Identification of Smartphone Applications by Encrypted Traffic Analysis

Anan Sawabe, Takanori Iwai, K. Satoda
{"title":"Identification of Smartphone Applications by Encrypted Traffic Analysis","authors":"Anan Sawabe, Takanori Iwai, K. Satoda","doi":"10.1109/CCNC.2019.8651821","DOIUrl":null,"url":null,"abstract":"The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2019.8651821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The requirements of smartphone users have shifted from the quality of service (i.e., throughput) to the quality of experience. Also, the amount of encrypted traffic has increased to protect personal information. Therefore, to provide a quality mobile network experience for smartphone users, network operators need to identify applications from the encrypted traffic and control their traffic. In this paper, we propose a method of identifying applications running on a specific smartphone by analyzing only the time series patterns in IP traffic without inspecting the encrypted traffic. The proposed method estimates application flow with a two-level probabilistic state transition model and identifies applications on the basis of the statistics per estimated flow. Through experiments identifying applications running on a smartphone, we evaluated the estimation accuracy of proposed method.
通过加密流量分析识别智能手机应用程序
智能手机用户的需求已经从服务质量(即吞吐量)转向了体验质量。此外,为了保护个人信息,加密流量的数量也有所增加。因此,为了给智能手机用户提供优质的移动网络体验,网络运营商需要从加密流量中识别应用,并对其流量进行控制。在本文中,我们提出了一种通过仅分析IP流量中的时间序列模式而不检查加密流量来识别在特定智能手机上运行的应用程序的方法。该方法采用两级概率状态转移模型对应用程序流进行估计,并根据每个估计流的统计量对应用程序进行识别。通过在智能手机上运行的应用程序的实验,我们评估了该方法的估计精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信