Identification of Smartphone Applications by Encrypted Traffic Analysis

Anan Sawabe, Takanori Iwai, K. Satoda
{"title":"Identification of Smartphone Applications by Encrypted Traffic Analysis","authors":"Anan Sawabe, Takanori Iwai, K. Satoda","doi":"10.1109/CCNC.2019.8651821","DOIUrl":null,"url":null,"abstract":"The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2019.8651821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过加密流量分析识别智能手机应用程序
智能手机用户的需求已经从服务质量(即吞吐量)转向了体验质量。此外,为了保护个人信息,加密流量的数量也有所增加。因此,为了给智能手机用户提供优质的移动网络体验,网络运营商需要从加密流量中识别应用,并对其流量进行控制。在本文中,我们提出了一种通过仅分析IP流量中的时间序列模式而不检查加密流量来识别在特定智能手机上运行的应用程序的方法。该方法采用两级概率状态转移模型对应用程序流进行估计,并根据每个估计流的统计量对应用程序进行识别。通过在智能手机上运行的应用程序的实验,我们评估了该方法的估计精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Reliability Analysis of TSCH Protocol in a Mobile Scenario 5G K-SimSys for System-level Evaluation of Massive MIMO Location corroboration using passive observations of IEEE 802.11 Access Points A Fuzzy Logic Based Electric Vehicle Scheduling in Smart Charging Network Efficient Interest Satisfaction in Content Centric Wireless Sensor Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1