{"title":"Identification of Smartphone Applications by Encrypted Traffic Analysis","authors":"Anan Sawabe, Takanori Iwai, K. Satoda","doi":"10.1109/CCNC.2019.8651821","DOIUrl":null,"url":null,"abstract":"The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2019.8651821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.