7].display_name | Telecommunications |
| concepts[8].id | https://openalex.org/C136764020 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[8].display_name | World Wide Web |
| concepts[9].id | https://openalex.org/C110875604 |
| concepts[9].level | 2 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[9].display_name | The Internet |
| keywords[0].id | https://openalex.org/keywords/roaming |
| keywords[0].score | 0.8085015416145325 |
| keywords[0].display_name | Roaming |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7796807885169983 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.6398362517356873 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.6109747290611267 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/cellular-network |
| keywords[4].score | 0.580296516418457 |
| keywords[4].display_name | Cellular network |
| keywords[5].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[5].score | 0.5673093199729919 |
| keywords[5].display_name | Denial-of-service attack |
| keywords[6].id | https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution |
| keywords[6].score | 0.43209731578826904 |
| keywords[6].display_name | Enhanced Data Rates for GSM Evolution |
| keywords[7].id | https://openalex.org/keywords/telecommunications |
| keywords[7].score | 0.2684882879257202 |
| keywords[7].display_name | Telecommunications |
| language | en |
| locations[0].id | doi:10.26636/jtit.2022.155821 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764512266 |
| locations[0].source.issn | 1509-4553, 1899-8852 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1509-4553 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Journal of Telecommunications and Information Technology |
| locations[0].source.host_organization | https://openalex.org/P4310317402 |
| locations[0].source.host_organization_name | National Institute of Telecommunications |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310317402 |
| locations[0].source.host_organization_lineage_names | National Institute of Telecommunications |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://jtit.pl/jtit/article/download/428/428 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Telecommunictions and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.26636/jtit.2022.155821 |
| locations[1].id | pmh:oai:doaj.org/article:753c5fadf7c5401fa83ed70d5352645a |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Journal of Telecommunications and Information Technology, Iss 1 (2022) |
| locations[1].landing_page_url | https://doaj.org/article/753c5fadf7c5401fa83ed70d5352645a |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5027004182 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-5299-1366 |
| authorships[0].author.display_name | Rafia Afzal |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, Malaysia |
| authorships[0].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[0].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | Taylor's University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Rafia Afzal |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | School of Computer Science and Engineering, Taylor's University, Malaysia |
| authorships[1].author.id | https://openalex.org/A5062919173 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9500-1361 |
| authorships[1].author.display_name | Raja Kumar Murugesan |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I4210143550 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computer Science and Engineering, Taylor's University, Malaysia |
| authorships[1].institutions[0].id | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].ror | https://ror.org/0498pcx51 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210143550 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | Taylor's University |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Raja Kumar Murugesan |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computer Science and Engineering, Taylor's University, Malaysia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://jtit.pl/jtit/article/download/428/428 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9988999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2369138185, https://openalex.org/W2945277231, https://openalex.org/W4210904806, https://openalex.org/W2388705066, https://openalex.org/W4312698066, https://openalex.org/W2015804271, https://openalex.org/W2118242884, https://openalex.org/W2896958856, https://openalex.org/W1826009044, https://openalex.org/W2002145412 |
| cited_by_count | 6 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 2 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 3 |
| locations_count | 2 |
| best_oa_location.id | doi:10.26636/jtit.2022.155821 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764512266 |
| best_oa_location.source.issn | 1509-4553, 1899-8852 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1509-4553 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Journal of Telecommunications and Information Technology |
| best_oa_location.source.host_organization | https://openalex.org/P4310317402 |
| best_oa_location.source.host_organization_name | National Institute of Telecommunications |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310317402 |
| best_oa_location.source.host_organization_lineage_names | National Institute of Telecommunications |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://jtit.pl/jtit/article/download/428/428 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Telecommunictions and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.26636/jtit.2022.155821 |
| primary_location.id | doi:10.26636/jtit.2022.155821 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764512266 |
| primary_location.source.issn | 1509-4553, 1899-8852 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1509-4553 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Journal of Telecommunications and Information Technology |
| primary_location.source.host_organization | https://openalex.org/P4310317402 |
| primary_location.source.host_organization_name | National Institute of Telecommunications |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310317402 |
| primary_location.source.host_organization_lineage_names | National Institute of Telecommunications |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://jtit.pl/jtit/article/download/428/428 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Telecommunictions and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.26636/jtit.2022.155821 |
| publication_date | 2022-03-31 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W3023316635, https://openalex.org/W2581766746, https://openalex.org/W3004712539, https://openalex.org/W2944046640, https://openalex.org/W2903957515, https://openalex.org/W2767825858, https://openalex.org/W2625996663, https://openalex.org/W2900143186, https://openalex.org/W2593072654, https://openalex.org/W4255936939, https://openalex.org/W2497023036, https://openalex.org/W2945358264, https://openalex.org/W4230467869, https://openalex.org/W3017217726, https://openalex.org/W3033213260 |
| referenced_works_count | 15 |
| abstract_inverted_index.a | 11, 19, 150, 165, 215, 241, 275 |
| abstract_inverted_index.7) | 28 |
| abstract_inverted_index.An | 205 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.an | 262 |
| abstract_inverted_index.as | 102, 176 |
| abstract_inverted_index.at | 230, 254 |
| abstract_inverted_index.by | 246 |
| abstract_inverted_index.is | 31, 35, 71, 155, 240 |
| abstract_inverted_index.it | 70, 273 |
| abstract_inverted_index.of | 65, 95, 104, 113, 168, 207, 210, 237, 267, 277, 282, 300 |
| abstract_inverted_index.to | 47, 51, 73, 90, 136, 144, 157 |
| abstract_inverted_index.up | 126 |
| abstract_inverted_index.LTE | 117 |
| abstract_inverted_index.SS7 | 24, 42, 67, 171, 268, 283 |
| abstract_inverted_index.The | 63, 234 |
| abstract_inverted_index.and | 54, 82, 106, 111, 118, 142, 161, 187, 203, 228, 250, 292 |
| abstract_inverted_index.any | 219 |
| abstract_inverted_index.are | 139, 225 |
| abstract_inverted_index.can | 98 |
| abstract_inverted_index.due | 50 |
| abstract_inverted_index.few | 12 |
| abstract_inverted_index.for | 5, 10, 38, 190, 243, 279 |
| abstract_inverted_index.has | 43 |
| abstract_inverted_index.may | 213 |
| abstract_inverted_index.no. | 27 |
| abstract_inverted_index.not | 18, 226 |
| abstract_inverted_index.old | 34 |
| abstract_inverted_index.the | 1, 23, 66, 75, 87, 128, 146, 159, 162, 208, 231, 255, 265, 280, 287, 293 |
| abstract_inverted_index.was | 17 |
| abstract_inverted_index.– | 193 |
| abstract_inverted_index.(GSM | 197 |
| abstract_inverted_index.Long | 58 |
| abstract_inverted_index.Term | 59 |
| abstract_inverted_index.This | 259 |
| abstract_inverted_index.been | 44 |
| abstract_inverted_index.from | 164 |
| abstract_inverted_index.into | 218, 264 |
| abstract_inverted_index.make | 145 |
| abstract_inverted_index.many | 39 |
| abstract_inverted_index.part | 180, 185, 196 |
| abstract_inverted_index.such | 101, 175 |
| abstract_inverted_index.text | 107 |
| abstract_inverted_index.that | 30, 69 |
| abstract_inverted_index.this | 238 |
| abstract_inverted_index.tool | 291 |
| abstract_inverted_index.used | 37 |
| abstract_inverted_index.were | 8 |
| abstract_inverted_index.with | 56, 127 |
| abstract_inverted_index.(IDS) | 298 |
| abstract_inverted_index.(LTE) | 61 |
| abstract_inverted_index.MAP), | 198 |
| abstract_inverted_index.Snort | 294 |
| abstract_inverted_index.calls | 105 |
| abstract_inverted_index.check | 74 |
| abstract_inverted_index.clear | 216 |
| abstract_inverted_index.edge. | 233 |
| abstract_inverted_index.flaws | 134 |
| abstract_inverted_index.major | 20, 235 |
| abstract_inverted_index.makes | 86 |
| abstract_inverted_index.paper | 260 |
| abstract_inverted_index.proof | 276 |
| abstract_inverted_index.range | 167 |
| abstract_inverted_index.still | 36, 140 |
| abstract_inverted_index.their | 80, 132 |
| abstract_inverted_index.there | 141 |
| abstract_inverted_index.these | 96, 211, 223 |
| abstract_inverted_index.using | 286 |
| abstract_inverted_index.1970s, | 2 |
| abstract_inverted_index.Hence, | 15, 149 |
| abstract_inverted_index.System | 26 |
| abstract_inverted_index.Today, | 22 |
| abstract_inverted_index.attack | 130 |
| abstract_inverted_index.denial | 112 |
| abstract_inverted_index.filter | 83 |
| abstract_inverted_index.global | 188 |
| abstract_inverted_index.highly | 151 |
| abstract_inverted_index.latest | 129 |
| abstract_inverted_index.layers | 212 |
| abstract_inverted_index.manage | 199 |
| abstract_inverted_index.mobile | 191, 194 |
| abstract_inverted_index.packet | 289 |
| abstract_inverted_index.proven | 45 |
| abstract_inverted_index.secure | 152 |
| abstract_inverted_index.system | 88, 189, 297 |
| abstract_inverted_index.taking | 93 |
| abstract_inverted_index.unable | 72 |
| abstract_inverted_index.verify | 79 |
| abstract_inverted_index.(SCCP), | 181 |
| abstract_inverted_index.(TCAP), | 186 |
| abstract_inverted_index.between | 201 |
| abstract_inverted_index.capable | 299 |
| abstract_inverted_index.capture | 290 |
| abstract_inverted_index.concept | 278 |
| abstract_inverted_index.control | 179 |
| abstract_inverted_index.decades | 33 |
| abstract_inverted_index.diverse | 166 |
| abstract_inverted_index.inflict | 99 |
| abstract_inverted_index.insight | 217, 263 |
| abstract_inverted_index.keeping | 125 |
| abstract_inverted_index.layers, | 174 |
| abstract_inverted_index.layers. | 258 |
| abstract_inverted_index.network | 68, 154, 172, 269, 284 |
| abstract_inverted_index.promise | 122 |
| abstract_inverted_index.protect | 158 |
| abstract_inverted_index.provide | 214 |
| abstract_inverted_index.related | 135 |
| abstract_inverted_index.roaming | 3, 40, 137 |
| abstract_inverted_index.serious | 48 |
| abstract_inverted_index.service | 114 |
| abstract_inverted_index.several | 32 |
| abstract_inverted_index.threats | 49, 100 |
| abstract_inverted_index.traffic | 285, 303 |
| abstract_inverted_index.trusted | 13 |
| abstract_inverted_index.Although | 116 |
| abstract_inverted_index.Diameter | 119 |
| abstract_inverted_index.IP-based | 57 |
| abstract_inverted_index.analysis | 206, 281 |
| abstract_inverted_index.attacks. | 91, 115, 170 |
| abstract_inverted_index.cellular | 6 |
| abstract_inverted_index.checking | 247 |
| abstract_inverted_index.concern. | 21 |
| abstract_inverted_index.continue | 143 |
| abstract_inverted_index.designed | 9 |
| abstract_inverted_index.enhanced | 123 |
| abstract_inverted_index.identity | 81 |
| abstract_inverted_index.inherent | 133 |
| abstract_inverted_index.networks | 7, 147, 202 |
| abstract_inverted_index.parties. | 14 |
| abstract_inverted_index.present. | 221 |
| abstract_inverted_index.protocol | 173, 257 |
| abstract_inverted_index.provides | 261, 274 |
| abstract_inverted_index.required | 156 |
| abstract_inverted_index.research | 239 |
| abstract_inverted_index.security | 16, 124, 169, 270 |
| abstract_inverted_index.severity | 266 |
| abstract_inverted_index.solution | 29 |
| abstract_inverted_index.tracking | 110 |
| abstract_inverted_index.vectors, | 131 |
| abstract_inverted_index.verified | 229 |
| abstract_inverted_index.Evolution | 60 |
| abstract_inverted_index.Wireshark | 288 |
| abstract_inverted_index.advantage | 94 |
| abstract_inverted_index.anomalies | 220, 245 |
| abstract_inverted_index.authentic | 77 |
| abstract_inverted_index.detecting | 244, 301 |
| abstract_inverted_index.detection | 296 |
| abstract_inverted_index.intrusion | 295 |
| abstract_inverted_index.location, | 78 |
| abstract_inverted_index.malformed | 248 |
| abstract_inverted_index.malicious | 302 |
| abstract_inverted_index.messages, | 85, 108 |
| abstract_inverted_index.networks. | 62 |
| abstract_inverted_index.operators | 160 |
| abstract_inverted_index.parameter | 252 |
| abstract_inverted_index.patterns. | 304 |
| abstract_inverted_index.protocols | 121 |
| abstract_inverted_index.signaling | 120, 153, 177 |
| abstract_inverted_index.validated | 227 |
| abstract_inverted_index.(Signaling | 25 |
| abstract_inverted_index.connection | 178 |
| abstract_inverted_index.expansion, | 53 |
| abstract_inverted_index.parameters | 209, 224, 249 |
| abstract_inverted_index.subscriber | 109 |
| abstract_inverted_index.vulnerable | 46, 89 |
| abstract_inverted_index.Adversaries | 92 |
| abstract_inverted_index.application | 184, 195 |
| abstract_inverted_index.convergence | 55 |
| abstract_inverted_index.intra-layer | 251 |
| abstract_inverted_index.limitations | 64 |
| abstract_inverted_index.methodology | 242 |
| abstract_inverted_index.network’s | 232 |
| abstract_inverted_index.subscribers | 163 |
| abstract_inverted_index.transaction | 182 |
| abstract_inverted_index.vulnerable. | 148 |
| abstract_inverted_index.Furthermore, | 272 |
| abstract_inverted_index.capabilities | 183 |
| abstract_inverted_index.connectivity | 200 |
| abstract_inverted_index.contribution | 236 |
| abstract_inverted_index.illegitimate | 84 |
| abstract_inverted_index.interception | 103 |
| abstract_inverted_index.shortcomings | 97 |
| abstract_inverted_index.subscribers. | 204 |
| abstract_inverted_index.deregulation, | 52 |
| abstract_inverted_index.discrepancies | 253 |
| abstract_inverted_index.Communications | 192 |
| abstract_inverted_index.Unfortunately, | 222 |
| abstract_inverted_index.abovementioned | 256 |
| abstract_inverted_index.subscriber’s | 76 |
| abstract_inverted_index.interconnections | 4, 138 |
| abstract_inverted_index.vulnerabilities. | 271 |
| abstract_inverted_index.interconnections. | 41 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.49000000953674316 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.74514986 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |