放大镜:通过轻量级流量指纹检测网络访问

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Wenhao Li;Qiang Wang;Huaifeng Bao;Xiao-Yu Zhang;Lingyun Ying;Zhaoxuan Li;Huamin Jin;Shuai Wang
{"title":"放大镜:通过轻量级流量指纹检测网络访问","authors":"Wenhao Li;Qiang Wang;Huaifeng Bao;Xiao-Yu Zhang;Lingyun Ying;Zhaoxuan Li;Huamin Jin;Shuai Wang","doi":"10.1109/TIFS.2025.3587621","DOIUrl":null,"url":null,"abstract":"Network access detection plays a crucial role in global network management, enabling efficient network monitoring and topology measurement by identifying unauthorized network access and gathering detailed information about mobile devices. Existing methods for endpoint-based detection primarily rely on deploying monitoring software to recognize network connections. However, the challenges associated with developing and maintaining such systems have limited their universality and coverage in practical deployments, especially given the cost implications of covering a wide array of devices with heterogeneous operating systems. To tackle the issues, we propose Magnifier for mobile device network access detection that, for the first time, passively infers access patterns from backbone traffic at the gateway level. Magnifier’s foundation is the creation of device-specific access patterns using the innovative Domain Name Forest (dnForest) fingerprints. We then employ a two-stage distillation algorithm to fine-tune the weights of individual Domain Name Trees (dnTree) within each dnForest, emphasizing the unique device fingerprints. With these meticulously crafted fingerprints, Magnifier efficiently infers network access from backbone traffic using a lightweight fingerprint matching algorithm. Our experimental results, conducted in real-world scenarios, demonstrate that Magnifier exhibits exceptional universality and coverage in both initial and repetitive network access detection in real-time. To facilitate further research, we have thoughtfully curated the NetCess2025 dataset, comprising network access data from 42 different models across 9 brands, covering the majority of mainstream mobile devices. We have also made both the Magnifier prototype and the NetCess2025 dataset publicly available (<uri>https://github.com/SecTeamPolaris/Magnifier</uri>).","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"7542-7557"},"PeriodicalIF":8.0000,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Magnifier: Detecting Network Access via Lightweight Traffic-Based Fingerprints\",\"authors\":\"Wenhao Li;Qiang Wang;Huaifeng Bao;Xiao-Yu Zhang;Lingyun Ying;Zhaoxuan Li;Huamin Jin;Shuai Wang\",\"doi\":\"10.1109/TIFS.2025.3587621\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network access detection plays a crucial role in global network management, enabling efficient network monitoring and topology measurement by identifying unauthorized network access and gathering detailed information about mobile devices. Existing methods for endpoint-based detection primarily rely on deploying monitoring software to recognize network connections. However, the challenges associated with developing and maintaining such systems have limited their universality and coverage in practical deployments, especially given the cost implications of covering a wide array of devices with heterogeneous operating systems. To tackle the issues, we propose Magnifier for mobile device network access detection that, for the first time, passively infers access patterns from backbone traffic at the gateway level. Magnifier’s foundation is the creation of device-specific access patterns using the innovative Domain Name Forest (dnForest) fingerprints. We then employ a two-stage distillation algorithm to fine-tune the weights of individual Domain Name Trees (dnTree) within each dnForest, emphasizing the unique device fingerprints. With these meticulously crafted fingerprints, Magnifier efficiently infers network access from backbone traffic using a lightweight fingerprint matching algorithm. Our experimental results, conducted in real-world scenarios, demonstrate that Magnifier exhibits exceptional universality and coverage in both initial and repetitive network access detection in real-time. To facilitate further research, we have thoughtfully curated the NetCess2025 dataset, comprising network access data from 42 different models across 9 brands, covering the majority of mainstream mobile devices. We have also made both the Magnifier prototype and the NetCess2025 dataset publicly available (<uri>https://github.com/SecTeamPolaris/Magnifier</uri>).\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"7542-7557\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11075885/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11075885/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

网络接入检测在全球网络管理中发挥着至关重要的作用,通过识别非法网络接入,收集移动设备的详细信息,实现高效的网络监控和拓扑测量。现有的基于端点的检测方法主要依赖于部署监控软件来识别网络连接。然而,与开发和维护此类系统相关的挑战限制了它们在实际部署中的通用性和覆盖范围,特别是考虑到使用异构操作系统覆盖大量设备的成本影响。为了解决这些问题,我们首次提出了用于移动设备网络访问检测的Magnifier,它可以被动地从网关级的骨干流量推断访问模式。Magnifier的基础是使用创新的域名森林(dnForest)指纹创建特定于设备的访问模式。然后,我们采用两阶段蒸馏算法来微调每个dnForest中单个域名树(dnTree)的权重,强调唯一的设备指纹。凭借这些精心制作的指纹,Magnifier使用轻量级指纹匹配算法有效地从骨干流量推断网络访问。我们在现实世界场景中进行的实验结果表明,Magnifier在实时初始和重复网络访问检测中都具有出色的通用性和覆盖范围。为了便于进一步研究,我们精心策划了NetCess2025数据集,其中包括来自9个品牌的42种不同型号的网络访问数据,涵盖了大多数主流移动设备。我们还公开了Magnifier原型和NetCess2025数据集(https://github.com/SecTeamPolaris/Magnifier)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Magnifier: Detecting Network Access via Lightweight Traffic-Based Fingerprints
Network access detection plays a crucial role in global network management, enabling efficient network monitoring and topology measurement by identifying unauthorized network access and gathering detailed information about mobile devices. Existing methods for endpoint-based detection primarily rely on deploying monitoring software to recognize network connections. However, the challenges associated with developing and maintaining such systems have limited their universality and coverage in practical deployments, especially given the cost implications of covering a wide array of devices with heterogeneous operating systems. To tackle the issues, we propose Magnifier for mobile device network access detection that, for the first time, passively infers access patterns from backbone traffic at the gateway level. Magnifier’s foundation is the creation of device-specific access patterns using the innovative Domain Name Forest (dnForest) fingerprints. We then employ a two-stage distillation algorithm to fine-tune the weights of individual Domain Name Trees (dnTree) within each dnForest, emphasizing the unique device fingerprints. With these meticulously crafted fingerprints, Magnifier efficiently infers network access from backbone traffic using a lightweight fingerprint matching algorithm. Our experimental results, conducted in real-world scenarios, demonstrate that Magnifier exhibits exceptional universality and coverage in both initial and repetitive network access detection in real-time. To facilitate further research, we have thoughtfully curated the NetCess2025 dataset, comprising network access data from 42 different models across 9 brands, covering the majority of mainstream mobile devices. We have also made both the Magnifier prototype and the NetCess2025 dataset publicly available (https://github.com/SecTeamPolaris/Magnifier).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信