A survey on analyzing encrypted network traffic of mobile devices
نویسندگان
چکیده
Over the years, use of smartphones has come to dominate several areas, improving our lives, offering us convenience, and reshaping daily work circumstances. Beyond traditional for communication, they are used many peripheral tasks such as gaming, browsing, shopping. A significant amount traffic over Internet belongs applications running mobile devices. Applications encrypt their communication ensure privacy security user’s data. However, it been found that nature incoming outgoing a device could reveal information can be identify activities performed profile user. To end, researchers trying develop techniques classify encrypted at different levels granularity, with objectives performing user profiling, network performance optimization, etc. This paper proposes framework categorize research works on analyzing related After that, we provide an extensive review state art based proposed framework.
منابع مشابه
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-pu...
متن کاملAnalyzing Covert Channels on Mobile Devices
In this work we investigate the problem of stealthy communication between colluding applications on smartphones running the popular Android operating system. Through collusion, applications can cooperatively perform operations they would not be able to perform separately, thus escalating their privileges. This can result in privacy infringements and user data leakage. In order to collude, the t...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملA survey of methods for encrypted traffic classification and analysis
With the widespread use of encrypted data transport network traffic encryption is becoming a standard nowadays. This presents a challenge for traffic measurement, especially for analysis and anomaly detection methods which are dependent on the type of network traffic. In this paper, we survey existing approaches for classification and analysis of encrypted traffic. First, we describe the most w...
متن کاملOn Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols, the traditional means of inspecting packet contents to enforce security policies is no longer a viable approach as message contents are co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2022
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-022-00581-y